<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-15T04:46:47</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:1487" version="1" class="patch">
	<metadata>
		<title>bugfix update for shim 15.8-4.el8_10.1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546/" source="CVE"/>
		<reference ref_id="CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547/" source="CVE"/>
		<reference ref_id="CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548/" source="CVE"/>
		<reference ref_id="CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549/" source="CVE"/>
		<reference ref_id="CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550/" source="CVE"/>
		<reference ref_id="CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551/" source="CVE"/>
		<description>
SUSE Liberty Linux 8 update: bugfix update for shim 15.8-4.el8_10.1		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960787" comment="shim-ia32-15.8-4.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960788" comment="shim-x64-15.8-4.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1488" version="1" class="patch">
	<metadata>
		<title>virt:rhel bug fix update for RHSA-2023:0099 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4144" ref_url="https://www.suse.com/security/cve/CVE-2022-4144/" source="CVE"/>
		<description>
Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):

 QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read (CVE-2022-4144) 

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):

 libvirt kills virtual machine on restart when 2M and 1G hugepages are mounted (BZ#2132176) 
 VMs hung on vnc_clipboard_send (BZ#2148504)		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4144/">CVE-2022-4144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4144">CVE-2022-4144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831245" comment="hivex-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831246" comment="hivex-devel-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831247" comment="libguestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831248" comment="libguestfs-appliance-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831249" comment="libguestfs-bash-completion-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831250" comment="libguestfs-devel-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831251" comment="libguestfs-gfs2-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831252" comment="libguestfs-gobject-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831253" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831254" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831255" comment="libguestfs-java-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831256" comment="libguestfs-java-devel-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831257" comment="libguestfs-javadoc-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831258" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831259" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831260" comment="libguestfs-rescue-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831261" comment="libguestfs-rsync-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831262" comment="libguestfs-tools-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831263" comment="libguestfs-tools-c-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831264" comment="libguestfs-winsupport-8.6-1.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831265" comment="libguestfs-xfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831266" comment="libiscsi-1.18.0-8.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831267" comment="libiscsi-devel-1.18.0-8.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831268" comment="libiscsi-utils-1.18.0-8.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831269" comment="libnbd-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831270" comment="libnbd-bash-completion-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831271" comment="libnbd-devel-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831272" comment="libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831273" comment="libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843885" comment="libvirt-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843886" comment="libvirt-client-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843887" comment="libvirt-daemon-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843888" comment="libvirt-daemon-config-network-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843889" comment="libvirt-daemon-config-nwfilter-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843890" comment="libvirt-daemon-driver-interface-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843891" comment="libvirt-daemon-driver-network-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843892" comment="libvirt-daemon-driver-nodedev-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843893" comment="libvirt-daemon-driver-nwfilter-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843894" comment="libvirt-daemon-driver-qemu-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843895" comment="libvirt-daemon-driver-secret-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843896" comment="libvirt-daemon-driver-storage-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843897" comment="libvirt-daemon-driver-storage-core-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843898" comment="libvirt-daemon-driver-storage-disk-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843899" comment="libvirt-daemon-driver-storage-gluster-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843900" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843901" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843902" comment="libvirt-daemon-driver-storage-logical-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843903" comment="libvirt-daemon-driver-storage-mpath-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843904" comment="libvirt-daemon-driver-storage-rbd-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843905" comment="libvirt-daemon-driver-storage-scsi-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843906" comment="libvirt-daemon-kvm-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831296" comment="libvirt-dbus-1.3.0-2.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843907" comment="libvirt-devel-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843908" comment="libvirt-docs-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843909" comment="libvirt-libs-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843910" comment="libvirt-lock-sanlock-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843911" comment="libvirt-nss-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843912" comment="libvirt-wireshark-8.0.0-10.1.module+el8.7.0+17192+cbc2449b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831303" comment="lua-guestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831304" comment="nbdfuse-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831305" comment="nbdkit-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831306" comment="nbdkit-bash-completion-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831307" comment="nbdkit-basic-filters-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831308" comment="nbdkit-basic-plugins-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831309" comment="nbdkit-curl-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831310" comment="nbdkit-devel-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831311" comment="nbdkit-example-plugins-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831312" comment="nbdkit-gzip-filter-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831313" comment="nbdkit-gzip-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831314" comment="nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831315" comment="nbdkit-nbd-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831316" comment="nbdkit-python-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831317" comment="nbdkit-server-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831318" comment="nbdkit-ssh-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831319" comment="nbdkit-tar-filter-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831320" comment="nbdkit-tar-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831321" comment="nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831322" comment="nbdkit-vddk-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831323" comment="nbdkit-xz-filter-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831324" comment="netcf-0.2.8-12.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831325" comment="netcf-devel-0.2.8-12.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831326" comment="netcf-libs-0.2.8-12.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831327" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831328" comment="perl-Sys-Virt-8.0.0-1.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831329" comment="perl-hivex-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831330" comment="python3-hivex-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831331" comment="python3-libguestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831332" comment="python3-libnbd-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831333" comment="python3-libvirt-8.0.0-2.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843913" comment="qemu-guest-agent-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843914" comment="qemu-img-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843915" comment="qemu-kvm-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843916" comment="qemu-kvm-block-curl-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843917" comment="qemu-kvm-block-gluster-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843918" comment="qemu-kvm-block-iscsi-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843919" comment="qemu-kvm-block-rbd-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843920" comment="qemu-kvm-block-ssh-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843921" comment="qemu-kvm-common-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843922" comment="qemu-kvm-core-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843923" comment="qemu-kvm-docs-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843924" comment="qemu-kvm-hw-usbredir-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843925" comment="qemu-kvm-ui-opengl-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843926" comment="qemu-kvm-ui-spice-6.2.0-21.module+el8.7.0+17573+effbd7e8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831348" comment="ruby-hivex-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831349" comment="ruby-libguestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831350" comment="seabios-1.16.0-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831351" comment="seabios-bin-1.16.0-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831352" comment="seavgabios-bin-1.16.0-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831353" comment="sgabios-0.20170427git-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831354" comment="sgabios-bin-0.20170427git-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831355" comment="supermin-5.2.1-2.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831356" comment="supermin-devel-5.2.1-2.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831357" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831358" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831359" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831360" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831361" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831362" comment="virt-dib-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831363" comment="virt-v2v-1.42.0-21.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831364" comment="virt-v2v-bash-completion-1.42.0-21.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831365" comment="virt-v2v-man-pages-ja-1.42.0-21.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831366" comment="virt-v2v-man-pages-uk-1.42.0-21.module+el8.7.0+16689+53d59bc2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1489" version="1" class="patch">
	<metadata>
		<title>Enhancement update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<reference ref_id="CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775/" source="CVE"/>
		<description>

 grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601) 
 grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775) 
 		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843872" comment="grub2-common-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843873" comment="grub2-efi-ia32-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843874" comment="grub2-efi-ia32-cdboot-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843875" comment="grub2-efi-ia32-modules-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843876" comment="grub2-efi-x64-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843877" comment="grub2-efi-x64-cdboot-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843878" comment="grub2-efi-x64-modules-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843879" comment="grub2-pc-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843880" comment="grub2-pc-modules-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843881" comment="grub2-tools-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843882" comment="grub2-tools-efi-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843883" comment="grub2-tools-extra-2.02-142.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843884" comment="grub2-tools-minimal-2.02-142.el8_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1490" version="1" class="patch">
	<metadata>
		<title>virt:rhel bug fix update for RHSA-2023:2757 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-46790" ref_url="https://www.suse.com/security/cve/CVE-2021-46790/" source="CVE"/>
		<reference ref_id="CVE-2022-30784" ref_url="https://www.suse.com/security/cve/CVE-2022-30784/" source="CVE"/>
		<reference ref_id="CVE-2022-30786" ref_url="https://www.suse.com/security/cve/CVE-2022-30786/" source="CVE"/>
		<reference ref_id="CVE-2022-30788" ref_url="https://www.suse.com/security/cve/CVE-2022-30788/" source="CVE"/>
		<reference ref_id="CVE-2022-30789" ref_url="https://www.suse.com/security/cve/CVE-2022-30789/" source="CVE"/>
		<reference ref_id="CVE-2022-3165" ref_url="https://www.suse.com/security/cve/CVE-2022-3165/" source="CVE"/>
		<reference ref_id="CVE-2023-1018" ref_url="https://www.suse.com/security/cve/CVE-2023-1018/" source="CVE"/>
		<description>
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
Security Fix(es):

 ntfs-3g: heap-based buffer overflow in ntfsck (CVE-2021-46790) 
 QEMU: VNC: integer underflow in vnc_client_cut_text_ext leads to CPU exhaustion (CVE-2022-3165) 
 ntfs-3g: crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value (CVE-2022-30784) 
 ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate (CVE-2022-30786) 
 ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc (CVE-2022-30788) 
 ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array (CVE-2022-30789) 
 tpm2: TCG TPM2.0 implementations vulnerable to memory corruption (CVE-2023-1018) 

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46790/">CVE-2021-46790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46790">CVE-2021-46790 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30784/">CVE-2022-30784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30784">CVE-2022-30784 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30786/">CVE-2022-30786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30786">CVE-2022-30786 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30788/">CVE-2022-30788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30788">CVE-2022-30788 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30789/">CVE-2022-30789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30789">CVE-2022-30789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3165/">CVE-2022-3165 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3165">CVE-2022-3165 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1018/">CVE-2023-1018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1018">CVE-2023-1018 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831413" comment="hivex-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831414" comment="hivex-devel-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831415" comment="libguestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831416" comment="libguestfs-appliance-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831417" comment="libguestfs-bash-completion-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831418" comment="libguestfs-devel-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831419" comment="libguestfs-gfs2-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831420" comment="libguestfs-gobject-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831421" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831422" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831423" comment="libguestfs-java-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831424" comment="libguestfs-java-devel-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831425" comment="libguestfs-javadoc-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831426" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831427" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831428" comment="libguestfs-rescue-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831429" comment="libguestfs-rsync-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831430" comment="libguestfs-tools-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831431" comment="libguestfs-tools-c-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843820" comment="libguestfs-winsupport-8.8-1.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831433" comment="libguestfs-xfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831434" comment="libiscsi-1.18.0-8.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831435" comment="libiscsi-devel-1.18.0-8.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831436" comment="libiscsi-utils-1.18.0-8.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831437" comment="libnbd-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831438" comment="libnbd-bash-completion-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831439" comment="libnbd-devel-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843821" comment="libtpms-0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843822" comment="libtpms-devel-0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843823" comment="libvirt-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843824" comment="libvirt-client-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843825" comment="libvirt-daemon-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843826" comment="libvirt-daemon-config-network-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843827" comment="libvirt-daemon-config-nwfilter-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843828" comment="libvirt-daemon-driver-interface-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843829" comment="libvirt-daemon-driver-network-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843830" comment="libvirt-daemon-driver-nodedev-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843831" comment="libvirt-daemon-driver-nwfilter-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843832" comment="libvirt-daemon-driver-qemu-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843833" comment="libvirt-daemon-driver-secret-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843834" comment="libvirt-daemon-driver-storage-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843835" comment="libvirt-daemon-driver-storage-core-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843836" comment="libvirt-daemon-driver-storage-disk-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843837" comment="libvirt-daemon-driver-storage-gluster-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843838" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843839" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843840" comment="libvirt-daemon-driver-storage-logical-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843841" comment="libvirt-daemon-driver-storage-mpath-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843842" comment="libvirt-daemon-driver-storage-rbd-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843843" comment="libvirt-daemon-driver-storage-scsi-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843844" comment="libvirt-daemon-kvm-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831464" comment="libvirt-dbus-1.3.0-2.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843845" comment="libvirt-devel-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843846" comment="libvirt-docs-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843847" comment="libvirt-libs-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843848" comment="libvirt-lock-sanlock-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843849" comment="libvirt-nss-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843850" comment="libvirt-wireshark-8.0.0-19.module+el8.8.0+18453+e0bf0d1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831471" comment="lua-guestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831472" comment="nbdfuse-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831473" comment="nbdkit-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831474" comment="nbdkit-bash-completion-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831475" comment="nbdkit-basic-filters-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831476" comment="nbdkit-basic-plugins-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831477" comment="nbdkit-curl-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831478" comment="nbdkit-devel-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831479" comment="nbdkit-example-plugins-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831480" comment="nbdkit-gzip-filter-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831481" comment="nbdkit-gzip-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831482" comment="nbdkit-linuxdisk-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831483" comment="nbdkit-nbd-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831484" comment="nbdkit-python-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831485" comment="nbdkit-server-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831486" comment="nbdkit-ssh-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831487" comment="nbdkit-tar-filter-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831488" comment="nbdkit-tar-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831489" comment="nbdkit-tmpdisk-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831490" comment="nbdkit-vddk-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831491" comment="nbdkit-xz-filter-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831492" comment="netcf-0.2.8-12.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831493" comment="netcf-devel-0.2.8-12.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831494" comment="netcf-libs-0.2.8-12.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831495" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831496" comment="perl-Sys-Virt-8.0.0-1.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831497" comment="perl-hivex-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831498" comment="python3-hivex-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831499" comment="python3-libguestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831500" comment="python3-libnbd-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831501" comment="python3-libvirt-8.0.0-2.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843851" comment="qemu-guest-agent-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843852" comment="qemu-img-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843853" comment="qemu-kvm-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843854" comment="qemu-kvm-block-curl-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843855" comment="qemu-kvm-block-gluster-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843856" comment="qemu-kvm-block-iscsi-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843857" comment="qemu-kvm-block-rbd-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843858" comment="qemu-kvm-block-ssh-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843859" comment="qemu-kvm-common-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843860" comment="qemu-kvm-core-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843861" comment="qemu-kvm-docs-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843862" comment="qemu-kvm-hw-usbredir-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843863" comment="qemu-kvm-ui-opengl-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843864" comment="qemu-kvm-ui-spice-6.2.0-32.module+el8.8.0+18361+9f407f6e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831516" comment="ruby-hivex-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831517" comment="ruby-libguestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843865" comment="seabios-1.16.0-3.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843866" comment="seabios-bin-1.16.0-3.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843867" comment="seavgabios-bin-1.16.0-3.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831521" comment="sgabios-0.20170427git-3.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831522" comment="sgabios-bin-0.20170427git-3.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831523" comment="supermin-5.2.1-2.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831524" comment="supermin-devel-5.2.1-2.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831525" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831526" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831527" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831528" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831529" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831530" comment="virt-dib-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843868" comment="virt-v2v-1.42.0-22.module+el8.8.0+18611+5846c3aa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843869" comment="virt-v2v-bash-completion-1.42.0-22.module+el8.8.0+18611+5846c3aa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843870" comment="virt-v2v-man-pages-ja-1.42.0-22.module+el8.8.0+18611+5846c3aa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843871" comment="virt-v2v-man-pages-uk-1.42.0-22.module+el8.8.0+18611+5846c3aa is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1491" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for grub2		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830564" comment="grub2-common-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830565" comment="grub2-efi-ia32-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830566" comment="grub2-efi-ia32-cdboot-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830567" comment="grub2-efi-ia32-modules-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830568" comment="grub2-efi-x64-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830569" comment="grub2-efi-x64-cdboot-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830570" comment="grub2-efi-x64-modules-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830571" comment="grub2-pc-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830572" comment="grub2-pc-modules-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830573" comment="grub2-tools-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830574" comment="grub2-tools-efi-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830575" comment="grub2-tools-extra-2.02-86.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830576" comment="grub2-tools-minimal-2.02-86.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1492" version="1" class="patch">
	<metadata>
		<title>security update for fwupd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for fwupd		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830578" comment="fwupd-1.1.4-6.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830579" comment="fwupd-devel-1.1.4-6.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830580" comment="fwupd-tests-1.1.4-6.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1493" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for grub2		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830581" comment="grub2-common-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830582" comment="grub2-efi-ia32-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830583" comment="grub2-efi-ia32-cdboot-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830584" comment="grub2-efi-ia32-modules-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830585" comment="grub2-efi-x64-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830586" comment="grub2-efi-x64-cdboot-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830587" comment="grub2-efi-x64-modules-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830588" comment="grub2-pc-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830589" comment="grub2-pc-modules-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830590" comment="grub2-tools-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830591" comment="grub2-tools-efi-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830592" comment="grub2-tools-extra-2.02-87.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830593" comment="grub2-tools-minimal-2.02-87.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1494" version="1" class="patch">
	<metadata>
		<title>Low: gnome-software and fwupd security, bug fix, and enhancement update for RES8-AS-x86_64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  gnome-software and fwupd security, bug fix, and enhancement update for RES8-AS-x86_64		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830594" comment="appstream-data-8-20200724.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830595" comment="gnome-software-3.36.1-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1495" version="1" class="patch">
	<metadata>
		<title>Low: gnome-software and fwupd security, bug fix, and enhancement update for RES8-x86_64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  gnome-software and fwupd security, bug fix, and enhancement update for RES8-x86_64		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830596" comment="fwupd-1.4.2-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1496" version="1" class="patch">
	<metadata>
		<title>Low: evolution security and bug fix update for RES8-AS-x86_64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  evolution security and bug fix update for RES8-AS-x86_64		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830597" comment="bogofilter-1.2.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830598" comment="evolution-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830599" comment="evolution-bogofilter-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830600" comment="evolution-data-server-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830601" comment="evolution-data-server-devel-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830602" comment="evolution-data-server-langpacks-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830603" comment="evolution-help-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830604" comment="evolution-langpacks-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830605" comment="evolution-mapi-3.28.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830606" comment="evolution-mapi-langpacks-3.28.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830607" comment="evolution-pst-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830608" comment="evolution-spamassassin-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830609" comment="openchange-2.3-26.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1497" version="1" class="patch">
	<metadata>
		<title>Low: evolution security and bug fix update for RES8-CB-x86_64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  evolution security and bug fix update for RES8-CB-x86_64		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830610" comment="evolution-data-server-doc-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830611" comment="evolution-data-server-perl-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830612" comment="evolution-data-server-tests-3.28.5-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830613" comment="evolution-devel-3.28.5-14.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1498" version="1" class="patch">
	<metadata>
		<title>Moderate: GNOME security, bug fix, and enhancement update for RES8-AS-x86_64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  GNOME security, bug fix, and enhancement update for RES8-AS-x86_64		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830614" comment="LibRaw-0.19.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830615" comment="LibRaw-samples-0.19.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830616" comment="LibRaw-static-0.19.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830617" comment="PackageKit-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830618" comment="PackageKit-command-not-found-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830619" comment="PackageKit-cron-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830620" comment="PackageKit-glib-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830621" comment="PackageKit-gstreamer-plugin-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830622" comment="PackageKit-gtk3-module-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830623" comment="dleyna-renderer-0.6.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830624" comment="dleyna-renderer-devel-0.6.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830625" comment="frei0r-plugins-1.6.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830626" comment="frei0r-plugins-opencv-1.6.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830627" comment="gdm-3.28.3-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830628" comment="gdm-devel-3.28.3-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830629" comment="gdm-pam-extensions-devel-3.28.3-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830630" comment="gnome-classic-session-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830631" comment="gnome-control-center-3.28.2-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830632" comment="gnome-control-center-filesystem-3.28.2-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830633" comment="gnome-photos-3.28.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830634" comment="gnome-photos-tests-3.28.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830635" comment="gnome-remote-desktop-0.1.8-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830636" comment="gnome-session-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830637" comment="gnome-session-kiosk-session-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830638" comment="gnome-session-wayland-session-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830639" comment="gnome-session-xsession-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830640" comment="gnome-settings-daemon-3.32.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830641" comment="gnome-settings-daemon-devel-3.32.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830642" comment="gnome-shell-3.32.2-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830643" comment="gnome-shell-extension-apps-menu-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830644" comment="gnome-shell-extension-auto-move-windows-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830645" comment="gnome-shell-extension-common-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830646" comment="gnome-shell-extension-dash-to-dock-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830647" comment="gnome-shell-extension-desktop-icons-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830648" comment="gnome-shell-extension-disable-screenshield-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830649" comment="gnome-shell-extension-drive-menu-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830650" comment="gnome-shell-extension-horizontal-workspaces-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830651" comment="gnome-shell-extension-launch-new-instance-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830652" comment="gnome-shell-extension-native-window-placement-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830653" comment="gnome-shell-extension-no-hot-corner-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830654" comment="gnome-shell-extension-panel-favorites-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830655" comment="gnome-shell-extension-places-menu-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830656" comment="gnome-shell-extension-screenshot-window-sizer-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830657" comment="gnome-shell-extension-systemMonitor-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830658" comment="gnome-shell-extension-top-icons-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830659" comment="gnome-shell-extension-updates-dialog-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830660" comment="gnome-shell-extension-user-theme-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830661" comment="gnome-shell-extension-window-grouper-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830662" comment="gnome-shell-extension-window-list-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830663" comment="gnome-shell-extension-windowsNavigator-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830664" comment="gnome-shell-extension-workspace-indicator-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830665" comment="gnome-terminal-3.28.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830666" comment="gnome-terminal-nautilus-3.28.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830667" comment="gsettings-desktop-schemas-3.32.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830668" comment="gsettings-desktop-schemas-devel-3.32.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830669" comment="gtk-update-icon-cache-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830670" comment="gtk3-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830671" comment="gtk3-devel-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830672" comment="gtk3-devel-docs-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830673" comment="gtk3-immodule-xim-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830674" comment="gtk3-immodules-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830675" comment="gtk3-tests-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830676" comment="gvfs-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830677" comment="gvfs-afc-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830678" comment="gvfs-afp-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830679" comment="gvfs-archive-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830680" comment="gvfs-client-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830681" comment="gvfs-devel-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830682" comment="gvfs-fuse-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830683" comment="gvfs-goa-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830684" comment="gvfs-gphoto2-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830685" comment="gvfs-mtp-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830686" comment="gvfs-smb-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830687" comment="gvfs-tests-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830688" comment="mutter-3.32.2-48.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830689" comment="mutter-tests-3.32.2-48.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830690" comment="nautilus-3.28.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830691" comment="nautilus-extensions-3.28.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830692" comment="pipewire-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830693" comment="pipewire-alsa-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830694" comment="pipewire-devel-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830695" comment="pipewire-doc-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830696" comment="pipewire-gstreamer-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830697" comment="pipewire-libs-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830698" comment="pipewire-utils-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830699" comment="pipewire0.2-devel-0.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830700" comment="pipewire0.2-libs-0.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830701" comment="potrace-1.15-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830702" comment="potrace-devel-1.15-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830703" comment="potrace-doc-1.15-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830704" comment="tracker-2.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830705" comment="tracker-devel-2.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830706" comment="tracker-docs-2.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830707" comment="vte-profile-0.52.4-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830708" comment="vte291-0.52.4-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830709" comment="webkit2gtk3-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830710" comment="webkit2gtk3-devel-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830711" comment="webkit2gtk3-doc-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830712" comment="webkit2gtk3-jsc-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830713" comment="webkit2gtk3-jsc-devel-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830714" comment="webrtc-audio-processing-0.3-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830715" comment="webrtc-audio-processing-devel-0.3-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830716" comment="xdg-desktop-portal-1.6.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830717" comment="xdg-desktop-portal-devel-1.6.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830718" comment="xdg-desktop-portal-gtk-1.6.0-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1499" version="1" class="patch">
	<metadata>
		<title>Moderate: GNOME security, bug fix, and enhancement update for RES8-CB-x86_64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  GNOME security, bug fix, and enhancement update for RES8-CB-x86_64		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830719" comment="LibRaw-devel-0.19.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830720" comment="PackageKit-glib-devel-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830721" comment="frei0r-devel-1.6.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830625" comment="frei0r-plugins-1.6.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830722" comment="gtk-doc-1.28-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830676" comment="gvfs-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830723" comment="mutter-devel-3.32.2-48.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830690" comment="nautilus-3.28.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830724" comment="nautilus-devel-3.28.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830725" comment="pygobject3-devel-3.28.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830726" comment="vte291-devel-0.52.4-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1500" version="1" class="patch">
	<metadata>
		<title>Moderate: GNOME security, bug fix, and enhancement update for RES8-x86_64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  GNOME security, bug fix, and enhancement update for RES8-x86_64		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830667" comment="gsettings-desktop-schemas-3.32.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830727" comment="libsoup-2.62.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830728" comment="libsoup-devel-2.62.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830729" comment="python3-gobject-3.28.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830730" comment="python3-gobject-base-3.28.3-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1501" version="1" class="patch">
	<metadata>
		<title>Moderate: virt:rhel and security, bug fix, and enhancement update for RES8-x86_64 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  virt:rhel and security, bug fix, and enhancement update for RES8-x86_64		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830731" comment="hivex-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830732" comment="hivex-devel-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830733" comment="libguestfs-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830734" comment="libguestfs-bash-completion-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830735" comment="libguestfs-benchmarking-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830736" comment="libguestfs-devel-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830737" comment="libguestfs-gfs2-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830738" comment="libguestfs-gobject-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830739" comment="libguestfs-gobject-devel-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830740" comment="libguestfs-inspect-icons-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830741" comment="libguestfs-java-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830742" comment="libguestfs-java-devel-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830743" comment="libguestfs-javadoc-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830744" comment="libguestfs-man-pages-ja-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830745" comment="libguestfs-man-pages-uk-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830746" comment="libguestfs-rescue-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830747" comment="libguestfs-rsync-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830748" comment="libguestfs-tools-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830749" comment="libguestfs-tools-c-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830750" comment="libguestfs-winsupport-8.2-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830751" comment="libguestfs-xfs-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830752" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830753" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830754" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830755" comment="libnbd-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830756" comment="libnbd-devel-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830757" comment="libvirt-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830758" comment="libvirt-admin-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830759" comment="libvirt-bash-completion-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830760" comment="libvirt-client-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830761" comment="libvirt-daemon-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830762" comment="libvirt-daemon-config-network-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830763" comment="libvirt-daemon-config-nwfilter-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830764" comment="libvirt-daemon-driver-interface-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830765" comment="libvirt-daemon-driver-network-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830766" comment="libvirt-daemon-driver-nodedev-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830767" comment="libvirt-daemon-driver-nwfilter-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830768" comment="libvirt-daemon-driver-qemu-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830769" comment="libvirt-daemon-driver-secret-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830770" comment="libvirt-daemon-driver-storage-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830771" comment="libvirt-daemon-driver-storage-core-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830772" comment="libvirt-daemon-driver-storage-disk-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830773" comment="libvirt-daemon-driver-storage-gluster-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830774" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830775" comment="libvirt-daemon-driver-storage-iscsi-direct-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830776" comment="libvirt-daemon-driver-storage-logical-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830777" comment="libvirt-daemon-driver-storage-mpath-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830778" comment="libvirt-daemon-driver-storage-rbd-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830779" comment="libvirt-daemon-driver-storage-scsi-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830780" comment="libvirt-daemon-kvm-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830781" comment="libvirt-dbus-1.3.0-2.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830782" comment="libvirt-devel-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830783" comment="libvirt-docs-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830784" comment="libvirt-libs-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830785" comment="libvirt-lock-sanlock-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830786" comment="libvirt-nss-6.0.0-28.module+el8.3.0+7827+5e65edd7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830787" comment="lua-guestfs-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830788" comment="nbdfuse-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830789" comment="nbdkit-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830790" comment="nbdkit-bash-completion-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830791" comment="nbdkit-basic-filters-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830792" comment="nbdkit-basic-plugins-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830793" comment="nbdkit-curl-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830794" comment="nbdkit-devel-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830795" comment="nbdkit-example-plugins-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830796" comment="nbdkit-gzip-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830797" comment="nbdkit-linuxdisk-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830798" comment="nbdkit-python-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830799" comment="nbdkit-server-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830800" comment="nbdkit-ssh-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830801" comment="nbdkit-vddk-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830802" comment="nbdkit-xz-filter-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830803" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830804" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830805" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830806" comment="perl-Sys-Guestfs-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830807" comment="perl-Sys-Virt-6.0.0-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830808" comment="perl-hivex-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830809" comment="python3-hivex-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830810" comment="python3-libguestfs-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830811" comment="python3-libnbd-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830812" comment="python3-libvirt-6.0.0-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830813" comment="qemu-guest-agent-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830814" comment="qemu-img-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830815" comment="qemu-kvm-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830816" comment="qemu-kvm-block-curl-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830817" comment="qemu-kvm-block-gluster-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830818" comment="qemu-kvm-block-iscsi-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830819" comment="qemu-kvm-block-rbd-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830820" comment="qemu-kvm-block-ssh-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830821" comment="qemu-kvm-common-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830822" comment="qemu-kvm-core-4.2.0-34.module+el8.3.0+7976+077be4ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830823" comment="ruby-hivex-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830824" comment="ruby-libguestfs-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830825" comment="seabios-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830826" comment="seabios-bin-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830827" comment="seavgabios-bin-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830828" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830830" comment="supermin-5.1.19-10.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830831" comment="supermin-devel-5.1.19-10.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830832" comment="virt-dib-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830833" comment="virt-v2v-1.40.2-25.module+el8.3.0+7421+642fe24f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1502" version="1" class="patch">
	<metadata>
		<title>Important: mariadb:10.3 security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  mariadb:10.3 security update		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830834" comment="Judy-1.0.5-18.module+el8+2765+cfa4f87b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830835" comment="galera-25.3.32-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830836" comment="mariadb-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830837" comment="mariadb-backup-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830838" comment="mariadb-common-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830839" comment="mariadb-devel-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830840" comment="mariadb-embedded-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830841" comment="mariadb-embedded-devel-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830842" comment="mariadb-errmsg-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830843" comment="mariadb-gssapi-server-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830844" comment="mariadb-oqgraph-engine-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830845" comment="mariadb-server-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830846" comment="mariadb-server-galera-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830847" comment="mariadb-server-utils-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830848" comment="mariadb-test-10.3.28-1.module+el8.3.0+10472+7adc332a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1503" version="1" class="patch">
	<metadata>
		<title>security update for virt:rhel security, bug fix, and enhancement update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: rhel security, bug fix, and enhancement update		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830731" comment="hivex-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830732" comment="hivex-devel-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830849" comment="libguestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830850" comment="libguestfs-bash-completion-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830851" comment="libguestfs-benchmarking-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830852" comment="libguestfs-devel-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830853" comment="libguestfs-gfs2-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830854" comment="libguestfs-gobject-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830855" comment="libguestfs-gobject-devel-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830856" comment="libguestfs-inspect-icons-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830857" comment="libguestfs-java-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830858" comment="libguestfs-java-devel-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830859" comment="libguestfs-javadoc-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830860" comment="libguestfs-man-pages-ja-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830861" comment="libguestfs-man-pages-uk-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830862" comment="libguestfs-rescue-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830863" comment="libguestfs-rsync-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830864" comment="libguestfs-tools-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830865" comment="libguestfs-tools-c-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830750" comment="libguestfs-winsupport-8.2-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830866" comment="libguestfs-xfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830752" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830753" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830754" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830755" comment="libnbd-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830756" comment="libnbd-devel-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830867" comment="libvirt-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830868" comment="libvirt-admin-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830869" comment="libvirt-bash-completion-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830870" comment="libvirt-client-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830871" comment="libvirt-daemon-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830872" comment="libvirt-daemon-config-network-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830873" comment="libvirt-daemon-config-nwfilter-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830874" comment="libvirt-daemon-driver-interface-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830875" comment="libvirt-daemon-driver-network-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830876" comment="libvirt-daemon-driver-nodedev-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830877" comment="libvirt-daemon-driver-nwfilter-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830878" comment="libvirt-daemon-driver-qemu-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830879" comment="libvirt-daemon-driver-secret-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830880" comment="libvirt-daemon-driver-storage-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830881" comment="libvirt-daemon-driver-storage-core-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830882" comment="libvirt-daemon-driver-storage-disk-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830883" comment="libvirt-daemon-driver-storage-gluster-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830884" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830885" comment="libvirt-daemon-driver-storage-iscsi-direct-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830886" comment="libvirt-daemon-driver-storage-logical-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830887" comment="libvirt-daemon-driver-storage-mpath-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830888" comment="libvirt-daemon-driver-storage-rbd-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830889" comment="libvirt-daemon-driver-storage-scsi-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830890" comment="libvirt-daemon-kvm-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830781" comment="libvirt-dbus-1.3.0-2.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830891" comment="libvirt-devel-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830892" comment="libvirt-docs-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830893" comment="libvirt-libs-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830894" comment="libvirt-lock-sanlock-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830895" comment="libvirt-nss-6.0.0-35.module+el8.4.0+10230+7a9b21e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830896" comment="lua-guestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830788" comment="nbdfuse-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830789" comment="nbdkit-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830790" comment="nbdkit-bash-completion-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830791" comment="nbdkit-basic-filters-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830792" comment="nbdkit-basic-plugins-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830793" comment="nbdkit-curl-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830794" comment="nbdkit-devel-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830795" comment="nbdkit-example-plugins-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830796" comment="nbdkit-gzip-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830797" comment="nbdkit-linuxdisk-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830798" comment="nbdkit-python-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830799" comment="nbdkit-server-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830800" comment="nbdkit-ssh-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830801" comment="nbdkit-vddk-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830802" comment="nbdkit-xz-filter-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830803" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830804" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830805" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830897" comment="perl-Sys-Guestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830807" comment="perl-Sys-Virt-6.0.0-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830808" comment="perl-hivex-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830809" comment="python3-hivex-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830898" comment="python3-libguestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830811" comment="python3-libnbd-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830812" comment="python3-libvirt-6.0.0-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830899" comment="qemu-guest-agent-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830900" comment="qemu-img-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830901" comment="qemu-kvm-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830902" comment="qemu-kvm-block-curl-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830903" comment="qemu-kvm-block-gluster-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830904" comment="qemu-kvm-block-iscsi-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830905" comment="qemu-kvm-block-rbd-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830906" comment="qemu-kvm-block-ssh-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830907" comment="qemu-kvm-common-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830908" comment="qemu-kvm-core-4.2.0-48.module+el8.4.0+10368+630e803b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830823" comment="ruby-hivex-1.3.18-20.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830909" comment="ruby-libguestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830825" comment="seabios-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830826" comment="seabios-bin-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830827" comment="seavgabios-bin-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830828" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830830" comment="supermin-5.1.19-10.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830831" comment="supermin-devel-5.1.19-10.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830910" comment="virt-dib-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830911" comment="virt-v2v-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1504" version="1" class="patch">
	<metadata>
		<title>security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for shim		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830912" comment="shim-ia32-15.4-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830913" comment="shim-x64-15.4-2.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1505" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for 		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830914" comment="python38-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830915" comment="python38-Cython-0.29.14-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830916" comment="python38-PyMySQL-0.10.1-1.module+el8.4.0+9692+8e86ab84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830917" comment="python38-asn1crypto-1.2.0-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830918" comment="python38-babel-2.7.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830919" comment="python38-cffi-1.13.2-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830920" comment="python38-chardet-3.0.4-19.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830921" comment="python38-cryptography-2.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830922" comment="python38-debug-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830923" comment="python38-devel-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830924" comment="python38-idle-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830925" comment="python38-idna-2.8-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830926" comment="python38-jinja2-2.10.3-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830927" comment="python38-libs-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830928" comment="python38-lxml-4.4.1-5.module+el8.4.0+9001+fc421f6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830929" comment="python38-markupsafe-1.1.1-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830930" comment="python38-mod_wsgi-4.6.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830931" comment="python38-numpy-1.17.3-5.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830932" comment="python38-numpy-doc-1.17.3-5.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830933" comment="python38-numpy-f2py-1.17.3-5.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830934" comment="python38-pip-19.3.1-1.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830935" comment="python38-pip-wheel-19.3.1-1.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830936" comment="python38-ply-3.11-10.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830937" comment="python38-psutil-5.6.4-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830938" comment="python38-psycopg2-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830939" comment="python38-psycopg2-doc-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830940" comment="python38-psycopg2-tests-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830941" comment="python38-pycparser-2.19-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830942" comment="python38-pysocks-1.7.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830943" comment="python38-pytz-2019.3-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830944" comment="python38-pyyaml-5.4.1-1.module+el8.4.0+10706+5c295a3e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830945" comment="python38-requests-2.22.0-9.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830946" comment="python38-rpm-macros-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830947" comment="python38-scipy-1.3.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830948" comment="python38-setuptools-41.6.0-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830949" comment="python38-setuptools-wheel-41.6.0-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830950" comment="python38-six-1.12.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830951" comment="python38-test-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830952" comment="python38-tkinter-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830953" comment="python38-urllib3-1.25.7-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830954" comment="python38-wheel-0.33.6-5.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830955" comment="python38-wheel-wheel-0.33.6-5.module+el8.4.0+8888+89bc7e79 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1506" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for 		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830956" comment="hivex-1.3.18-21.module+el8.4.0+10770+19c037f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830957" comment="hivex-devel-1.3.18-21.module+el8.4.0+10770+19c037f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830849" comment="libguestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830850" comment="libguestfs-bash-completion-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830851" comment="libguestfs-benchmarking-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830852" comment="libguestfs-devel-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830853" comment="libguestfs-gfs2-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830854" comment="libguestfs-gobject-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830855" comment="libguestfs-gobject-devel-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830856" comment="libguestfs-inspect-icons-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830857" comment="libguestfs-java-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830858" comment="libguestfs-java-devel-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830859" comment="libguestfs-javadoc-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830860" comment="libguestfs-man-pages-ja-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830861" comment="libguestfs-man-pages-uk-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830862" comment="libguestfs-rescue-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830863" comment="libguestfs-rsync-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830864" comment="libguestfs-tools-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830865" comment="libguestfs-tools-c-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830750" comment="libguestfs-winsupport-8.2-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830866" comment="libguestfs-xfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830752" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830753" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830754" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830755" comment="libnbd-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830756" comment="libnbd-devel-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830958" comment="libvirt-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830959" comment="libvirt-admin-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830960" comment="libvirt-bash-completion-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830961" comment="libvirt-client-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830962" comment="libvirt-daemon-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830963" comment="libvirt-daemon-config-network-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830964" comment="libvirt-daemon-config-nwfilter-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830965" comment="libvirt-daemon-driver-interface-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830966" comment="libvirt-daemon-driver-network-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830967" comment="libvirt-daemon-driver-nodedev-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830968" comment="libvirt-daemon-driver-nwfilter-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830969" comment="libvirt-daemon-driver-qemu-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830970" comment="libvirt-daemon-driver-secret-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830971" comment="libvirt-daemon-driver-storage-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830972" comment="libvirt-daemon-driver-storage-core-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830973" comment="libvirt-daemon-driver-storage-disk-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830974" comment="libvirt-daemon-driver-storage-gluster-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830975" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830976" comment="libvirt-daemon-driver-storage-iscsi-direct-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830977" comment="libvirt-daemon-driver-storage-logical-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830978" comment="libvirt-daemon-driver-storage-mpath-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830979" comment="libvirt-daemon-driver-storage-rbd-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830980" comment="libvirt-daemon-driver-storage-scsi-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830981" comment="libvirt-daemon-kvm-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830781" comment="libvirt-dbus-1.3.0-2.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830982" comment="libvirt-devel-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830983" comment="libvirt-docs-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830984" comment="libvirt-libs-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830985" comment="libvirt-lock-sanlock-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830986" comment="libvirt-nss-6.0.0-35.1.module+el8.4.0+11273+64eb94ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830896" comment="lua-guestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830788" comment="nbdfuse-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830789" comment="nbdkit-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830790" comment="nbdkit-bash-completion-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830791" comment="nbdkit-basic-filters-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830792" comment="nbdkit-basic-plugins-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830793" comment="nbdkit-curl-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830794" comment="nbdkit-devel-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830795" comment="nbdkit-example-plugins-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830796" comment="nbdkit-gzip-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830797" comment="nbdkit-linuxdisk-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830798" comment="nbdkit-python-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830799" comment="nbdkit-server-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830800" comment="nbdkit-ssh-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830801" comment="nbdkit-vddk-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830802" comment="nbdkit-xz-filter-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830803" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830804" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830805" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830897" comment="perl-Sys-Guestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830807" comment="perl-Sys-Virt-6.0.0-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830987" comment="perl-hivex-1.3.18-21.module+el8.4.0+10770+19c037f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830988" comment="python3-hivex-1.3.18-21.module+el8.4.0+10770+19c037f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830898" comment="python3-libguestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830811" comment="python3-libnbd-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830812" comment="python3-libvirt-6.0.0-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830989" comment="qemu-guest-agent-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830990" comment="qemu-img-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830991" comment="qemu-kvm-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830992" comment="qemu-kvm-block-curl-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830993" comment="qemu-kvm-block-gluster-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830994" comment="qemu-kvm-block-iscsi-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830995" comment="qemu-kvm-block-rbd-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830996" comment="qemu-kvm-block-ssh-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830997" comment="qemu-kvm-common-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830998" comment="qemu-kvm-core-4.2.0-48.module+el8.4.0+11909+3300d70f.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830999" comment="ruby-hivex-1.3.18-21.module+el8.4.0+10770+19c037f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830909" comment="ruby-libguestfs-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830825" comment="seabios-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830826" comment="seabios-bin-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830827" comment="seavgabios-bin-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830828" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830830" comment="supermin-5.1.19-10.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830831" comment="supermin-devel-5.1.19-10.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830910" comment="virt-dib-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830911" comment="virt-v2v-1.40.2-27.module+el8.4.0+9282+0bdec052 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1507" version="1" class="patch">
	<metadata>
		<title>security update for Moderate: virt:rhel security, bug fix, and enhancement update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update:  virt:rhel security, bug fix, and enhancement update		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831000" comment="hivex-1.3.18-21.module+el8.5.0+10709+b3edb581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831001" comment="hivex-devel-1.3.18-21.module+el8.5.0+10709+b3edb581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831002" comment="libguestfs-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831003" comment="libguestfs-bash-completion-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831004" comment="libguestfs-benchmarking-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831005" comment="libguestfs-devel-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831006" comment="libguestfs-gfs2-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831007" comment="libguestfs-gobject-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831008" comment="libguestfs-gobject-devel-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831009" comment="libguestfs-inspect-icons-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831010" comment="libguestfs-java-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831011" comment="libguestfs-java-devel-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831012" comment="libguestfs-javadoc-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831013" comment="libguestfs-man-pages-ja-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831014" comment="libguestfs-man-pages-uk-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831015" comment="libguestfs-rescue-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831016" comment="libguestfs-rsync-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831017" comment="libguestfs-tools-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831018" comment="libguestfs-tools-c-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830750" comment="libguestfs-winsupport-8.2-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831019" comment="libguestfs-xfs-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830752" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830753" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830754" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830755" comment="libnbd-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830756" comment="libnbd-devel-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831020" comment="libvirt-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831021" comment="libvirt-admin-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831022" comment="libvirt-bash-completion-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831023" comment="libvirt-client-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831024" comment="libvirt-daemon-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831025" comment="libvirt-daemon-config-network-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831026" comment="libvirt-daemon-config-nwfilter-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831027" comment="libvirt-daemon-driver-interface-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831028" comment="libvirt-daemon-driver-network-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831029" comment="libvirt-daemon-driver-nodedev-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831030" comment="libvirt-daemon-driver-nwfilter-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831031" comment="libvirt-daemon-driver-qemu-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831032" comment="libvirt-daemon-driver-secret-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831033" comment="libvirt-daemon-driver-storage-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831034" comment="libvirt-daemon-driver-storage-core-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831035" comment="libvirt-daemon-driver-storage-disk-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831036" comment="libvirt-daemon-driver-storage-gluster-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831037" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831038" comment="libvirt-daemon-driver-storage-iscsi-direct-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831039" comment="libvirt-daemon-driver-storage-logical-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831040" comment="libvirt-daemon-driver-storage-mpath-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831041" comment="libvirt-daemon-driver-storage-rbd-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831042" comment="libvirt-daemon-driver-storage-scsi-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831043" comment="libvirt-daemon-kvm-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830781" comment="libvirt-dbus-1.3.0-2.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831044" comment="libvirt-devel-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831045" comment="libvirt-docs-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831046" comment="libvirt-libs-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831047" comment="libvirt-lock-sanlock-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831048" comment="libvirt-nss-6.0.0-37.module+el8.5.0+12162+40884dd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831049" comment="lua-guestfs-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830788" comment="nbdfuse-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830789" comment="nbdkit-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830790" comment="nbdkit-bash-completion-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830791" comment="nbdkit-basic-filters-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830792" comment="nbdkit-basic-plugins-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830793" comment="nbdkit-curl-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830794" comment="nbdkit-devel-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830795" comment="nbdkit-example-plugins-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830796" comment="nbdkit-gzip-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830797" comment="nbdkit-linuxdisk-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830798" comment="nbdkit-python-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830799" comment="nbdkit-server-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830800" comment="nbdkit-ssh-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830801" comment="nbdkit-vddk-plugin-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830802" comment="nbdkit-xz-filter-1.16.2-4.module+el8.3.0+6922+fd575af8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830803" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830804" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830805" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831050" comment="perl-Sys-Guestfs-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830807" comment="perl-Sys-Virt-6.0.0-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831051" comment="perl-hivex-1.3.18-21.module+el8.5.0+10709+b3edb581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831052" comment="python3-hivex-1.3.18-21.module+el8.5.0+10709+b3edb581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831053" comment="python3-libguestfs-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830811" comment="python3-libnbd-1.2.2-1.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830812" comment="python3-libvirt-6.0.0-1.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831054" comment="qemu-guest-agent-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831055" comment="qemu-img-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831056" comment="qemu-kvm-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831057" comment="qemu-kvm-block-curl-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831058" comment="qemu-kvm-block-gluster-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831059" comment="qemu-kvm-block-iscsi-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831060" comment="qemu-kvm-block-rbd-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831061" comment="qemu-kvm-block-ssh-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831062" comment="qemu-kvm-common-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831063" comment="qemu-kvm-core-4.2.0-59.module+el8.5.0+12817+cb650d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831064" comment="ruby-hivex-1.3.18-21.module+el8.5.0+10709+b3edb581 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831065" comment="ruby-libguestfs-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830825" comment="seabios-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830826" comment="seabios-bin-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830827" comment="seavgabios-bin-1.13.0-2.module+el8.3.0+7353+9de0a3cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830828" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830830" comment="supermin-5.1.19-10.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830831" comment="supermin-devel-5.1.19-10.module+el8.3.0+6423+e4cb6418 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831066" comment="virt-dib-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831067" comment="virt-v2v-1.40.2-28.module+el8.5.0+10717+67be7ac4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1508" version="1" class="patch">
	<metadata>
		<title>security update for python38:3.8 module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: 3.8 module		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831068" comment="python38-3.8.8-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830915" comment="python38-Cython-0.29.14-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830916" comment="python38-PyMySQL-0.10.1-1.module+el8.4.0+9692+8e86ab84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830917" comment="python38-asn1crypto-1.2.0-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831069" comment="python38-babel-2.7.0-11.module+el8.5.0+11015+9c1c7c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830919" comment="python38-cffi-1.13.2-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830920" comment="python38-chardet-3.0.4-19.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830921" comment="python38-cryptography-2.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831070" comment="python38-debug-3.8.8-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831071" comment="python38-devel-3.8.8-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831072" comment="python38-idle-3.8.8-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830925" comment="python38-idna-2.8-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831073" comment="python38-jinja2-2.10.3-5.module+el8.5.0+10542+ba057329 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831074" comment="python38-libs-3.8.8-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831075" comment="python38-lxml-4.4.1-6.module+el8.5.0+10542+ba057329 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830929" comment="python38-markupsafe-1.1.1-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830930" comment="python38-mod_wsgi-4.6.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831076" comment="python38-numpy-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831077" comment="python38-numpy-doc-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831078" comment="python38-numpy-f2py-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831079" comment="python38-pip-19.3.1-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831080" comment="python38-pip-wheel-19.3.1-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830936" comment="python38-ply-3.11-10.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831081" comment="python38-psutil-5.6.4-4.module+el8.5.0+12031+10ce4870 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830938" comment="python38-psycopg2-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830939" comment="python38-psycopg2-doc-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830940" comment="python38-psycopg2-tests-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830941" comment="python38-pycparser-2.19-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830942" comment="python38-pysocks-1.7.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830943" comment="python38-pytz-2019.3-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831082" comment="python38-pyyaml-5.4.1-1.module+el8.5.0+10721+14d8e0d5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830945" comment="python38-requests-2.22.0-9.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831083" comment="python38-rpm-macros-3.8.8-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830947" comment="python38-scipy-1.3.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831084" comment="python38-setuptools-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831085" comment="python38-setuptools-wheel-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830950" comment="python38-six-1.12.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831086" comment="python38-test-3.8.8-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831087" comment="python38-tkinter-3.8.8-4.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831088" comment="python38-urllib3-1.25.7-5.module+el8.5.0+11639+ea5b349d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831089" comment="python38-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831090" comment="python38-wheel-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1509" version="1" class="patch">
	<metadata>
		<title>security update for python39:3.9 module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: 3.9 module		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831091" comment="python39-3.9.6-2.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831092" comment="python39-PyMySQL-0.10.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831093" comment="python39-cffi-1.14.3-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831094" comment="python39-chardet-3.0.4-19.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831095" comment="python39-cryptography-3.3.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831096" comment="python39-devel-3.9.6-2.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831097" comment="python39-idle-3.9.6-2.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831098" comment="python39-idna-2.10-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831099" comment="python39-libs-3.9.6-2.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831100" comment="python39-lxml-4.6.2-3.module+el8.5.0+10536+a233b742 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831101" comment="python39-mod_wsgi-4.7.1-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831102" comment="python39-numpy-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831103" comment="python39-numpy-doc-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831104" comment="python39-numpy-f2py-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831105" comment="python39-pip-20.2.4-6.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831106" comment="python39-pip-wheel-20.2.4-6.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831107" comment="python39-ply-3.11-10.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831108" comment="python39-psutil-5.8.0-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831109" comment="python39-psycopg2-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831110" comment="python39-psycopg2-doc-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831111" comment="python39-psycopg2-tests-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831112" comment="python39-pycparser-2.20-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831113" comment="python39-pysocks-1.7.1-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831114" comment="python39-pyyaml-5.4.1-1.module+el8.5.0+10613+59a13ec4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831115" comment="python39-requests-2.25.0-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831116" comment="python39-rpm-macros-3.9.6-2.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831117" comment="python39-scipy-1.5.4-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831118" comment="python39-setuptools-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831119" comment="python39-setuptools-wheel-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831120" comment="python39-six-1.15.0-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831121" comment="python39-test-3.9.6-2.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831122" comment="python39-tkinter-3.9.6-2.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831123" comment="python39-toml-0.10.1-5.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831124" comment="python39-urllib3-1.25.10-4.module+el8.5.0+11712+ea2d2be1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831125" comment="python39-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831126" comment="python39-wheel-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1510" version="1" class="patch">
	<metadata>
		<title>SLES ES build of RHSA-2022:0258 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: 0258		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831127" comment="httpd-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831128" comment="httpd-devel-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831129" comment="httpd-filesystem-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831130" comment="httpd-manual-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831131" comment="httpd-tools-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831132" comment="mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831133" comment="mod_ldap-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831135" comment="mod_proxy_html-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831136" comment="mod_session-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831137" comment="mod_ssl-2.4.37-43.module+el8.5.0+13806+b30d9eec.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1511" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for 		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831138" comment="python38-3.8.12-1.module+el8.6.0+12642+c3710b74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830915" comment="python38-Cython-0.29.14-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830916" comment="python38-PyMySQL-0.10.1-1.module+el8.4.0+9692+8e86ab84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830917" comment="python38-asn1crypto-1.2.0-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831069" comment="python38-babel-2.7.0-11.module+el8.5.0+11015+9c1c7c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830919" comment="python38-cffi-1.13.2-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830920" comment="python38-chardet-3.0.4-19.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830921" comment="python38-cryptography-2.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831139" comment="python38-debug-3.8.12-1.module+el8.6.0+12642+c3710b74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831140" comment="python38-devel-3.8.12-1.module+el8.6.0+12642+c3710b74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831141" comment="python38-idle-3.8.12-1.module+el8.6.0+12642+c3710b74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830925" comment="python38-idna-2.8-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831073" comment="python38-jinja2-2.10.3-5.module+el8.5.0+10542+ba057329 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831142" comment="python38-libs-3.8.12-1.module+el8.6.0+12642+c3710b74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831143" comment="python38-lxml-4.4.1-7.module+el8.6.0+13958+214a5473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830929" comment="python38-markupsafe-1.1.1-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830930" comment="python38-mod_wsgi-4.6.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831076" comment="python38-numpy-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831077" comment="python38-numpy-doc-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831078" comment="python38-numpy-f2py-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831144" comment="python38-pip-19.3.1-5.module+el8.6.0+13002+70cfc74a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831145" comment="python38-pip-wheel-19.3.1-5.module+el8.6.0+13002+70cfc74a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830936" comment="python38-ply-3.11-10.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831081" comment="python38-psutil-5.6.4-4.module+el8.5.0+12031+10ce4870 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830938" comment="python38-psycopg2-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830939" comment="python38-psycopg2-doc-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830940" comment="python38-psycopg2-tests-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830941" comment="python38-pycparser-2.19-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830942" comment="python38-pysocks-1.7.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830943" comment="python38-pytz-2019.3-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831082" comment="python38-pyyaml-5.4.1-1.module+el8.5.0+10721+14d8e0d5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830945" comment="python38-requests-2.22.0-9.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831146" comment="python38-rpm-macros-3.8.12-1.module+el8.6.0+12642+c3710b74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830947" comment="python38-scipy-1.3.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831084" comment="python38-setuptools-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831085" comment="python38-setuptools-wheel-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830950" comment="python38-six-1.12.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831147" comment="python38-test-3.8.12-1.module+el8.6.0+12642+c3710b74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831148" comment="python38-tkinter-3.8.12-1.module+el8.6.0+12642+c3710b74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831088" comment="python38-urllib3-1.25.7-5.module+el8.5.0+11639+ea5b349d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831089" comment="python38-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831090" comment="python38-wheel-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1512" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for 		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831149" comment="python39-3.9.7-1.module+el8.6.0+12577+62b8d0a1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831092" comment="python39-PyMySQL-0.10.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831093" comment="python39-cffi-1.14.3-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831094" comment="python39-chardet-3.0.4-19.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831095" comment="python39-cryptography-3.3.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831150" comment="python39-devel-3.9.7-1.module+el8.6.0+12577+62b8d0a1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831151" comment="python39-idle-3.9.7-1.module+el8.6.0+12577+62b8d0a1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831098" comment="python39-idna-2.10-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831152" comment="python39-libs-3.9.7-1.module+el8.6.0+12577+62b8d0a1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831153" comment="python39-lxml-4.6.5-1.module+el8.6.0+13933+9cf0c87c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831101" comment="python39-mod_wsgi-4.7.1-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831102" comment="python39-numpy-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831103" comment="python39-numpy-doc-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831104" comment="python39-numpy-f2py-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831154" comment="python39-pip-20.2.4-7.module+el8.6.0+13003+6bb2c488 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831155" comment="python39-pip-wheel-20.2.4-7.module+el8.6.0+13003+6bb2c488 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831107" comment="python39-ply-3.11-10.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831108" comment="python39-psutil-5.8.0-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831109" comment="python39-psycopg2-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831110" comment="python39-psycopg2-doc-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831111" comment="python39-psycopg2-tests-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831112" comment="python39-pycparser-2.20-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831113" comment="python39-pysocks-1.7.1-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831114" comment="python39-pyyaml-5.4.1-1.module+el8.5.0+10613+59a13ec4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831115" comment="python39-requests-2.25.0-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831156" comment="python39-rpm-macros-3.9.7-1.module+el8.6.0+12577+62b8d0a1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831117" comment="python39-scipy-1.5.4-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831118" comment="python39-setuptools-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831119" comment="python39-setuptools-wheel-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831120" comment="python39-six-1.15.0-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831157" comment="python39-test-3.9.7-1.module+el8.6.0+12577+62b8d0a1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831158" comment="python39-tkinter-3.9.7-1.module+el8.6.0+12577+62b8d0a1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831123" comment="python39-toml-0.10.1-5.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831124" comment="python39-urllib3-1.25.10-4.module+el8.5.0+11712+ea2d2be1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831125" comment="python39-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831126" comment="python39-wheel-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1513" version="1" class="patch">
	<metadata>
		<title>security update for httpcomponents-client (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for httpcomponents-client		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831159" comment="aopalliance-1.0-17.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831160" comment="apache-commons-cli-1.4-4.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831161" comment="apache-commons-codec-1.11-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831162" comment="apache-commons-io-2.6-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831163" comment="apache-commons-lang3-3.7-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831164" comment="apache-commons-logging-1.2-13.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831165" comment="atinject-1-28.20100611svn86.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831166" comment="cdi-api-1.2-8.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831167" comment="geronimo-annotation-1.0-23.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831168" comment="glassfish-el-api-3.0.1-0.7.b08.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831169" comment="google-guice-4.1-11.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831170" comment="guava20-20.0-8.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831171" comment="hawtjni-runtime-1.16-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831172" comment="httpcomponents-client-4.5.5-5.module+el8.6.0+13298+7b5243c0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831173" comment="httpcomponents-core-4.4.10-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831174" comment="jansi-1.17.1-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831175" comment="jansi-native-1.7-7.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831176" comment="jboss-interceptors-1.2-api-1.0.0-8.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831177" comment="jcl-over-slf4j-1.7.25-4.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831178" comment="jsoup-1.11.3-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831179" comment="maven-3.5.4-5.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831180" comment="maven-lib-3.5.4-5.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831181" comment="maven-resolver-api-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831182" comment="maven-resolver-connector-basic-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831183" comment="maven-resolver-impl-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831184" comment="maven-resolver-spi-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831185" comment="maven-resolver-transport-wagon-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831186" comment="maven-resolver-util-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831187" comment="maven-shared-utils-3.2.1-0.2.module+el8.6.0+15045+b1156105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831188" comment="maven-wagon-file-3.1.0-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831189" comment="maven-wagon-http-3.1.0-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831190" comment="maven-wagon-http-shared-3.1.0-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831191" comment="maven-wagon-provider-api-3.1.0-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831192" comment="plexus-cipher-1.7-14.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831193" comment="plexus-classworlds-2.5.2-9.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831194" comment="plexus-containers-component-annotations-1.7.1-8.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831195" comment="plexus-interpolation-1.22-9.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831196" comment="plexus-sec-dispatcher-1.4-26.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831197" comment="plexus-utils-3.1.0-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831198" comment="sisu-inject-0.3.3-6.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831199" comment="sisu-plexus-0.3.3-6.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831200" comment="slf4j-1.7.25-4.module+el8+2452+b359bfcd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1514" version="1" class="patch">
	<metadata>
		<title>security update for jansi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
SLES Expanded Support platform 8 update: security update for jansi		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831201" comment="aopalliance-1.0-20.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831202" comment="apache-commons-cli-1.4-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831203" comment="apache-commons-codec-1.13-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831204" comment="apache-commons-io-2.6-6.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831205" comment="apache-commons-lang3-3.9-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831206" comment="atinject-1-31.20100611svn86.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831207" comment="cdi-api-2.0.1-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831208" comment="geronimo-annotation-1.0-26.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831209" comment="google-guice-4.2.2-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831210" comment="guava-28.1-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831211" comment="httpcomponents-client-4.5.10-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831212" comment="httpcomponents-core-4.4.12-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831213" comment="jansi-1.18-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831214" comment="jcl-over-slf4j-1.7.28-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831215" comment="jsoup-1.12.1-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831216" comment="jsr-305-0-0.25.20130910svn.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831217" comment="maven-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831218" comment="maven-lib-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831219" comment="maven-openjdk11-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831220" comment="maven-openjdk17-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831221" comment="maven-openjdk8-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831222" comment="maven-resolver-1.4.1-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831223" comment="maven-shared-utils-3.2.1-0.5.module+el8.6.0+15049+43453910 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831224" comment="maven-wagon-3.3.4-2.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831225" comment="plexus-cipher-1.7-17.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831226" comment="plexus-classworlds-2.6.0-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831227" comment="plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831228" comment="plexus-interpolation-1.26-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831229" comment="plexus-sec-dispatcher-1.4-29.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831230" comment="plexus-utils-3.3.0-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831231" comment="sisu-0.3.4-2.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831232" comment="slf4j-1.7.28-3.module+el8.6.0+13337+afcb49ec is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1515" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. 
Security Fix(es):

 python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) 

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831233" comment="python38-3.8.13-1.module+el8.7.0+15641+2ece4388 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830915" comment="python38-Cython-0.29.14-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830916" comment="python38-PyMySQL-0.10.1-1.module+el8.4.0+9692+8e86ab84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830917" comment="python38-asn1crypto-1.2.0-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831069" comment="python38-babel-2.7.0-11.module+el8.5.0+11015+9c1c7c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830919" comment="python38-cffi-1.13.2-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830920" comment="python38-chardet-3.0.4-19.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830921" comment="python38-cryptography-2.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831234" comment="python38-debug-3.8.13-1.module+el8.7.0+15641+2ece4388 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831235" comment="python38-devel-3.8.13-1.module+el8.7.0+15641+2ece4388 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831236" comment="python38-idle-3.8.13-1.module+el8.7.0+15641+2ece4388 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830925" comment="python38-idna-2.8-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831237" comment="python38-jinja2-2.11.3-1.module+el8.7.0+15575+d005caff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831238" comment="python38-libs-3.8.13-1.module+el8.7.0+15641+2ece4388 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831143" comment="python38-lxml-4.4.1-7.module+el8.6.0+13958+214a5473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830929" comment="python38-markupsafe-1.1.1-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831239" comment="python38-mod_wsgi-4.6.8-4.module+el8.7.0+16653+23ccaf52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831076" comment="python38-numpy-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831077" comment="python38-numpy-doc-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831078" comment="python38-numpy-f2py-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831240" comment="python38-pip-19.3.1-6.module+el8.7.0+15823+8950cfa7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831241" comment="python38-pip-wheel-19.3.1-6.module+el8.7.0+15823+8950cfa7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830936" comment="python38-ply-3.11-10.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831081" comment="python38-psutil-5.6.4-4.module+el8.5.0+12031+10ce4870 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830938" comment="python38-psycopg2-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830939" comment="python38-psycopg2-doc-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830940" comment="python38-psycopg2-tests-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830941" comment="python38-pycparser-2.19-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830942" comment="python38-pysocks-1.7.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830943" comment="python38-pytz-2019.3-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831082" comment="python38-pyyaml-5.4.1-1.module+el8.5.0+10721+14d8e0d5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830945" comment="python38-requests-2.22.0-9.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831242" comment="python38-rpm-macros-3.8.13-1.module+el8.7.0+15641+2ece4388 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830947" comment="python38-scipy-1.3.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831084" comment="python38-setuptools-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831085" comment="python38-setuptools-wheel-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830950" comment="python38-six-1.12.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831243" comment="python38-test-3.8.13-1.module+el8.7.0+15641+2ece4388 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831244" comment="python38-tkinter-3.8.13-1.module+el8.7.0+15641+2ece4388 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831088" comment="python38-urllib3-1.25.7-5.module+el8.5.0+11639+ea5b349d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831089" comment="python38-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831090" comment="python38-wheel-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1516" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3507" ref_url="https://www.suse.com/security/cve/CVE-2021-3507/" source="CVE"/>
		<reference ref_id="CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897/" source="CVE"/>
		<reference ref_id="CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211/" source="CVE"/>
		<reference ref_id="CVE-2022-23645" ref_url="https://www.suse.com/security/cve/CVE-2022-23645/" source="CVE"/>
		<description>
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.
The following packages have been upgraded to a later upstream version: qemu-kvm (6.2.0). (BZ#2066828)
Security Fix(es):

 QEMU: fdc: heap buffer overflow in DMA read data transfers (CVE-2021-3507) 
 libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service (CVE-2022-0897) 
 libguestfs: Buffer overflow in get_keys leads to DoS (CVE-2022-2211) 
 swtpm: Unchecked header size indicator against expected size (CVE-2022-23645) 

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3507/">CVE-2021-3507 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3507">CVE-2021-3507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0897">CVE-2022-0897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23645/">CVE-2022-23645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23645">CVE-2022-23645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831245" comment="hivex-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831246" comment="hivex-devel-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831247" comment="libguestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831248" comment="libguestfs-appliance-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831249" comment="libguestfs-bash-completion-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831250" comment="libguestfs-devel-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831251" comment="libguestfs-gfs2-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831252" comment="libguestfs-gobject-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831253" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831254" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831255" comment="libguestfs-java-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831256" comment="libguestfs-java-devel-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831257" comment="libguestfs-javadoc-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831258" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831259" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831260" comment="libguestfs-rescue-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831261" comment="libguestfs-rsync-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831262" comment="libguestfs-tools-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831263" comment="libguestfs-tools-c-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831264" comment="libguestfs-winsupport-8.6-1.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831265" comment="libguestfs-xfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831266" comment="libiscsi-1.18.0-8.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831267" comment="libiscsi-devel-1.18.0-8.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831268" comment="libiscsi-utils-1.18.0-8.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831269" comment="libnbd-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831270" comment="libnbd-bash-completion-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831271" comment="libnbd-devel-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831272" comment="libtpms-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831273" comment="libtpms-devel-0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831274" comment="libvirt-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831275" comment="libvirt-client-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831276" comment="libvirt-daemon-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831277" comment="libvirt-daemon-config-network-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831278" comment="libvirt-daemon-config-nwfilter-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831279" comment="libvirt-daemon-driver-interface-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831280" comment="libvirt-daemon-driver-network-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831281" comment="libvirt-daemon-driver-nodedev-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831282" comment="libvirt-daemon-driver-nwfilter-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831283" comment="libvirt-daemon-driver-qemu-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831284" comment="libvirt-daemon-driver-secret-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831285" comment="libvirt-daemon-driver-storage-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831286" comment="libvirt-daemon-driver-storage-core-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831287" comment="libvirt-daemon-driver-storage-disk-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831288" comment="libvirt-daemon-driver-storage-gluster-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831289" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831290" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831291" comment="libvirt-daemon-driver-storage-logical-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831292" comment="libvirt-daemon-driver-storage-mpath-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831293" comment="libvirt-daemon-driver-storage-rbd-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831294" comment="libvirt-daemon-driver-storage-scsi-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831295" comment="libvirt-daemon-kvm-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831296" comment="libvirt-dbus-1.3.0-2.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831297" comment="libvirt-devel-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831298" comment="libvirt-docs-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831299" comment="libvirt-libs-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831300" comment="libvirt-lock-sanlock-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831301" comment="libvirt-nss-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831302" comment="libvirt-wireshark-8.0.0-10.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831303" comment="lua-guestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831304" comment="nbdfuse-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831305" comment="nbdkit-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831306" comment="nbdkit-bash-completion-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831307" comment="nbdkit-basic-filters-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831308" comment="nbdkit-basic-plugins-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831309" comment="nbdkit-curl-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831310" comment="nbdkit-devel-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831311" comment="nbdkit-example-plugins-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831312" comment="nbdkit-gzip-filter-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831313" comment="nbdkit-gzip-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831314" comment="nbdkit-linuxdisk-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831315" comment="nbdkit-nbd-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831316" comment="nbdkit-python-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831317" comment="nbdkit-server-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831318" comment="nbdkit-ssh-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831319" comment="nbdkit-tar-filter-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831320" comment="nbdkit-tar-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831321" comment="nbdkit-tmpdisk-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831322" comment="nbdkit-vddk-plugin-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831323" comment="nbdkit-xz-filter-1.24.0-4.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831324" comment="netcf-0.2.8-12.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831325" comment="netcf-devel-0.2.8-12.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831326" comment="netcf-libs-0.2.8-12.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831327" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831328" comment="perl-Sys-Virt-8.0.0-1.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831329" comment="perl-hivex-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831330" comment="python3-hivex-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831331" comment="python3-libguestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831332" comment="python3-libnbd-1.6.0-5.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831333" comment="python3-libvirt-8.0.0-2.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831334" comment="qemu-guest-agent-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831335" comment="qemu-img-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831336" comment="qemu-kvm-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831337" comment="qemu-kvm-block-curl-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831338" comment="qemu-kvm-block-gluster-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831339" comment="qemu-kvm-block-iscsi-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831340" comment="qemu-kvm-block-rbd-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831341" comment="qemu-kvm-block-ssh-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831342" comment="qemu-kvm-common-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831343" comment="qemu-kvm-core-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831344" comment="qemu-kvm-docs-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831345" comment="qemu-kvm-hw-usbredir-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831346" comment="qemu-kvm-ui-opengl-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831347" comment="qemu-kvm-ui-spice-6.2.0-20.module+el8.7.0+16689+53d59bc2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831348" comment="ruby-hivex-1.3.18-23.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831349" comment="ruby-libguestfs-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831350" comment="seabios-1.16.0-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831351" comment="seabios-bin-1.16.0-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831352" comment="seavgabios-bin-1.16.0-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831353" comment="sgabios-0.20170427git-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831354" comment="sgabios-bin-0.20170427git-3.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831355" comment="supermin-5.2.1-2.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831356" comment="supermin-devel-5.2.1-2.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831357" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831358" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831359" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831360" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831361" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831362" comment="virt-dib-1.44.0-9.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831363" comment="virt-v2v-1.42.0-21.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831364" comment="virt-v2v-bash-completion-1.42.0-21.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831365" comment="virt-v2v-man-pages-ja-1.42.0-21.module+el8.7.0+16689+53d59bc2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831366" comment="virt-v2v-man-pages-uk-1.42.0-21.module+el8.7.0+16689+53d59bc2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1517" version="1" class="patch">
	<metadata>
		<title>security update for osbuild (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
A build system for OS images		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831367" comment="osbuild-65-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831368" comment="osbuild-luks2-65-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831369" comment="osbuild-lvm2-65-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831370" comment="osbuild-ostree-65-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831371" comment="osbuild-selinux-65-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831372" comment="osbuild-tools-65-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831373" comment="python3-osbuild-65-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831374" comment="weldr-client-35.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831375" comment="weldr-client-tests-35.5-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1518" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):

 python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107) 

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831376" comment="python39-3.9.13-1.module+el8.7.0+15656+ffd4a257 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831092" comment="python39-PyMySQL-0.10.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831093" comment="python39-cffi-1.14.3-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831094" comment="python39-chardet-3.0.4-19.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831095" comment="python39-cryptography-3.3.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831377" comment="python39-devel-3.9.13-1.module+el8.7.0+15656+ffd4a257 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831378" comment="python39-idle-3.9.13-1.module+el8.7.0+15656+ffd4a257 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831098" comment="python39-idna-2.10-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831379" comment="python39-libs-3.9.13-1.module+el8.7.0+15656+ffd4a257 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831153" comment="python39-lxml-4.6.5-1.module+el8.6.0+13933+9cf0c87c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831380" comment="python39-mod_wsgi-4.7.1-5.module+el8.7.0+16654+645aad7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831102" comment="python39-numpy-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831103" comment="python39-numpy-doc-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831104" comment="python39-numpy-f2py-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831154" comment="python39-pip-20.2.4-7.module+el8.6.0+13003+6bb2c488 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831155" comment="python39-pip-wheel-20.2.4-7.module+el8.6.0+13003+6bb2c488 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831107" comment="python39-ply-3.11-10.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831108" comment="python39-psutil-5.8.0-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831109" comment="python39-psycopg2-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831110" comment="python39-psycopg2-doc-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831111" comment="python39-psycopg2-tests-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831112" comment="python39-pycparser-2.20-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831113" comment="python39-pysocks-1.7.1-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831114" comment="python39-pyyaml-5.4.1-1.module+el8.5.0+10613+59a13ec4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831115" comment="python39-requests-2.25.0-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831381" comment="python39-rpm-macros-3.9.13-1.module+el8.7.0+15656+ffd4a257 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831117" comment="python39-scipy-1.5.4-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831118" comment="python39-setuptools-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831119" comment="python39-setuptools-wheel-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831120" comment="python39-six-1.15.0-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831382" comment="python39-test-3.9.13-1.module+el8.7.0+15656+ffd4a257 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831383" comment="python39-tkinter-3.9.13-1.module+el8.7.0+15656+ffd4a257 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831123" comment="python39-toml-0.10.1-5.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831124" comment="python39-urllib3-1.25.10-4.module+el8.5.0+11712+ea2d2be1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831125" comment="python39-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831126" comment="python39-wheel-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1519" version="1" class="patch">
	<metadata>
		<title>security update for Moderate: python38:3.8 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
Moderate: python38:3.8		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831384" comment="python38-3.8.16-1.module+el8.8.0+17624+9a09af5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830915" comment="python38-Cython-0.29.14-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830916" comment="python38-PyMySQL-0.10.1-1.module+el8.4.0+9692+8e86ab84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830917" comment="python38-asn1crypto-1.2.0-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831069" comment="python38-babel-2.7.0-11.module+el8.5.0+11015+9c1c7c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830919" comment="python38-cffi-1.13.2-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830920" comment="python38-chardet-3.0.4-19.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830921" comment="python38-cryptography-2.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831385" comment="python38-debug-3.8.16-1.module+el8.8.0+17624+9a09af5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831386" comment="python38-devel-3.8.16-1.module+el8.8.0+17624+9a09af5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831387" comment="python38-idle-3.8.16-1.module+el8.8.0+17624+9a09af5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830925" comment="python38-idna-2.8-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831237" comment="python38-jinja2-2.11.3-1.module+el8.7.0+15575+d005caff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831388" comment="python38-libs-3.8.16-1.module+el8.8.0+17624+9a09af5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831143" comment="python38-lxml-4.4.1-7.module+el8.6.0+13958+214a5473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830929" comment="python38-markupsafe-1.1.1-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831239" comment="python38-mod_wsgi-4.6.8-4.module+el8.7.0+16653+23ccaf52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831076" comment="python38-numpy-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831077" comment="python38-numpy-doc-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831078" comment="python38-numpy-f2py-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831240" comment="python38-pip-19.3.1-6.module+el8.7.0+15823+8950cfa7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831241" comment="python38-pip-wheel-19.3.1-6.module+el8.7.0+15823+8950cfa7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830936" comment="python38-ply-3.11-10.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831081" comment="python38-psutil-5.6.4-4.module+el8.5.0+12031+10ce4870 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830938" comment="python38-psycopg2-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830939" comment="python38-psycopg2-doc-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830940" comment="python38-psycopg2-tests-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830941" comment="python38-pycparser-2.19-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830942" comment="python38-pysocks-1.7.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830943" comment="python38-pytz-2019.3-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831082" comment="python38-pyyaml-5.4.1-1.module+el8.5.0+10721+14d8e0d5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830945" comment="python38-requests-2.22.0-9.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831389" comment="python38-rpm-macros-3.8.16-1.module+el8.8.0+17624+9a09af5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830947" comment="python38-scipy-1.3.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831084" comment="python38-setuptools-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831085" comment="python38-setuptools-wheel-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830950" comment="python38-six-1.12.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831390" comment="python38-test-3.8.16-1.module+el8.8.0+17624+9a09af5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831391" comment="python38-tkinter-3.8.16-1.module+el8.8.0+17624+9a09af5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831088" comment="python38-urllib3-1.25.7-5.module+el8.5.0+11639+ea5b349d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831089" comment="python38-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831090" comment="python38-wheel-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1520" version="1" class="patch">
	<metadata>
		<title>security update for python38:3.8 module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. 
Security Fix(es):

 python: urllib.parse url blocklisting bypass (CVE-2023-24329) 

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831392" comment="python38-3.8.16-1.module+el8.8.0+18967+20d359ae.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830915" comment="python38-Cython-0.29.14-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830916" comment="python38-PyMySQL-0.10.1-1.module+el8.4.0+9692+8e86ab84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830917" comment="python38-asn1crypto-1.2.0-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831069" comment="python38-babel-2.7.0-11.module+el8.5.0+11015+9c1c7c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830919" comment="python38-cffi-1.13.2-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830920" comment="python38-chardet-3.0.4-19.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830921" comment="python38-cryptography-2.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831393" comment="python38-debug-3.8.16-1.module+el8.8.0+18967+20d359ae.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831394" comment="python38-devel-3.8.16-1.module+el8.8.0+18967+20d359ae.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831395" comment="python38-idle-3.8.16-1.module+el8.8.0+18967+20d359ae.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830925" comment="python38-idna-2.8-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831237" comment="python38-jinja2-2.11.3-1.module+el8.7.0+15575+d005caff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831396" comment="python38-libs-3.8.16-1.module+el8.8.0+18967+20d359ae.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831143" comment="python38-lxml-4.4.1-7.module+el8.6.0+13958+214a5473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830929" comment="python38-markupsafe-1.1.1-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831239" comment="python38-mod_wsgi-4.6.8-4.module+el8.7.0+16653+23ccaf52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831076" comment="python38-numpy-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831077" comment="python38-numpy-doc-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831078" comment="python38-numpy-f2py-1.17.3-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831240" comment="python38-pip-19.3.1-6.module+el8.7.0+15823+8950cfa7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831241" comment="python38-pip-wheel-19.3.1-6.module+el8.7.0+15823+8950cfa7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830936" comment="python38-ply-3.11-10.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831081" comment="python38-psutil-5.6.4-4.module+el8.5.0+12031+10ce4870 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830938" comment="python38-psycopg2-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830939" comment="python38-psycopg2-doc-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830940" comment="python38-psycopg2-tests-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830941" comment="python38-pycparser-2.19-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830942" comment="python38-pysocks-1.7.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830943" comment="python38-pytz-2019.3-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831082" comment="python38-pyyaml-5.4.1-1.module+el8.5.0+10721+14d8e0d5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830945" comment="python38-requests-2.22.0-9.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831397" comment="python38-rpm-macros-3.8.16-1.module+el8.8.0+18967+20d359ae.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830947" comment="python38-scipy-1.3.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831084" comment="python38-setuptools-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831085" comment="python38-setuptools-wheel-41.6.0-5.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830950" comment="python38-six-1.12.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831398" comment="python38-test-3.8.16-1.module+el8.8.0+18967+20d359ae.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831399" comment="python38-tkinter-3.8.16-1.module+el8.8.0+18967+20d359ae.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831088" comment="python38-urllib3-1.25.7-5.module+el8.5.0+11639+ea5b349d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831089" comment="python38-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831090" comment="python38-wheel-wheel-0.33.6-6.module+el8.5.0+12205+a865257a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1521" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):

 python: urllib.parse url blocklisting bypass (CVE-2023-24329) 

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831400" comment="python39-3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831092" comment="python39-PyMySQL-0.10.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831093" comment="python39-cffi-1.14.3-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831094" comment="python39-chardet-3.0.4-19.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831095" comment="python39-cryptography-3.3.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831401" comment="python39-devel-3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831402" comment="python39-idle-3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831098" comment="python39-idna-2.10-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831403" comment="python39-libs-3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831153" comment="python39-lxml-4.6.5-1.module+el8.6.0+13933+9cf0c87c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831380" comment="python39-mod_wsgi-4.7.1-5.module+el8.7.0+16654+645aad7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831102" comment="python39-numpy-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831103" comment="python39-numpy-doc-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831104" comment="python39-numpy-f2py-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831154" comment="python39-pip-20.2.4-7.module+el8.6.0+13003+6bb2c488 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831155" comment="python39-pip-wheel-20.2.4-7.module+el8.6.0+13003+6bb2c488 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831107" comment="python39-ply-3.11-10.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831108" comment="python39-psutil-5.8.0-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831109" comment="python39-psycopg2-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831110" comment="python39-psycopg2-doc-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831111" comment="python39-psycopg2-tests-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831112" comment="python39-pycparser-2.20-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831113" comment="python39-pysocks-1.7.1-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831114" comment="python39-pyyaml-5.4.1-1.module+el8.5.0+10613+59a13ec4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831115" comment="python39-requests-2.25.0-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831404" comment="python39-rpm-macros-3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831117" comment="python39-scipy-1.5.4-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831118" comment="python39-setuptools-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831119" comment="python39-setuptools-wheel-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831120" comment="python39-six-1.15.0-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831405" comment="python39-test-3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831406" comment="python39-tkinter-3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831123" comment="python39-toml-0.10.1-5.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831124" comment="python39-urllib3-1.25.10-4.module+el8.5.0+11712+ea2d2be1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831125" comment="python39-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831126" comment="python39-wheel-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1522" version="1" class="patch">
	<metadata>
		<title>security update for CVE-2023-20867: open-vm-tools fix (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867/" source="CVE"/>
		<description>
CVE-2023-20867 fix for open-vm-tools		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831407" comment="open-vm-tools-12.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831408" comment="open-vm-tools-desktop-12.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831409" comment="open-vm-tools-devel-12.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831410" comment="open-vm-tools-salt-minion-12.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831411" comment="open-vm-tools-sdmp-12.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831412" comment="open-vm-tools-test-12.1.5-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1523" version="1" class="patch">
	<metadata>
		<title>security update for virt:rhel module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40284" ref_url="https://www.suse.com/security/cve/CVE-2022-40284/" source="CVE"/>
		<reference ref_id="CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354/" source="CVE"/>
		<description>
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.Security Fix(es): QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service (CVE-2023-3354) 
 NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image (CVE-2022-40284) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Bug Fix(es): "No bootable device" with OS boot disk interface VirtIO-SCSI and with more than 9 VirtIO disks. (BZ#2228485)		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40284/">CVE-2022-40284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40284">CVE-2022-40284 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831413" comment="hivex-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831414" comment="hivex-devel-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831415" comment="libguestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831416" comment="libguestfs-appliance-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831417" comment="libguestfs-bash-completion-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831418" comment="libguestfs-devel-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831419" comment="libguestfs-gfs2-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831420" comment="libguestfs-gobject-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831421" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831422" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831423" comment="libguestfs-java-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831424" comment="libguestfs-java-devel-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831425" comment="libguestfs-javadoc-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831426" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831427" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831428" comment="libguestfs-rescue-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831429" comment="libguestfs-rsync-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831430" comment="libguestfs-tools-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831431" comment="libguestfs-tools-c-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831432" comment="libguestfs-winsupport-8.8-2.module+el8.8.0+19817+dd5e62f6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831433" comment="libguestfs-xfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831434" comment="libiscsi-1.18.0-8.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831435" comment="libiscsi-devel-1.18.0-8.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831436" comment="libiscsi-utils-1.18.0-8.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831437" comment="libnbd-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831438" comment="libnbd-bash-completion-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831439" comment="libnbd-devel-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831440" comment="libtpms-0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+1482ba89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831441" comment="libtpms-devel-0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+1482ba89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831442" comment="libvirt-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831443" comment="libvirt-client-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831444" comment="libvirt-daemon-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831445" comment="libvirt-daemon-config-network-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831446" comment="libvirt-daemon-config-nwfilter-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831447" comment="libvirt-daemon-driver-interface-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831448" comment="libvirt-daemon-driver-network-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831449" comment="libvirt-daemon-driver-nodedev-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831450" comment="libvirt-daemon-driver-nwfilter-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831451" comment="libvirt-daemon-driver-qemu-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831452" comment="libvirt-daemon-driver-secret-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831453" comment="libvirt-daemon-driver-storage-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831454" comment="libvirt-daemon-driver-storage-core-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831455" comment="libvirt-daemon-driver-storage-disk-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831456" comment="libvirt-daemon-driver-storage-gluster-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831457" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831458" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831459" comment="libvirt-daemon-driver-storage-logical-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831460" comment="libvirt-daemon-driver-storage-mpath-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831461" comment="libvirt-daemon-driver-storage-rbd-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831462" comment="libvirt-daemon-driver-storage-scsi-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831463" comment="libvirt-daemon-kvm-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831464" comment="libvirt-dbus-1.3.0-2.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831465" comment="libvirt-devel-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831466" comment="libvirt-docs-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831467" comment="libvirt-libs-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831468" comment="libvirt-lock-sanlock-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831469" comment="libvirt-nss-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831470" comment="libvirt-wireshark-8.0.0-19.2.module+el8.8.0+18944+7f5acf75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831471" comment="lua-guestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831472" comment="nbdfuse-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831473" comment="nbdkit-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831474" comment="nbdkit-bash-completion-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831475" comment="nbdkit-basic-filters-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831476" comment="nbdkit-basic-plugins-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831477" comment="nbdkit-curl-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831478" comment="nbdkit-devel-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831479" comment="nbdkit-example-plugins-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831480" comment="nbdkit-gzip-filter-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831481" comment="nbdkit-gzip-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831482" comment="nbdkit-linuxdisk-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831483" comment="nbdkit-nbd-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831484" comment="nbdkit-python-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831485" comment="nbdkit-server-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831486" comment="nbdkit-ssh-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831487" comment="nbdkit-tar-filter-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831488" comment="nbdkit-tar-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831489" comment="nbdkit-tmpdisk-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831490" comment="nbdkit-vddk-plugin-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831491" comment="nbdkit-xz-filter-1.24.0-5.module+el8.8.0+17308+05924798 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831492" comment="netcf-0.2.8-12.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831493" comment="netcf-devel-0.2.8-12.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831494" comment="netcf-libs-0.2.8-12.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831495" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831496" comment="perl-Sys-Virt-8.0.0-1.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831497" comment="perl-hivex-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831498" comment="python3-hivex-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831499" comment="python3-libguestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831500" comment="python3-libnbd-1.6.0-5.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831501" comment="python3-libvirt-8.0.0-2.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831502" comment="qemu-guest-agent-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831503" comment="qemu-img-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831504" comment="qemu-kvm-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831505" comment="qemu-kvm-block-curl-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831506" comment="qemu-kvm-block-gluster-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831507" comment="qemu-kvm-block-iscsi-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831508" comment="qemu-kvm-block-rbd-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831509" comment="qemu-kvm-block-ssh-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831510" comment="qemu-kvm-common-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831511" comment="qemu-kvm-core-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831512" comment="qemu-kvm-docs-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831513" comment="qemu-kvm-hw-usbredir-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831514" comment="qemu-kvm-ui-opengl-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831515" comment="qemu-kvm-ui-spice-6.2.0-33.module+el8.8.0+19768+98f68f21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831516" comment="ruby-hivex-1.3.18-23.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831517" comment="ruby-libguestfs-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831518" comment="seabios-1.16.0-4.module+el8.8.0+19627+2d14cb21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831519" comment="seabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831520" comment="seavgabios-bin-1.16.0-4.module+el8.8.0+19627+2d14cb21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831521" comment="sgabios-0.20170427git-3.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831522" comment="sgabios-bin-0.20170427git-3.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831523" comment="supermin-5.2.1-2.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831524" comment="supermin-devel-5.2.1-2.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831525" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831526" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831527" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831528" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831529" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831530" comment="virt-dib-1.44.0-9.module+el8.8.0+16781+9f4724c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831531" comment="virt-v2v-1.42.0-22.module+el8.8.0+19067+b66cdac6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831532" comment="virt-v2v-bash-completion-1.42.0-22.module+el8.8.0+19067+b66cdac6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831533" comment="virt-v2v-man-pages-ja-1.42.0-22.module+el8.8.0+19067+b66cdac6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831534" comment="virt-v2v-man-pages-uk-1.42.0-22.module+el8.8.0+19067+b66cdac6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1524" version="1" class="patch">
	<metadata>
		<title>Product split of RHSA-2023:7034 python39:3.9 module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.Security Fix(es): python: tarfile module directory traversal (CVE-2007-4559) 
 python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Additional Changes:For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831535" comment="python39-3.9.18-1.module+el8.9.0+20024+793d7211 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831536" comment="python39-PyMySQL-0.10.1-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831537" comment="python39-cffi-1.14.3-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831538" comment="python39-chardet-3.0.4-19.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831539" comment="python39-cryptography-3.3.1-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831540" comment="python39-devel-3.9.18-1.module+el8.9.0+20024+793d7211 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831541" comment="python39-idle-3.9.18-1.module+el8.9.0+20024+793d7211 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831542" comment="python39-idna-2.10-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831543" comment="python39-libs-3.9.18-1.module+el8.9.0+20024+793d7211 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831544" comment="python39-lxml-4.6.5-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831545" comment="python39-mod_wsgi-4.7.1-7.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831546" comment="python39-numpy-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831547" comment="python39-numpy-doc-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831548" comment="python39-numpy-f2py-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831549" comment="python39-pip-20.2.4-8.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831550" comment="python39-pip-wheel-20.2.4-8.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831551" comment="python39-ply-3.11-10.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831552" comment="python39-psutil-5.8.0-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831553" comment="python39-psycopg2-2.8.6-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831554" comment="python39-psycopg2-doc-2.8.6-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831555" comment="python39-psycopg2-tests-2.8.6-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831556" comment="python39-pycparser-2.20-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831557" comment="python39-pysocks-1.7.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831558" comment="python39-pyyaml-5.4.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831559" comment="python39-requests-2.25.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831560" comment="python39-rpm-macros-3.9.18-1.module+el8.9.0+20024+793d7211 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831561" comment="python39-scipy-1.5.4-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831562" comment="python39-setuptools-50.3.2-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831563" comment="python39-setuptools-wheel-50.3.2-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831564" comment="python39-six-1.15.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831565" comment="python39-test-3.9.18-1.module+el8.9.0+20024+793d7211 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831566" comment="python39-tkinter-3.9.18-1.module+el8.9.0+20024+793d7211 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831567" comment="python39-toml-0.10.1-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831568" comment="python39-urllib3-1.25.10-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831569" comment="python39-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831570" comment="python39-wheel-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1525" version="1" class="patch">
	<metadata>
		<title>security update for python38:3.8 security update from RHSA-2023:7050 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): python: tarfile module directory traversal (CVE-2007-4559) 
 python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Additional Changes:For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831571" comment="python38-3.8.17-2.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831572" comment="python38-Cython-0.29.14-4.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831573" comment="python38-PyMySQL-0.10.1-1.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831574" comment="python38-asn1crypto-1.2.0-3.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831575" comment="python38-babel-2.7.0-11.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831576" comment="python38-cffi-1.13.2-3.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831577" comment="python38-chardet-3.0.4-19.module+el8.9.0+19592+4b459c9b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831578" comment="python38-cryptography-2.8-3.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831579" comment="python38-debug-3.8.17-2.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831580" comment="python38-devel-3.8.17-2.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831581" comment="python38-idle-3.8.17-2.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831582" comment="python38-idna-2.8-6.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831583" comment="python38-jinja2-2.11.3-1.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831584" comment="python38-libs-3.8.17-2.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831585" comment="python38-lxml-4.4.1-7.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831586" comment="python38-markupsafe-1.1.1-6.module+el8.9.0+19592+4b459c9b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831587" comment="python38-mod_wsgi-4.6.8-5.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831588" comment="python38-numpy-1.17.3-7.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831589" comment="python38-numpy-doc-1.17.3-7.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831590" comment="python38-numpy-f2py-1.17.3-7.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831591" comment="python38-pip-19.3.1-7.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831592" comment="python38-pip-wheel-19.3.1-7.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831593" comment="python38-ply-3.11-10.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831594" comment="python38-psutil-5.6.4-4.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831595" comment="python38-psycopg2-2.8.4-4.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831596" comment="python38-psycopg2-doc-2.8.4-4.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831597" comment="python38-psycopg2-tests-2.8.4-4.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831598" comment="python38-pycparser-2.19-3.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831599" comment="python38-pysocks-1.7.1-4.module+el8.9.0+19592+4b459c9b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831600" comment="python38-pytz-2019.3-4.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831601" comment="python38-pyyaml-5.4.1-1.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831602" comment="python38-requests-2.22.0-10.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831603" comment="python38-rpm-macros-3.8.17-2.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831604" comment="python38-scipy-1.3.1-5.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831605" comment="python38-setuptools-41.6.0-5.module+el8.9.0+19592+4b459c9b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831606" comment="python38-setuptools-wheel-41.6.0-5.module+el8.9.0+19592+4b459c9b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831607" comment="python38-six-1.12.0-10.module+el8.9.0+19592+4b459c9b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831608" comment="python38-test-3.8.17-2.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831609" comment="python38-tkinter-3.8.17-2.module+el8.9.0+19642+a12b4af6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831610" comment="python38-urllib3-1.25.7-5.module+el8.9.0+19598+4a60c7b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831611" comment="python38-wheel-0.33.6-6.module+el8.9.0+19592+4b459c9b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831612" comment="python38-wheel-wheel-0.33.6-6.module+el8.9.0+19592+4b459c9b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1526" version="1" class="patch">
	<metadata>
		<title>security update for Moderate: virt:rhel update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3750" ref_url="https://www.suse.com/security/cve/CVE-2021-3750/" source="CVE"/>
		<reference ref_id="CVE-2023-3301" ref_url="https://www.suse.com/security/cve/CVE-2023-3301/" source="CVE"/>
		<description>
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.Security Fix(es): QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free (CVE-2021-3750) 
 QEMU: net: triggerable assertion due to race condition in hot-unplug (CVE-2023-3301) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Additional Changes:For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3750/">CVE-2021-3750 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3750">CVE-2021-3750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3301/">CVE-2023-3301 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3301">CVE-2023-3301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850854" comment="hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850855" comment="hivex-devel-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850856" comment="libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850857" comment="libguestfs-appliance-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850858" comment="libguestfs-bash-completion-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850859" comment="libguestfs-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850860" comment="libguestfs-gfs2-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850861" comment="libguestfs-gobject-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850862" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850863" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850864" comment="libguestfs-java-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850865" comment="libguestfs-java-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850866" comment="libguestfs-javadoc-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850867" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850868" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850869" comment="libguestfs-rescue-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850870" comment="libguestfs-rsync-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850871" comment="libguestfs-tools-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850872" comment="libguestfs-tools-c-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850873" comment="libguestfs-winsupport-8.9-1.module+el8.9.0+19846+58c50e4e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850874" comment="libguestfs-xfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850875" comment="libiscsi-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850876" comment="libiscsi-devel-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850877" comment="libiscsi-utils-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850878" comment="libnbd-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850879" comment="libnbd-bash-completion-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850880" comment="libnbd-devel-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850881" comment="libtpms-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850882" comment="libtpms-devel-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850883" comment="libvirt-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850884" comment="libvirt-client-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850885" comment="libvirt-daemon-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850886" comment="libvirt-daemon-config-network-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850887" comment="libvirt-daemon-config-nwfilter-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850888" comment="libvirt-daemon-driver-interface-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850889" comment="libvirt-daemon-driver-network-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850890" comment="libvirt-daemon-driver-nodedev-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850891" comment="libvirt-daemon-driver-nwfilter-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850892" comment="libvirt-daemon-driver-qemu-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850893" comment="libvirt-daemon-driver-secret-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850894" comment="libvirt-daemon-driver-storage-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850895" comment="libvirt-daemon-driver-storage-core-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850896" comment="libvirt-daemon-driver-storage-disk-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850897" comment="libvirt-daemon-driver-storage-gluster-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850898" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850899" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850900" comment="libvirt-daemon-driver-storage-logical-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850901" comment="libvirt-daemon-driver-storage-mpath-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850902" comment="libvirt-daemon-driver-storage-rbd-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850903" comment="libvirt-daemon-driver-storage-scsi-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850904" comment="libvirt-daemon-kvm-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850905" comment="libvirt-dbus-1.3.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850906" comment="libvirt-devel-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850907" comment="libvirt-docs-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850908" comment="libvirt-libs-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850909" comment="libvirt-lock-sanlock-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850910" comment="libvirt-nss-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850911" comment="libvirt-wireshark-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850912" comment="lua-guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850913" comment="nbdfuse-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850914" comment="nbdkit-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850915" comment="nbdkit-bash-completion-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850916" comment="nbdkit-basic-filters-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850917" comment="nbdkit-basic-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850918" comment="nbdkit-curl-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850919" comment="nbdkit-devel-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850920" comment="nbdkit-example-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850921" comment="nbdkit-gzip-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850922" comment="nbdkit-gzip-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850923" comment="nbdkit-linuxdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850924" comment="nbdkit-nbd-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850925" comment="nbdkit-python-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850926" comment="nbdkit-server-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850927" comment="nbdkit-ssh-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850928" comment="nbdkit-tar-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850929" comment="nbdkit-tar-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850930" comment="nbdkit-tmpdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850931" comment="nbdkit-vddk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850932" comment="nbdkit-xz-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850933" comment="netcf-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850934" comment="netcf-devel-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850935" comment="netcf-libs-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850936" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850937" comment="perl-Sys-Virt-8.0.0-1.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850938" comment="perl-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850939" comment="python3-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850940" comment="python3-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850941" comment="python3-libnbd-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850942" comment="python3-libvirt-8.0.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850943" comment="qemu-guest-agent-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850944" comment="qemu-img-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850945" comment="qemu-kvm-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850946" comment="qemu-kvm-block-curl-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850947" comment="qemu-kvm-block-gluster-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850948" comment="qemu-kvm-block-iscsi-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850949" comment="qemu-kvm-block-rbd-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850950" comment="qemu-kvm-block-ssh-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850951" comment="qemu-kvm-common-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850952" comment="qemu-kvm-core-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850953" comment="qemu-kvm-docs-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850954" comment="qemu-kvm-hw-usbredir-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850955" comment="qemu-kvm-ui-opengl-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850956" comment="qemu-kvm-ui-spice-6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850957" comment="ruby-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850958" comment="ruby-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850959" comment="seabios-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850960" comment="seabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850961" comment="seavgabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850962" comment="sgabios-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850963" comment="sgabios-bin-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850964" comment="supermin-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850965" comment="supermin-devel-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850966" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850967" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850968" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850969" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850970" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850971" comment="virt-dib-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850972" comment="virt-v2v-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850973" comment="virt-v2v-bash-completion-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850974" comment="virt-v2v-man-pages-ja-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850975" comment="virt-v2v-man-pages-uk-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1527" version="1" class="patch">
	<metadata>
		<title>security update for Moderate: virt:rhel update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3019" ref_url="https://www.suse.com/security/cve/CVE-2023-3019/" source="CVE"/>
		<description>
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.Security Fix(es): QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() (CVE-2023-3019) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3019/">CVE-2023-3019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3019">CVE-2023-3019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850854" comment="hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850855" comment="hivex-devel-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850856" comment="libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850857" comment="libguestfs-appliance-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850858" comment="libguestfs-bash-completion-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850859" comment="libguestfs-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850860" comment="libguestfs-gfs2-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850861" comment="libguestfs-gobject-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850862" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850863" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850864" comment="libguestfs-java-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850865" comment="libguestfs-java-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850866" comment="libguestfs-javadoc-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850867" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850868" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850869" comment="libguestfs-rescue-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850870" comment="libguestfs-rsync-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850871" comment="libguestfs-tools-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850872" comment="libguestfs-tools-c-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850873" comment="libguestfs-winsupport-8.9-1.module+el8.9.0+19846+58c50e4e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850874" comment="libguestfs-xfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850875" comment="libiscsi-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850876" comment="libiscsi-devel-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850877" comment="libiscsi-utils-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850878" comment="libnbd-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850879" comment="libnbd-bash-completion-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850880" comment="libnbd-devel-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850881" comment="libtpms-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850882" comment="libtpms-devel-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850883" comment="libvirt-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850884" comment="libvirt-client-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850885" comment="libvirt-daemon-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850886" comment="libvirt-daemon-config-network-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850887" comment="libvirt-daemon-config-nwfilter-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850888" comment="libvirt-daemon-driver-interface-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850889" comment="libvirt-daemon-driver-network-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850890" comment="libvirt-daemon-driver-nodedev-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850891" comment="libvirt-daemon-driver-nwfilter-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850892" comment="libvirt-daemon-driver-qemu-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850893" comment="libvirt-daemon-driver-secret-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850894" comment="libvirt-daemon-driver-storage-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850895" comment="libvirt-daemon-driver-storage-core-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850896" comment="libvirt-daemon-driver-storage-disk-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850897" comment="libvirt-daemon-driver-storage-gluster-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850898" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850899" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850900" comment="libvirt-daemon-driver-storage-logical-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850901" comment="libvirt-daemon-driver-storage-mpath-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850902" comment="libvirt-daemon-driver-storage-rbd-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850903" comment="libvirt-daemon-driver-storage-scsi-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850904" comment="libvirt-daemon-kvm-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850905" comment="libvirt-dbus-1.3.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850906" comment="libvirt-devel-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850907" comment="libvirt-docs-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850908" comment="libvirt-libs-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850909" comment="libvirt-lock-sanlock-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850910" comment="libvirt-nss-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850911" comment="libvirt-wireshark-8.0.0-22.module+el8.9.0+19544+b3045133 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850912" comment="lua-guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850913" comment="nbdfuse-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850914" comment="nbdkit-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850915" comment="nbdkit-bash-completion-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850916" comment="nbdkit-basic-filters-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850917" comment="nbdkit-basic-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850918" comment="nbdkit-curl-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850919" comment="nbdkit-devel-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850920" comment="nbdkit-example-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850921" comment="nbdkit-gzip-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850922" comment="nbdkit-gzip-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850923" comment="nbdkit-linuxdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850924" comment="nbdkit-nbd-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850925" comment="nbdkit-python-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850926" comment="nbdkit-server-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850927" comment="nbdkit-ssh-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850928" comment="nbdkit-tar-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850929" comment="nbdkit-tar-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850930" comment="nbdkit-tmpdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850931" comment="nbdkit-vddk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850932" comment="nbdkit-xz-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850933" comment="netcf-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850934" comment="netcf-devel-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850935" comment="netcf-libs-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850936" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850937" comment="perl-Sys-Virt-8.0.0-1.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850938" comment="perl-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850939" comment="python3-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850940" comment="python3-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850941" comment="python3-libnbd-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850942" comment="python3-libvirt-8.0.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850976" comment="qemu-guest-agent-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850977" comment="qemu-img-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850978" comment="qemu-kvm-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850979" comment="qemu-kvm-block-curl-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850980" comment="qemu-kvm-block-gluster-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850981" comment="qemu-kvm-block-iscsi-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850982" comment="qemu-kvm-block-rbd-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850983" comment="qemu-kvm-block-ssh-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850984" comment="qemu-kvm-common-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850985" comment="qemu-kvm-core-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850986" comment="qemu-kvm-docs-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850987" comment="qemu-kvm-hw-usbredir-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850988" comment="qemu-kvm-ui-opengl-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850989" comment="qemu-kvm-ui-spice-6.2.0-40.module+el8.9.0+20867+9a6a0901.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850957" comment="ruby-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850958" comment="ruby-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850959" comment="seabios-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850960" comment="seabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850961" comment="seavgabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850962" comment="sgabios-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850963" comment="sgabios-bin-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850964" comment="supermin-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850965" comment="supermin-devel-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850966" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850967" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850968" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850969" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850970" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850971" comment="virt-dib-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850972" comment="virt-v2v-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850973" comment="virt-v2v-bash-completion-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850974" comment="virt-v2v-man-pages-ja-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850975" comment="virt-v2v-man-pages-uk-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1528" version="1" class="patch">
	<metadata>
		<title>security update for virt:rhel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255/" source="CVE"/>
		<reference ref_id="CVE-2023-5088" ref_url="https://www.suse.com/security/cve/CVE-2023-5088/" source="CVE"/>
		<reference ref_id="CVE-2023-6683" ref_url="https://www.suse.com/security/cve/CVE-2023-6683/" source="CVE"/>
		<reference ref_id="CVE-2023-6693" ref_url="https://www.suse.com/security/cve/CVE-2023-6693/" source="CVE"/>
		<description>
Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems.Security Fix(es): QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255) 
 QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088) 
 QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() (CVE-2023-6683) 
 QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx() (CVE-2023-6693) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Additional Changes:For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5088/">CVE-2023-5088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5088">CVE-2023-5088 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6683/">CVE-2023-6683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6683">CVE-2023-6683 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6693/">CVE-2023-6693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6693">CVE-2023-6693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850854" comment="hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850855" comment="hivex-devel-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850856" comment="libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850857" comment="libguestfs-appliance-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850858" comment="libguestfs-bash-completion-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850859" comment="libguestfs-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850860" comment="libguestfs-gfs2-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850861" comment="libguestfs-gobject-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850862" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850863" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850864" comment="libguestfs-java-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850865" comment="libguestfs-java-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850866" comment="libguestfs-javadoc-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850867" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850868" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850869" comment="libguestfs-rescue-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850870" comment="libguestfs-rsync-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850871" comment="libguestfs-tools-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850872" comment="libguestfs-tools-c-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875386" comment="libguestfs-winsupport-8.10-1.module+el8.10.0+19908+9938c7c9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850874" comment="libguestfs-xfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850875" comment="libiscsi-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850876" comment="libiscsi-devel-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850877" comment="libiscsi-utils-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850878" comment="libnbd-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850879" comment="libnbd-bash-completion-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850880" comment="libnbd-devel-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850881" comment="libtpms-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850882" comment="libtpms-devel-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875387" comment="libvirt-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875388" comment="libvirt-client-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875389" comment="libvirt-daemon-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875390" comment="libvirt-daemon-config-network-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875391" comment="libvirt-daemon-config-nwfilter-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875392" comment="libvirt-daemon-driver-interface-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875393" comment="libvirt-daemon-driver-network-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875394" comment="libvirt-daemon-driver-nodedev-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875395" comment="libvirt-daemon-driver-nwfilter-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875396" comment="libvirt-daemon-driver-qemu-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875397" comment="libvirt-daemon-driver-secret-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875398" comment="libvirt-daemon-driver-storage-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875399" comment="libvirt-daemon-driver-storage-core-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875400" comment="libvirt-daemon-driver-storage-disk-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875401" comment="libvirt-daemon-driver-storage-gluster-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875402" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875403" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875404" comment="libvirt-daemon-driver-storage-logical-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875405" comment="libvirt-daemon-driver-storage-mpath-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875406" comment="libvirt-daemon-driver-storage-rbd-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875407" comment="libvirt-daemon-driver-storage-scsi-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875408" comment="libvirt-daemon-kvm-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850905" comment="libvirt-dbus-1.3.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875409" comment="libvirt-devel-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875410" comment="libvirt-docs-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875411" comment="libvirt-libs-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875412" comment="libvirt-lock-sanlock-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875413" comment="libvirt-nss-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875414" comment="libvirt-wireshark-8.0.0-23.module+el8.10.0+21023+5962ee04 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850912" comment="lua-guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850913" comment="nbdfuse-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850914" comment="nbdkit-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850915" comment="nbdkit-bash-completion-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850916" comment="nbdkit-basic-filters-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850917" comment="nbdkit-basic-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850918" comment="nbdkit-curl-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850919" comment="nbdkit-devel-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850920" comment="nbdkit-example-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850921" comment="nbdkit-gzip-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850922" comment="nbdkit-gzip-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850923" comment="nbdkit-linuxdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850924" comment="nbdkit-nbd-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850925" comment="nbdkit-python-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850926" comment="nbdkit-server-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850927" comment="nbdkit-ssh-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850928" comment="nbdkit-tar-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850929" comment="nbdkit-tar-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850930" comment="nbdkit-tmpdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850931" comment="nbdkit-vddk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850932" comment="nbdkit-xz-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850933" comment="netcf-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850934" comment="netcf-devel-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850935" comment="netcf-libs-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850936" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850937" comment="perl-Sys-Virt-8.0.0-1.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850938" comment="perl-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850939" comment="python3-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850940" comment="python3-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850941" comment="python3-libnbd-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850942" comment="python3-libvirt-8.0.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875415" comment="qemu-guest-agent-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875416" comment="qemu-img-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875417" comment="qemu-kvm-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875418" comment="qemu-kvm-block-curl-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875419" comment="qemu-kvm-block-gluster-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875420" comment="qemu-kvm-block-iscsi-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875421" comment="qemu-kvm-block-rbd-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875422" comment="qemu-kvm-block-ssh-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875423" comment="qemu-kvm-common-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875424" comment="qemu-kvm-core-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875425" comment="qemu-kvm-docs-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875426" comment="qemu-kvm-hw-usbredir-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875427" comment="qemu-kvm-ui-opengl-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875428" comment="qemu-kvm-ui-spice-6.2.0-49.module+el8.10.0+21533+3df3c4b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850957" comment="ruby-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850958" comment="ruby-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850959" comment="seabios-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850960" comment="seabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850961" comment="seavgabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850962" comment="sgabios-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850963" comment="sgabios-bin-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850964" comment="supermin-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850965" comment="supermin-devel-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850966" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850967" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850968" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850969" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850970" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850971" comment="virt-dib-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850972" comment="virt-v2v-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850973" comment="virt-v2v-bash-completion-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850974" comment="virt-v2v-man-pages-ja-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850975" comment="virt-v2v-man-pages-uk-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1529" version="1" class="patch">
	<metadata>
		<title>security update for python39 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
security update for python39 equivalent to RHSA-2024:2985		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874216" comment="python39-3.9.18-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831536" comment="python39-PyMySQL-0.10.1-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831537" comment="python39-cffi-1.14.3-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831538" comment="python39-chardet-3.0.4-19.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874217" comment="python39-cryptography-3.3.1-3.module+el8.10.0+21271+eccd1d86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874218" comment="python39-devel-3.9.18-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874219" comment="python39-idle-3.9.18-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831542" comment="python39-idna-2.10-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874220" comment="python39-libs-3.9.18-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831544" comment="python39-lxml-4.6.5-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831545" comment="python39-mod_wsgi-4.7.1-7.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831546" comment="python39-numpy-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831547" comment="python39-numpy-doc-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831548" comment="python39-numpy-f2py-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874221" comment="python39-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874222" comment="python39-pip-wheel-20.2.4-9.module+el8.10.0+21329+8d76b841 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831551" comment="python39-ply-3.11-10.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831552" comment="python39-psutil-5.8.0-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874223" comment="python39-psycopg2-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874224" comment="python39-psycopg2-doc-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874225" comment="python39-psycopg2-tests-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831556" comment="python39-pycparser-2.20-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831557" comment="python39-pysocks-1.7.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831558" comment="python39-pyyaml-5.4.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831559" comment="python39-requests-2.25.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874226" comment="python39-rpm-macros-3.9.18-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831561" comment="python39-scipy-1.5.4-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874227" comment="python39-setuptools-50.3.2-5.module+el8.10.0+20345+671a55aa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874228" comment="python39-setuptools-wheel-50.3.2-5.module+el8.10.0+20345+671a55aa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831564" comment="python39-six-1.15.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874229" comment="python39-test-3.9.18-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874230" comment="python39-tkinter-3.9.18-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831567" comment="python39-toml-0.10.1-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874231" comment="python39-urllib3-1.25.10-5.module+el8.10.0+20443+f0a692fe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831569" comment="python39-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831570" comment="python39-wheel-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1530" version="1" class="patch">
	<metadata>
		<title>security update for virt:rhel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
Equivalent security update for virt:rhel (RHSA-2024:4420).		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850854" comment="hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850855" comment="hivex-devel-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850856" comment="libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850857" comment="libguestfs-appliance-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850858" comment="libguestfs-bash-completion-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850859" comment="libguestfs-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850860" comment="libguestfs-gfs2-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850861" comment="libguestfs-gobject-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850862" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850863" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850864" comment="libguestfs-java-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850865" comment="libguestfs-java-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850866" comment="libguestfs-javadoc-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850867" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850868" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850869" comment="libguestfs-rescue-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850870" comment="libguestfs-rsync-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850871" comment="libguestfs-tools-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850872" comment="libguestfs-tools-c-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875386" comment="libguestfs-winsupport-8.10-1.module+el8.10.0+19908+9938c7c9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850874" comment="libguestfs-xfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850875" comment="libiscsi-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850876" comment="libiscsi-devel-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850877" comment="libiscsi-utils-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850878" comment="libnbd-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850879" comment="libnbd-bash-completion-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850880" comment="libnbd-devel-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850881" comment="libtpms-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850882" comment="libtpms-devel-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876135" comment="libvirt-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876136" comment="libvirt-client-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876137" comment="libvirt-daemon-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876138" comment="libvirt-daemon-config-network-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876139" comment="libvirt-daemon-config-nwfilter-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876140" comment="libvirt-daemon-driver-interface-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876141" comment="libvirt-daemon-driver-network-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876142" comment="libvirt-daemon-driver-nodedev-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876143" comment="libvirt-daemon-driver-nwfilter-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876144" comment="libvirt-daemon-driver-qemu-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876145" comment="libvirt-daemon-driver-secret-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876146" comment="libvirt-daemon-driver-storage-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876147" comment="libvirt-daemon-driver-storage-core-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876148" comment="libvirt-daemon-driver-storage-disk-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876149" comment="libvirt-daemon-driver-storage-gluster-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876150" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876151" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876152" comment="libvirt-daemon-driver-storage-logical-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876153" comment="libvirt-daemon-driver-storage-mpath-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876154" comment="libvirt-daemon-driver-storage-rbd-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876155" comment="libvirt-daemon-driver-storage-scsi-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876156" comment="libvirt-daemon-kvm-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850905" comment="libvirt-dbus-1.3.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876157" comment="libvirt-devel-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876158" comment="libvirt-docs-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876159" comment="libvirt-libs-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876160" comment="libvirt-lock-sanlock-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876161" comment="libvirt-nss-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876162" comment="libvirt-wireshark-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850912" comment="lua-guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850913" comment="nbdfuse-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850914" comment="nbdkit-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850915" comment="nbdkit-bash-completion-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850916" comment="nbdkit-basic-filters-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850917" comment="nbdkit-basic-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850918" comment="nbdkit-curl-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850919" comment="nbdkit-devel-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850920" comment="nbdkit-example-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850921" comment="nbdkit-gzip-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850922" comment="nbdkit-gzip-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850923" comment="nbdkit-linuxdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850924" comment="nbdkit-nbd-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850925" comment="nbdkit-python-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850926" comment="nbdkit-server-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850927" comment="nbdkit-ssh-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850928" comment="nbdkit-tar-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850929" comment="nbdkit-tar-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850930" comment="nbdkit-tmpdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850931" comment="nbdkit-vddk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850932" comment="nbdkit-xz-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850933" comment="netcf-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850934" comment="netcf-devel-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850935" comment="netcf-libs-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850936" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850937" comment="perl-Sys-Virt-8.0.0-1.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850938" comment="perl-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850939" comment="python3-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850940" comment="python3-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850941" comment="python3-libnbd-1.6.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850942" comment="python3-libvirt-8.0.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876163" comment="qemu-guest-agent-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876164" comment="qemu-img-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876165" comment="qemu-kvm-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876166" comment="qemu-kvm-block-curl-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876167" comment="qemu-kvm-block-gluster-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876168" comment="qemu-kvm-block-iscsi-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876169" comment="qemu-kvm-block-rbd-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876170" comment="qemu-kvm-block-ssh-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876171" comment="qemu-kvm-common-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876172" comment="qemu-kvm-core-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876173" comment="qemu-kvm-docs-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876174" comment="qemu-kvm-hw-usbredir-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876175" comment="qemu-kvm-ui-opengl-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876176" comment="qemu-kvm-ui-spice-6.2.0-50.module+el8.10.0+22027+db0a70a4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850957" comment="ruby-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850958" comment="ruby-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850959" comment="seabios-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850960" comment="seabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850961" comment="seavgabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850962" comment="sgabios-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850963" comment="sgabios-bin-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850964" comment="supermin-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850965" comment="supermin-devel-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850966" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850967" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850968" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850969" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850970" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850971" comment="virt-dib-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850972" comment="virt-v2v-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850973" comment="virt-v2v-bash-completion-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850974" comment="virt-v2v-man-pages-ja-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850975" comment="virt-v2v-man-pages-uk-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1531" version="1" class="patch">
	<metadata>
		<title>security update for python39:3.9 from RHSA-2024:5962 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2024:5962. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:5962		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940492" comment="python39-3.9.19-7.module+el8.10.0+22237+51382d7a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831536" comment="python39-PyMySQL-0.10.1-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831537" comment="python39-cffi-1.14.3-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831538" comment="python39-chardet-3.0.4-19.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874217" comment="python39-cryptography-3.3.1-3.module+el8.10.0+21271+eccd1d86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940493" comment="python39-devel-3.9.19-7.module+el8.10.0+22237+51382d7a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940494" comment="python39-idle-3.9.19-7.module+el8.10.0+22237+51382d7a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940495" comment="python39-idna-2.10-4.module+el8.10.0+21815+bb024982 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940496" comment="python39-libs-3.9.19-7.module+el8.10.0+22237+51382d7a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831544" comment="python39-lxml-4.6.5-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831545" comment="python39-mod_wsgi-4.7.1-7.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831546" comment="python39-numpy-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831547" comment="python39-numpy-doc-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831548" comment="python39-numpy-f2py-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874221" comment="python39-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874222" comment="python39-pip-wheel-20.2.4-9.module+el8.10.0+21329+8d76b841 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831551" comment="python39-ply-3.11-10.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831552" comment="python39-psutil-5.8.0-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874223" comment="python39-psycopg2-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874224" comment="python39-psycopg2-doc-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874225" comment="python39-psycopg2-tests-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831556" comment="python39-pycparser-2.20-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831557" comment="python39-pysocks-1.7.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831558" comment="python39-pyyaml-5.4.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831559" comment="python39-requests-2.25.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940497" comment="python39-rpm-macros-3.9.19-7.module+el8.10.0+22237+51382d7a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831561" comment="python39-scipy-1.5.4-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940498" comment="python39-setuptools-50.3.2-6.module+el8.10.0+22183+c898c0c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940499" comment="python39-setuptools-wheel-50.3.2-6.module+el8.10.0+22183+c898c0c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831564" comment="python39-six-1.15.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940500" comment="python39-test-3.9.19-7.module+el8.10.0+22237+51382d7a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940501" comment="python39-tkinter-3.9.19-7.module+el8.10.0+22237+51382d7a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831567" comment="python39-toml-0.10.1-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874231" comment="python39-urllib3-1.25.10-5.module+el8.10.0+20443+f0a692fe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831569" comment="python39-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831570" comment="python39-wheel-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1532" version="1" class="patch">
	<metadata>
		<title>security update for virt:rhel from RHSA-2024:6964 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2024:6964. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:6964		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850854" comment="hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850855" comment="hivex-devel-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850856" comment="libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850857" comment="libguestfs-appliance-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850858" comment="libguestfs-bash-completion-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850859" comment="libguestfs-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850860" comment="libguestfs-gfs2-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850861" comment="libguestfs-gobject-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850862" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850863" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850864" comment="libguestfs-java-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850865" comment="libguestfs-java-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850866" comment="libguestfs-javadoc-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850867" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850868" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850869" comment="libguestfs-rescue-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850870" comment="libguestfs-rsync-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850871" comment="libguestfs-tools-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850872" comment="libguestfs-tools-c-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875386" comment="libguestfs-winsupport-8.10-1.module+el8.10.0+19908+9938c7c9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850874" comment="libguestfs-xfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850875" comment="libiscsi-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850876" comment="libiscsi-devel-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850877" comment="libiscsi-utils-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944766" comment="libnbd-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944767" comment="libnbd-bash-completion-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944768" comment="libnbd-devel-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850881" comment="libtpms-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850882" comment="libtpms-devel-0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876135" comment="libvirt-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876136" comment="libvirt-client-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876137" comment="libvirt-daemon-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876138" comment="libvirt-daemon-config-network-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876139" comment="libvirt-daemon-config-nwfilter-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876140" comment="libvirt-daemon-driver-interface-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876141" comment="libvirt-daemon-driver-network-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876142" comment="libvirt-daemon-driver-nodedev-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876143" comment="libvirt-daemon-driver-nwfilter-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876144" comment="libvirt-daemon-driver-qemu-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876145" comment="libvirt-daemon-driver-secret-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876146" comment="libvirt-daemon-driver-storage-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876147" comment="libvirt-daemon-driver-storage-core-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876148" comment="libvirt-daemon-driver-storage-disk-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876149" comment="libvirt-daemon-driver-storage-gluster-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876150" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876151" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876152" comment="libvirt-daemon-driver-storage-logical-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876153" comment="libvirt-daemon-driver-storage-mpath-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876154" comment="libvirt-daemon-driver-storage-rbd-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876155" comment="libvirt-daemon-driver-storage-scsi-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876156" comment="libvirt-daemon-kvm-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850905" comment="libvirt-dbus-1.3.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876157" comment="libvirt-devel-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876158" comment="libvirt-docs-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876159" comment="libvirt-libs-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876160" comment="libvirt-lock-sanlock-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876161" comment="libvirt-nss-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876162" comment="libvirt-wireshark-8.0.0-23.2.module+el8.10.0+21972+d7867348 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850912" comment="lua-guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944769" comment="nbdfuse-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850936" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850937" comment="perl-Sys-Virt-8.0.0-1.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850938" comment="perl-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850939" comment="python3-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850940" comment="python3-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944770" comment="python3-libnbd-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944771" comment="qemu-guest-agent-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944772" comment="qemu-img-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944773" comment="qemu-kvm-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944774" comment="qemu-kvm-block-curl-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944775" comment="qemu-kvm-block-gluster-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944776" comment="qemu-kvm-block-iscsi-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944777" comment="qemu-kvm-block-rbd-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944778" comment="qemu-kvm-block-ssh-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944779" comment="qemu-kvm-common-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944780" comment="qemu-kvm-core-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944781" comment="qemu-kvm-docs-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944782" comment="qemu-kvm-hw-usbredir-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944783" comment="qemu-kvm-ui-opengl-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944784" comment="qemu-kvm-ui-spice-6.2.0-53.module+el8.10.0+22268+f82ccd96 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850957" comment="ruby-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850958" comment="ruby-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850959" comment="seabios-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850960" comment="seabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850961" comment="seavgabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850962" comment="sgabios-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850963" comment="sgabios-bin-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850964" comment="supermin-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850965" comment="supermin-devel-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850966" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850967" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850968" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850969" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850970" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850971" comment="virt-dib-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850972" comment="virt-v2v-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850973" comment="virt-v2v-bash-completion-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850974" comment="virt-v2v-man-pages-ja-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850975" comment="virt-v2v-man-pages-uk-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1533" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory perl-App-cpanminus:1.7044 - Get, unpack, build and install CPAN modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>



This is a CPAN client that requires zero configuration, and stands

alone but it's maintainable and extensible with plug-ins and friendly

to shell scripting.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954951" comment="perl-App-cpanminus-1.7044-6.module+el8.10.0+22411+7e3d2305 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954952" comment="perl-CPAN-DistnameInfo-0.12-11.module+el8.10.0+22411+7e3d2305 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954953" comment="perl-CPAN-Meta-Check-0.014-6.module+el8.10.0+22411+7e3d2305 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954954" comment="perl-File-pushd-1.014-6.module+el8.10.0+22411+7e3d2305 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954955" comment="perl-Module-CPANfile-1.1002-7.module+el8.10.0+22411+7e3d2305 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954956" comment="perl-Parse-PMFile-0.41-7.module+el8.10.0+22411+7e3d2305 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954957" comment="perl-String-ShellQuote-1.04-24.module+el8.10.0+22411+7e3d2305 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1534" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory perl-App-cpanminus:1.7044 - Get, unpack, build and install CPAN modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>



This is a CPAN client that requires zero configuration, and stands

alone but it's maintainable and extensible with plug-ins and friendly

to shell scripting.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956204" comment="perl-App-cpanminus-1.7044-6.module+el8.10.0+22411+e14e3526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956205" comment="perl-CPAN-DistnameInfo-0.12-11.module+el8.10.0+22411+e14e3526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956206" comment="perl-CPAN-Meta-Check-0.014-6.module+el8.10.0+22411+e14e3526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956207" comment="perl-File-pushd-1.014-6.module+el8.10.0+22411+e14e3526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956208" comment="perl-Module-CPANfile-1.1002-7.module+el8.10.0+22411+e14e3526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956209" comment="perl-Parse-PMFile-0.41-7.module+el8.10.0+22411+e14e3526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956210" comment="perl-String-ShellQuote-1.04-24.module+el8.10.0+22411+e14e3526 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1535" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory perl-App-cpanminus:1.7044 - Get, unpack, build and install CPAN modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>



This is a CPAN client that requires zero configuration, and stands

alone but it's maintainable and extensible with plug-ins and friendly

to shell scripting.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956211" comment="perl-App-cpanminus-1.7044-6.module+el8.10.0+22411+85254afd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956212" comment="perl-CPAN-Meta-Check-0.014-6.module+el8.10.0+22411+85254afd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956213" comment="perl-File-pushd-1.014-6.module+el8.10.0+22411+85254afd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956214" comment="perl-Module-CPANfile-1.1002-7.module+el8.10.0+22411+85254afd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956215" comment="perl-Parse-PMFile-0.41-7.module+el8.10.0+22411+85254afd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956216" comment="perl-String-ShellQuote-1.04-24.module+el8.10.0+22411+85254afd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1536" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory perl-App-cpanminus:1.7044 - Get, unpack, build and install CPAN modules (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>



This is a CPAN client that requires zero configuration, and stands

alone but it's maintainable and extensible with plug-ins and friendly

to shell scripting.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956217" comment="perl-App-cpanminus-1.7044-6.module+el8.10.0+22411+409a293e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956218" comment="perl-CPAN-DistnameInfo-0.12-11.module+el8.10.0+22411+409a293e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956219" comment="perl-CPAN-Meta-Check-0.014-6.module+el8.10.0+22411+409a293e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956220" comment="perl-File-pushd-1.014-6.module+el8.10.0+22411+409a293e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956221" comment="perl-Module-CPANfile-1.1002-7.module+el8.10.0+22411+409a293e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956222" comment="perl-Parse-PMFile-0.41-7.module+el8.10.0+22411+409a293e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956223" comment="perl-String-ShellQuote-1.04-24.module+el8.10.0+22411+409a293e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1537" version="1" class="patch">
	<metadata>
		<title>Moderate: gcc security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.Security Fix(es): jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods (CVE-2020-11023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964940" comment="cpp-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964941" comment="gcc-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964942" comment="gcc-c++-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964943" comment="gcc-gdb-plugin-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964944" comment="gcc-gfortran-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964945" comment="gcc-offload-nvptx-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964946" comment="gcc-plugin-annobin-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964947" comment="gcc-plugin-devel-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964948" comment="libasan-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964949" comment="libasan-static-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964950" comment="libatomic-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964951" comment="libatomic-static-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964952" comment="libgcc-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964953" comment="libgfortran-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964954" comment="libgfortran-static-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964955" comment="libgomp-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964956" comment="libgomp-offload-nvptx-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964957" comment="libitm-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964958" comment="libitm-devel-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964959" comment="libitm-static-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964960" comment="liblsan-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964961" comment="liblsan-static-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964962" comment="libquadmath-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964963" comment="libquadmath-devel-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964964" comment="libquadmath-static-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964965" comment="libstdc++-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964966" comment="libstdc++-devel-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964967" comment="libstdc++-docs-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964968" comment="libstdc++-static-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964969" comment="libtsan-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964970" comment="libtsan-static-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964971" comment="libubsan-8.5.0-23.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964972" comment="libubsan-static-8.5.0-23.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1538" version="1" class="patch">
	<metadata>
		<title>Moderate: gcc-toolset-13-gcc security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
The gcc-toolset-13-gcc package contains the GNU Compiler Collection version 13.Security Fix(es): jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods (CVE-2020-11023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964973" comment="gcc-toolset-13-gcc-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964974" comment="gcc-toolset-13-gcc-c++-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964975" comment="gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964976" comment="gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964977" comment="gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964978" comment="gcc-toolset-13-libasan-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964979" comment="gcc-toolset-13-libatomic-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964980" comment="gcc-toolset-13-libgccjit-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964981" comment="gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964982" comment="gcc-toolset-13-libhwasan-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964983" comment="gcc-toolset-13-libitm-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964984" comment="gcc-toolset-13-liblsan-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964985" comment="gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964986" comment="gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964987" comment="gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964988" comment="gcc-toolset-13-libtsan-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964989" comment="gcc-toolset-13-libubsan-devel-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964990" comment="gcc-toolset-13-offload-nvptx-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964991" comment="libasan8-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964992" comment="libhwasan-13.3.1-2.2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964993" comment="libtsan2-13.3.1-2.2.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1539" version="1" class="patch">
	<metadata>
		<title>Moderate: gcc-toolset-14-gcc security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
The gcc-toolset-14-gcc package contains the GNU Compiler Collection version 14.Security Fix(es): jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods (CVE-2020-11023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964994" comment="gcc-toolset-14-gcc-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964995" comment="gcc-toolset-14-gcc-c++-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964996" comment="gcc-toolset-14-gcc-gfortran-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964997" comment="gcc-toolset-14-gcc-plugin-annobin-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964998" comment="gcc-toolset-14-gcc-plugin-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964999" comment="gcc-toolset-14-libasan-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965000" comment="gcc-toolset-14-libatomic-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965001" comment="gcc-toolset-14-libgccjit-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965002" comment="gcc-toolset-14-libgccjit-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965003" comment="gcc-toolset-14-libhwasan-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965004" comment="gcc-toolset-14-libitm-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965005" comment="gcc-toolset-14-liblsan-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965006" comment="gcc-toolset-14-libquadmath-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965007" comment="gcc-toolset-14-libstdc++-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965008" comment="gcc-toolset-14-libstdc++-docs-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965009" comment="gcc-toolset-14-libtsan-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965010" comment="gcc-toolset-14-libubsan-devel-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965011" comment="gcc-toolset-14-offload-nvptx-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965012" comment="libasan8-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965013" comment="libhwasan-14.2.1-7.1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965014" comment="libtsan2-14.2.1-7.1.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1540" version="1" class="patch">
	<metadata>
		<title>Important: perl-FCGI:0.78 security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40907" ref_url="https://www.suse.com/security/cve/CVE-2025-40907/" source="CVE"/>
		<description>
The perl-FCGI package provides a Perl module for writing FastCGI applications. FastCGI is a more efficient alternative to traditional CGI, as it keeps application processes persistent across multiple requests. This module allows Perl web applications to handle requests faster and with lower resource overhead, making it suitable for high-traffic environments.Security Fix(es): perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40907/">CVE-2025-40907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40907">CVE-2025-40907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986286" comment="perl-FCGI-0.78-12.module+el8.10.0+23147+63faba8d is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1541" version="1" class="patch">
	<metadata>
		<title>Important: perl-FCGI:0.78 security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40907" ref_url="https://www.suse.com/security/cve/CVE-2025-40907/" source="CVE"/>
		<description>
The perl-FCGI package provides a Perl module for writing FastCGI applications. FastCGI is a more efficient alternative to traditional CGI, as it keeps application processes persistent across multiple requests. This module allows Perl web applications to handle requests faster and with lower resource overhead, making it suitable for high-traffic environments.Security Fix(es): perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40907/">CVE-2025-40907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40907">CVE-2025-40907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986287" comment="perl-FCGI-0.78-12.module+el8.10.0+23147+20b7d289 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1542" version="1" class="patch">
	<metadata>
		<title>Important: perl-FCGI:0.78 security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40907" ref_url="https://www.suse.com/security/cve/CVE-2025-40907/" source="CVE"/>
		<description>
The perl-FCGI package provides a Perl module for writing FastCGI applications. FastCGI is a more efficient alternative to traditional CGI, as it keeps application processes persistent across multiple requests. This module allows Perl web applications to handle requests faster and with lower resource overhead, making it suitable for high-traffic environments.Security Fix(es): perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40907/">CVE-2025-40907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40907">CVE-2025-40907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986288" comment="perl-FCGI-0.78-12.module+el8.10.0+23147+df114ff4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1543" version="1" class="patch">
	<metadata>
		<title>Important: perl-FCGI:0.78 security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40907" ref_url="https://www.suse.com/security/cve/CVE-2025-40907/" source="CVE"/>
		<description>
The perl-FCGI package provides a Perl module for writing FastCGI applications. FastCGI is a more efficient alternative to traditional CGI, as it keeps application processes persistent across multiple requests. This module allows Perl web applications to handle requests faster and with lower resource overhead, making it suitable for high-traffic environments.Security Fix(es): perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40907/">CVE-2025-40907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40907">CVE-2025-40907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986289" comment="perl-FCGI-0.78-12.module+el8.10.0+23147+95b68fad is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1544" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory idm:DL1 - Identity Management system module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4404" ref_url="https://www.suse.com/security/cve/CVE-2025-4404/" source="CVE"/>
		<description>



IdM is an integrated solution to provide centrally managed Identity (users,

hosts, services), Authentication (SSO, 2FA), and Authorization (host access control,

SELinux user roles, services). The solution provides features for further integration

with Linux based clients (SUDO, automount) and integration with Active Directory

based infrastructures (Trusts).		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4404/">CVE-2025-4404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4404">CVE-2025-4404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009987271" comment="ipa-client-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987272" comment="ipa-client-common-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987273" comment="ipa-client-epn-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987274" comment="ipa-client-samba-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987275" comment="ipa-common-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987276" comment="ipa-python-compat-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987277" comment="ipa-selinux-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987278" comment="ipa-server-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987279" comment="ipa-server-common-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987280" comment="ipa-server-dns-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987281" comment="ipa-server-trust-ad-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987282" comment="python3-ipaclient-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987283" comment="python3-ipalib-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987284" comment="python3-ipaserver-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987285" comment="python3-ipatests-4.9.13-18.module+el8.10.0+23182+cbb72bb2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1545" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory idm:client - IdM long term support client module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4404" ref_url="https://www.suse.com/security/cve/CVE-2025-4404/" source="CVE"/>
		<description>



IdM is an integrated solution to provide centrally managed Identity (users,

hosts, services), Authentication (SSO, 2FA), and Authorization (host access control,

SELinux user roles, services). The solution provides features for further integration

with Linux based clients (SUDO, automount) and integration with Active Directory

based infrastructures (Trusts).





This module stream supports only client side of IdM solution		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4404/">CVE-2025-4404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4404">CVE-2025-4404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009987286" comment="ipa-client-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987287" comment="ipa-client-common-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987288" comment="ipa-client-epn-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987289" comment="ipa-client-samba-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987290" comment="ipa-common-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987291" comment="ipa-python-compat-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987292" comment="ipa-selinux-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987293" comment="ipa-server-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987294" comment="ipa-server-common-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987295" comment="ipa-server-dns-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987296" comment="ipa-server-trust-ad-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987297" comment="python3-ipaclient-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987298" comment="python3-ipalib-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987299" comment="python3-ipaserver-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987300" comment="python3-ipatests-4.9.13-18.module+el8.10.0+23183+85190b0c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1546" version="1" class="patch">
	<metadata>
		<title>Moderate: virt:rhel and virt-devel:rhel security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-49133" ref_url="https://www.suse.com/security/cve/CVE-2025-49133/" source="CVE"/>
		<description>
Kernel-based Virtual Machine (KVM) offers a full virtualization solution forLinux on numerous hardware platforms. The virt:rhel module contains packageswhich provide user-space components used to run virtual machines using KVM.The packages also provide APIs for managing and interacting with the virtualized systems.Security Fix(es): libtpms: Libtpms Out-of-Bounds Read Vulnerability (CVE-2025-49133) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-49133/">CVE-2025-49133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49133">CVE-2025-49133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850854" comment="hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850855" comment="hivex-devel-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850856" comment="libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850857" comment="libguestfs-appliance-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850858" comment="libguestfs-bash-completion-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850859" comment="libguestfs-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850860" comment="libguestfs-gfs2-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850861" comment="libguestfs-gobject-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850862" comment="libguestfs-gobject-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850863" comment="libguestfs-inspect-icons-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850864" comment="libguestfs-java-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850865" comment="libguestfs-java-devel-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850866" comment="libguestfs-javadoc-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850867" comment="libguestfs-man-pages-ja-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850868" comment="libguestfs-man-pages-uk-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850869" comment="libguestfs-rescue-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850870" comment="libguestfs-rsync-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850871" comment="libguestfs-tools-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850872" comment="libguestfs-tools-c-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875386" comment="libguestfs-winsupport-8.10-1.module+el8.10.0+19908+9938c7c9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850874" comment="libguestfs-xfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850875" comment="libiscsi-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850876" comment="libiscsi-devel-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850877" comment="libiscsi-utils-1.18.0-8.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944766" comment="libnbd-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944767" comment="libnbd-bash-completion-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944768" comment="libnbd-devel-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012382" comment="libtpms-0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012383" comment="libtpms-devel-0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012384" comment="libvirt-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012385" comment="libvirt-client-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012386" comment="libvirt-daemon-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012387" comment="libvirt-daemon-config-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012388" comment="libvirt-daemon-config-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012389" comment="libvirt-daemon-driver-interface-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012390" comment="libvirt-daemon-driver-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012391" comment="libvirt-daemon-driver-nodedev-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012392" comment="libvirt-daemon-driver-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012393" comment="libvirt-daemon-driver-qemu-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012394" comment="libvirt-daemon-driver-secret-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012395" comment="libvirt-daemon-driver-storage-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012396" comment="libvirt-daemon-driver-storage-core-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012397" comment="libvirt-daemon-driver-storage-disk-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012398" comment="libvirt-daemon-driver-storage-gluster-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012399" comment="libvirt-daemon-driver-storage-iscsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012400" comment="libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012401" comment="libvirt-daemon-driver-storage-logical-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012402" comment="libvirt-daemon-driver-storage-mpath-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012403" comment="libvirt-daemon-driver-storage-rbd-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012404" comment="libvirt-daemon-driver-storage-scsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012405" comment="libvirt-daemon-kvm-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850905" comment="libvirt-dbus-1.3.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012406" comment="libvirt-devel-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012407" comment="libvirt-docs-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012408" comment="libvirt-libs-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012409" comment="libvirt-lock-sanlock-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012410" comment="libvirt-nss-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012411" comment="libvirt-wireshark-8.0.0-23.4.module+el8.10.0+23205+d8da55c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850912" comment="lua-guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944769" comment="nbdfuse-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850914" comment="nbdkit-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850915" comment="nbdkit-bash-completion-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850916" comment="nbdkit-basic-filters-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850917" comment="nbdkit-basic-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850918" comment="nbdkit-curl-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850919" comment="nbdkit-devel-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850920" comment="nbdkit-example-plugins-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850921" comment="nbdkit-gzip-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850922" comment="nbdkit-gzip-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850923" comment="nbdkit-linuxdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850924" comment="nbdkit-nbd-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850925" comment="nbdkit-python-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850926" comment="nbdkit-server-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850927" comment="nbdkit-ssh-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850928" comment="nbdkit-tar-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850929" comment="nbdkit-tar-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850930" comment="nbdkit-tmpdisk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850931" comment="nbdkit-vddk-plugin-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850932" comment="nbdkit-xz-filter-1.24.0-5.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850933" comment="netcf-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850934" comment="netcf-devel-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850935" comment="netcf-libs-0.2.8-12.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850936" comment="perl-Sys-Guestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850937" comment="perl-Sys-Virt-8.0.0-1.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850938" comment="perl-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850939" comment="python3-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850940" comment="python3-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944770" comment="python3-libnbd-1.6.0-6.module+el8.10.0+22250+3c790083 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850942" comment="python3-libvirt-8.0.0-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012412" comment="qemu-guest-agent-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012413" comment="qemu-img-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012414" comment="qemu-kvm-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012415" comment="qemu-kvm-block-curl-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012416" comment="qemu-kvm-block-gluster-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012417" comment="qemu-kvm-block-iscsi-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012418" comment="qemu-kvm-block-rbd-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012419" comment="qemu-kvm-block-ssh-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012420" comment="qemu-kvm-common-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012421" comment="qemu-kvm-core-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012422" comment="qemu-kvm-docs-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012423" comment="qemu-kvm-hw-usbredir-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012424" comment="qemu-kvm-ui-opengl-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012425" comment="qemu-kvm-ui-spice-6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850957" comment="ruby-hivex-1.3.18-23.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850958" comment="ruby-libguestfs-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850959" comment="seabios-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850960" comment="seabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850961" comment="seavgabios-bin-1.16.0-4.module+el8.9.0+19570+14a90618 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850962" comment="sgabios-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850963" comment="sgabios-bin-0.20170427git-3.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850964" comment="supermin-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850965" comment="supermin-devel-5.2.1-2.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850966" comment="swtpm-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850967" comment="swtpm-devel-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850968" comment="swtpm-libs-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850969" comment="swtpm-tools-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850970" comment="swtpm-tools-pkcs11-0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850971" comment="virt-dib-1.44.0-9.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850972" comment="virt-v2v-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850973" comment="virt-v2v-bash-completion-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850974" comment="virt-v2v-man-pages-ja-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850975" comment="virt-v2v-man-pages-uk-1.42.0-22.module+el8.9.0+18724+20190c23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1547" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory idm:DL1 - Linux Identity Management system module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.

Bug Fix(es) and Enhancement(s):

  ipahealthcheck incorrectly treats a trust-agent as a trust-controller (JIRA:RHEL-99487)		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016836" comment="bind-dyndb-ldap-11.6-6.module+el8.10.0+23009+91fb337e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016837" comment="custodia-0.6.0-3.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016838" comment="ipa-client-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016839" comment="ipa-client-common-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016840" comment="ipa-client-epn-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016841" comment="ipa-client-samba-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016842" comment="ipa-common-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016843" comment="ipa-healthcheck-0.12-6.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016844" comment="ipa-healthcheck-core-0.12-6.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016845" comment="ipa-python-compat-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016846" comment="ipa-selinux-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016847" comment="ipa-server-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016848" comment="ipa-server-common-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016849" comment="ipa-server-dns-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016850" comment="ipa-server-trust-ad-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016851" comment="opendnssec-2.1.7-2.module+el8.10.0+22913+7aa1a207 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016852" comment="python3-custodia-0.6.0-3.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016853" comment="python3-ipaclient-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016854" comment="python3-ipalib-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016855" comment="python3-ipaserver-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016856" comment="python3-ipatests-4.9.13-18.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016857" comment="python3-jwcrypto-0.5.0-2.module+el8.10.0+21691+df63127d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016858" comment="python3-kdcproxy-0.4-5.module+el8.10.0+22564+098ba143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016859" comment="python3-pyusb-1.0.0-9.1.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016860" comment="python3-qrcode-5.3-1.module+el8.10.0+22543+0dae60ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016861" comment="python3-qrcode-core-5.3-1.module+el8.10.0+22543+0dae60ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016862" comment="python3-yubico-1.3.2-9.1.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016863" comment="slapi-nis-0.60.0-4.module+el8.10.0+20723+03062ebd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016864" comment="softhsm-2.6.0-5.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016865" comment="softhsm-devel-2.6.0-5.module+el8.9.0+18911+94941f82 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1548" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory idm:DL1 - Linux Identity Management system module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-7493" ref_url="https://www.suse.com/security/cve/CVE-2025-7493/" source="CVE"/>
		<description>



Linux IdM is an integrated solution to provide centrally managed Identity (users,

hosts, services), Authentication (SSO, 2FA), and Authorization (host access control,

SELinux user roles, services). The solution provides features for further integration

with Linux based clients (SUDO, automount) and integration with Active Directory

based infrastructures (Trusts).		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7493/">CVE-2025-7493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7493">CVE-2025-7493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016836" comment="bind-dyndb-ldap-11.6-6.module+el8.10.0+23009+91fb337e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016837" comment="custodia-0.6.0-3.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020088" comment="ipa-client-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020089" comment="ipa-client-common-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020090" comment="ipa-client-epn-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020091" comment="ipa-client-samba-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020092" comment="ipa-common-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016843" comment="ipa-healthcheck-0.12-6.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016844" comment="ipa-healthcheck-core-0.12-6.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020093" comment="ipa-python-compat-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020094" comment="ipa-selinux-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020095" comment="ipa-server-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020096" comment="ipa-server-common-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020097" comment="ipa-server-dns-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020098" comment="ipa-server-trust-ad-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016851" comment="opendnssec-2.1.7-2.module+el8.10.0+22913+7aa1a207 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016852" comment="python3-custodia-0.6.0-3.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020099" comment="python3-ipaclient-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020100" comment="python3-ipalib-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020101" comment="python3-ipaserver-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020102" comment="python3-ipatests-4.9.13-20.module+el8.10.0+23534+744f3864 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016857" comment="python3-jwcrypto-0.5.0-2.module+el8.10.0+21691+df63127d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016858" comment="python3-kdcproxy-0.4-5.module+el8.10.0+22564+098ba143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016859" comment="python3-pyusb-1.0.0-9.1.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016860" comment="python3-qrcode-5.3-1.module+el8.10.0+22543+0dae60ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016861" comment="python3-qrcode-core-5.3-1.module+el8.10.0+22543+0dae60ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016862" comment="python3-yubico-1.3.2-9.1.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016863" comment="slapi-nis-0.60.0-4.module+el8.10.0+20723+03062ebd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016864" comment="softhsm-2.6.0-5.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016865" comment="softhsm-devel-2.6.0-5.module+el8.9.0+18911+94941f82 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1549" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory idm:client - Linux IdM long term support client module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-7493" ref_url="https://www.suse.com/security/cve/CVE-2025-7493/" source="CVE"/>
		<description>



Linux IdM is an integrated solution to provide centrally managed Identity (users,

hosts, services), Authentication (SSO, 2FA), and Authorization (host access control,

SELinux user roles, services). The solution provides features for further integration

with Linux based clients (SUDO, automount) and integration with Active Directory

based infrastructures (Trusts).





This module stream supports only client side of Linux IdM solution		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7493/">CVE-2025-7493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7493">CVE-2025-7493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020103" comment="ipa-client-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020104" comment="ipa-client-common-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020105" comment="ipa-client-epn-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020106" comment="ipa-client-samba-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020107" comment="ipa-common-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020108" comment="ipa-healthcheck-core-0.12-6.module+el8.10.0+23404+f6b3454f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020109" comment="ipa-python-compat-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020110" comment="ipa-selinux-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020111" comment="python3-ipaclient-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020112" comment="python3-ipalib-4.9.13-20.module+el8.10.0+23537+32c82745 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020113" comment="python3-jwcrypto-0.5.0-2.module+el8.10.0+21692+c9b201bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020114" comment="python3-pyusb-1.0.0-9.1.module+el8.9.0+18920+2223d05e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020115" comment="python3-qrcode-5.3-1.module+el8.10.0+22544+6a7f07c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020116" comment="python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020117" comment="python3-yubico-1.3.2-9.1.module+el8.9.0+18920+2223d05e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1550" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory idm:DL1 - The Identity Management system module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>

IdM is an integrated solution to provide centrally managed Identity (users,
hosts, services), Authentication (SSO, 2FA), and Authorization (host access control,
SELinux user roles, services). The solution provides features for further integration
with Linux based clients (SUDO, automount) and integration with Active Directory
based infrastructures (Trusts).		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016836" comment="bind-dyndb-ldap-11.6-6.module+el8.10.0+23009+91fb337e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016837" comment="custodia-0.6.0-3.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025880" comment="ipa-client-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025881" comment="ipa-client-common-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025882" comment="ipa-client-epn-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025883" comment="ipa-client-samba-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025884" comment="ipa-common-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016843" comment="ipa-healthcheck-0.12-6.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016844" comment="ipa-healthcheck-core-0.12-6.module+el8.10.0+23403+cc1f9b40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025885" comment="ipa-python-compat-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025886" comment="ipa-selinux-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025887" comment="ipa-server-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025888" comment="ipa-server-common-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025889" comment="ipa-server-dns-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025890" comment="ipa-server-trust-ad-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016851" comment="opendnssec-2.1.7-2.module+el8.10.0+22913+7aa1a207 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016852" comment="python3-custodia-0.6.0-3.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025891" comment="python3-ipaclient-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025892" comment="python3-ipalib-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025893" comment="python3-ipaserver-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025894" comment="python3-ipatests-4.9.13-20.module+el8.10.0+23610+7d6e87e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016857" comment="python3-jwcrypto-0.5.0-2.module+el8.10.0+21691+df63127d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025895" comment="python3-kdcproxy-0.4-5.module+el8.10.0+23610+7d6e87e5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016859" comment="python3-pyusb-1.0.0-9.1.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016860" comment="python3-qrcode-5.3-1.module+el8.10.0+22543+0dae60ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016861" comment="python3-qrcode-core-5.3-1.module+el8.10.0+22543+0dae60ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016862" comment="python3-yubico-1.3.2-9.1.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016863" comment="slapi-nis-0.60.0-4.module+el8.10.0+20723+03062ebd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016864" comment="softhsm-2.6.0-5.module+el8.9.0+18911+94941f82 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016865" comment="softhsm-devel-2.6.0-5.module+el8.9.0+18911+94941f82 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1551" version="1" class="patch">
	<metadata>
		<title>Security: Modular advisory idm:client - IdM long term support client module (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>

IdM is an integrated solution to provide centrally managed Identity (users,
hosts, services), Authentication (SSO, 2FA), and Authorization (host access control,
SELinux user roles, services). The solution provides features for further integration
with Linux based clients (SUDO, automount) and integration with Active Directory
based infrastructures (Trusts).


This module stream supports only client side of IdM solution		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025896" comment="ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025897" comment="ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025898" comment="ipa-client-epn-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025899" comment="ipa-client-samba-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025900" comment="ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020108" comment="ipa-healthcheck-core-0.12-6.module+el8.10.0+23404+f6b3454f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025901" comment="ipa-python-compat-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025902" comment="ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025903" comment="python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025904" comment="python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020113" comment="python3-jwcrypto-0.5.0-2.module+el8.10.0+21692+c9b201bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020114" comment="python3-pyusb-1.0.0-9.1.module+el8.9.0+18920+2223d05e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020115" comment="python3-qrcode-5.3-1.module+el8.10.0+22544+6a7f07c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020116" comment="python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020117" comment="python3-yubico-1.3.2-9.1.module+el8.9.0+18920+2223d05e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1552" version="1" class="patch">
	<metadata>
		<title>Important: cloud-init security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="1254092" ref_url="https://bugzilla.suse.com/1254092" source="BUGZILLA"/>
		<description>
The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts.
  Fix(es): cloud-init: Installation error (bsc#1254092).
  		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1254092">SUSE bug 1254092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030164" comment="cloud-init-23.4-7.el8_10.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1553" version="1" class="patch">
	<metadata>
		<title>bugfix update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2021:0621.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2021:0621.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056361" comment="microcode_ctl-20200609-2.20210216.1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1554" version="1" class="patch">
	<metadata>
		<title>bugfix update for opencryptoki (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3798" ref_url="https://www.suse.com/security/cve/CVE-2021-3798/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2021:3054.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2021:3054.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3798/">CVE-2021-3798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3798">CVE-2021-3798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056362" comment="opencryptoki-3.15.1-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056363" comment="opencryptoki-devel-3.15.1-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056364" comment="opencryptoki-icsftok-3.15.1-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056365" comment="opencryptoki-libs-3.15.1-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056366" comment="opencryptoki-swtok-3.15.1-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056367" comment="opencryptoki-tpmtok-3.15.1-6.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1555" version="1" class="patch">
	<metadata>
		<title>bugfix update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:0348.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:0348.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838129" comment="buildah-1.19.9-1.module+el8.5.0+12236+c988d830 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838130" comment="buildah-tests-1.19.9-1.module+el8.5.0+12236+c988d830 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838131" comment="cockpit-podman-29-2.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838132" comment="conmon-2.0.26-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838133" comment="container-selinux-2.167.0-1.module+el8.5.0+12609+beaa716d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838134" comment="containernetworking-plugins-0.9.1-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053513" comment="containers-common-1.2.4-1.module+el8.5.0+13605+73abf821 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838136" comment="crit-3.15-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838137" comment="criu-3.15-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838138" comment="crun-0.18-2.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838139" comment="fuse-overlayfs-1.4.0-2.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838140" comment="libslirp-4.3.1-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838141" comment="libslirp-devel-4.3.1-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838142" comment="oci-seccomp-bpf-hook-1.2.0-3.module+el8.5.0+11073+ba5c6d09 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053514" comment="podman-3.0.1-7.module+el8.5.0+12960+5b7d72b5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053515" comment="podman-catatonit-3.0.1-7.module+el8.5.0+12960+5b7d72b5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053516" comment="podman-docker-3.0.1-7.module+el8.5.0+12960+5b7d72b5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053517" comment="podman-plugins-3.0.1-7.module+el8.5.0+12960+5b7d72b5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053518" comment="podman-remote-3.0.1-7.module+el8.5.0+12960+5b7d72b5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053519" comment="podman-tests-3.0.1-7.module+el8.5.0+12960+5b7d72b5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838149" comment="python3-criu-3.15-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838150" comment="runc-1.0.0-72.rc92.module+el8.5.0+12236+c988d830 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053520" comment="skopeo-1.2.4-1.module+el8.5.0+13605+73abf821 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053521" comment="skopeo-tests-1.2.4-1.module+el8.5.0+13605+73abf821 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838153" comment="slirp4netns-1.1.8-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053522" comment="toolbox-0.0.99.3-1.module+el8.5.0+13746+87221ce8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053523" comment="toolbox-tests-0.0.99.3-1.module+el8.5.0+13746+87221ce8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838156" comment="udica-0.2.4-1.module+el8.5.0+10306+3f72d66d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1556" version="1" class="patch">
	<metadata>
		<title>bugfix update for dotnet3.1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0613" ref_url="https://www.suse.com/security/cve/CVE-2022-0613/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:1386.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:1386.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0613/">CVE-2022-0613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0613">CVE-2022-0613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053524" comment="aspnetcore-runtime-3.1-3.1.24-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053525" comment="aspnetcore-targeting-pack-3.1-3.1.24-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053526" comment="dotnet-apphost-pack-3.1-3.1.24-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053527" comment="dotnet-hostfxr-3.1-3.1.24-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053528" comment="dotnet-runtime-3.1-3.1.24-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053529" comment="dotnet-sdk-3.1-3.1.418-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053530" comment="dotnet-sdk-3.1-source-built-artifacts-3.1.418-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053531" comment="dotnet-targeting-pack-3.1-3.1.24-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053532" comment="dotnet-templates-3.1-3.1.418-1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1557" version="1" class="patch">
	<metadata>
		<title>bugfix update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1650" ref_url="https://www.suse.com/security/cve/CVE-2022-1650/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:5747.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:5747.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1650/">CVE-2022-1650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1650">CVE-2022-1650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053533" comment="aspnetcore-runtime-6.0-6.0.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053534" comment="aspnetcore-targeting-pack-6.0-6.0.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053535" comment="dotnet-6.0.107-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053536" comment="dotnet-apphost-pack-6.0-6.0.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053537" comment="dotnet-host-6.0.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053538" comment="dotnet-hostfxr-6.0-6.0.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053539" comment="dotnet-runtime-6.0-6.0.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053540" comment="dotnet-sdk-6.0-6.0.107-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053541" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.107-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053542" comment="dotnet-targeting-pack-6.0-6.0.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053543" comment="dotnet-templates-6.0-6.0.107-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053544" comment="netstandard-targeting-pack-2.1-6.0.107-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1558" version="1" class="patch">
	<metadata>
		<title>bugfix update for qatzip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-36369" ref_url="https://www.suse.com/security/cve/CVE-2022-36369/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2022:7667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2022:7667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-36369/">CVE-2022-36369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36369">CVE-2022-36369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053545" comment="qatzip-1.0.9-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053546" comment="qatzip-devel-1.0.9-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053547" comment="qatzip-libs-1.0.9-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1559" version="1" class="patch">
	<metadata>
		<title>bugfix update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2023:2977.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2023:2977.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053548" comment="iwl100-firmware-39.31.5.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053549" comment="iwl1000-firmware-39.31.5.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053550" comment="iwl105-firmware-18.168.6.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053551" comment="iwl135-firmware-18.168.6.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053552" comment="iwl2000-firmware-18.168.6.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053553" comment="iwl2030-firmware-18.168.6.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053554" comment="iwl3160-firmware-25.30.13.0-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053555" comment="iwl3945-firmware-15.32.2.9-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053556" comment="iwl4965-firmware-228.61.2.24-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053557" comment="iwl5000-firmware-8.83.5.1_1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053558" comment="iwl5150-firmware-8.24.2.2-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053559" comment="iwl6000-firmware-9.221.4.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053560" comment="iwl6000g2a-firmware-18.168.6.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053561" comment="iwl6000g2b-firmware-18.168.6.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053562" comment="iwl6050-firmware-41.28.5.1-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053563" comment="iwl7260-firmware-25.30.13.0-114.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053564" comment="libertas-sd8686-firmware-20230404-114.git2e92a49f.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053565" comment="libertas-sd8787-firmware-20230404-114.git2e92a49f.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053566" comment="libertas-usb8388-firmware-20230404-114.git2e92a49f.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053567" comment="libertas-usb8388-olpc-firmware-20230404-114.git2e92a49f.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053568" comment="linux-firmware-20230404-114.git2e92a49f.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1560" version="1" class="patch">
	<metadata>
		<title>bugfix update for cifs-utils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2023:3052.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2023:3052.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27239">CVE-2022-27239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053569" comment="cifs-utils-7.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053570" comment="cifs-utils-devel-7.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053571" comment="pam_cifscreds-7.0-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1561" version="1" class="patch">
	<metadata>
		<title>bugfix update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<reference ref_id="CVE-2023-39323" ref_url="https://www.suse.com/security/cve/CVE-2023-39323/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2023:6928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2023:6928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39323/">CVE-2023-39323 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848852" comment="delve-1.20.2-1.module+el8.9.0+18926+5193682d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053572" comment="go-toolset-1.20.10-1.module+el8.9.0+20382+04f7fe80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053573" comment="golang-1.20.10-1.module+el8.9.0+20382+04f7fe80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053574" comment="golang-bin-1.20.10-1.module+el8.9.0+20382+04f7fe80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053575" comment="golang-docs-1.20.10-1.module+el8.9.0+20382+04f7fe80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053576" comment="golang-misc-1.20.10-1.module+el8.9.0+20382+04f7fe80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053577" comment="golang-src-1.20.10-1.module+el8.9.0+20382+04f7fe80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053578" comment="golang-tests-1.20.10-1.module+el8.9.0+20382+04f7fe80 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1562" version="1" class="patch">
	<metadata>
		<title>bugfix update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27635" ref_url="https://www.suse.com/security/cve/CVE-2022-27635/" source="CVE"/>
		<reference ref_id="CVE-2022-36351" ref_url="https://www.suse.com/security/cve/CVE-2022-36351/" source="CVE"/>
		<reference ref_id="CVE-2022-38076" ref_url="https://www.suse.com/security/cve/CVE-2022-38076/" source="CVE"/>
		<reference ref_id="CVE-2022-40964" ref_url="https://www.suse.com/security/cve/CVE-2022-40964/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:0115.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:0115.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-27635/">CVE-2022-27635 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27635">CVE-2022-27635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36351/">CVE-2022-36351 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36351">CVE-2022-36351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38076/">CVE-2022-38076 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38076">CVE-2022-38076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40964/">CVE-2022-40964 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40964">CVE-2022-40964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053579" comment="iwl100-firmware-39.31.5.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053580" comment="iwl1000-firmware-39.31.5.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053581" comment="iwl105-firmware-18.168.6.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053582" comment="iwl135-firmware-18.168.6.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053583" comment="iwl2000-firmware-18.168.6.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053584" comment="iwl2030-firmware-18.168.6.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053585" comment="iwl3160-firmware-25.30.13.0-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053586" comment="iwl3945-firmware-15.32.2.9-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053587" comment="iwl4965-firmware-228.61.2.24-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053588" comment="iwl5000-firmware-8.83.5.1_1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053589" comment="iwl5150-firmware-8.24.2.2-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053590" comment="iwl6000-firmware-9.221.4.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053591" comment="iwl6000g2a-firmware-18.168.6.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053592" comment="iwl6000g2b-firmware-18.168.6.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053593" comment="iwl6050-firmware-41.28.5.1-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053594" comment="iwl7260-firmware-25.30.13.0-120.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053595" comment="libertas-sd8686-firmware-20230824-120.git0e048b06.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053596" comment="libertas-sd8787-firmware-20230824-120.git0e048b06.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053597" comment="libertas-usb8388-firmware-20230824-120.git0e048b06.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053598" comment="libertas-usb8388-olpc-firmware-20230824-120.git0e048b06.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053599" comment="linux-firmware-20230824-120.git0e048b06.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1563" version="1" class="patch">
	<metadata>
		<title>bugfix update for ca-certificates (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-37920" ref_url="https://www.suse.com/security/cve/CVE-2023-37920/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2024:5736.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2024:5736.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37920/">CVE-2023-37920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029760" comment="ca-certificates-2024.2.69_v8.0.303-80.0.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1564" version="1" class="patch">
	<metadata>
		<title>bugfix update for open-vm-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22247" ref_url="https://www.suse.com/security/cve/CVE-2025-22247/" source="CVE"/>
		<description>
This bugfix update provides a functional equivalent of RHBA-2026:0860.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHBA-2026:0860.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22247/">CVE-2025-22247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22247">CVE-2025-22247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041194" comment="open-vm-tools-12.3.5-2.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041195" comment="open-vm-tools-desktop-12.3.5-2.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041196" comment="open-vm-tools-salt-minion-12.3.5-2.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041197" comment="open-vm-tools-sdmp-12.3.5-2.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1565" version="1" class="patch">
	<metadata>
		<title>enhancement update for libarchive (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2021:1580.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2021:1580.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14166">CVE-2017-14166 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14501">CVE-2017-14501 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14502">CVE-2017-14502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056368" comment="bsdtar-3.3.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056369" comment="libarchive-3.3.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056370" comment="libarchive-devel-3.3.3-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1566" version="1" class="patch">
	<metadata>
		<title>enhancement update for libyang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20391" ref_url="https://www.suse.com/security/cve/CVE-2019-20391/" source="CVE"/>
		<reference ref_id="CVE-2019-20392" ref_url="https://www.suse.com/security/cve/CVE-2019-20392/" source="CVE"/>
		<reference ref_id="CVE-2019-20393" ref_url="https://www.suse.com/security/cve/CVE-2019-20393/" source="CVE"/>
		<reference ref_id="CVE-2019-20394" ref_url="https://www.suse.com/security/cve/CVE-2019-20394/" source="CVE"/>
		<reference ref_id="CVE-2019-20395" ref_url="https://www.suse.com/security/cve/CVE-2019-20395/" source="CVE"/>
		<reference ref_id="CVE-2019-20396" ref_url="https://www.suse.com/security/cve/CVE-2019-20396/" source="CVE"/>
		<reference ref_id="CVE-2019-20397" ref_url="https://www.suse.com/security/cve/CVE-2019-20397/" source="CVE"/>
		<reference ref_id="CVE-2019-20398" ref_url="https://www.suse.com/security/cve/CVE-2019-20398/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2021:1906.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2021:1906.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20391/">CVE-2019-20391 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20391">CVE-2019-20391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20392/">CVE-2019-20392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20392">CVE-2019-20392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20393/">CVE-2019-20393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20393">CVE-2019-20393 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20394/">CVE-2019-20394 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20394">CVE-2019-20394 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20395/">CVE-2019-20395 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20395">CVE-2019-20395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20396/">CVE-2019-20396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20396">CVE-2019-20396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20397/">CVE-2019-20397 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20397">CVE-2019-20397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20398/">CVE-2019-20398 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20398">CVE-2019-20398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056371" comment="libyang-1.0.184-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1567" version="1" class="patch">
	<metadata>
		<title>enhancement update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2021-37701" ref_url="https://www.suse.com/security/cve/CVE-2021-37701/" source="CVE"/>
		<reference ref_id="CVE-2021-37712" ref_url="https://www.suse.com/security/cve/CVE-2021-37712/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="CVE-2021-44531" ref_url="https://www.suse.com/security/cve/CVE-2021-44531/" source="CVE"/>
		<reference ref_id="CVE-2021-44532" ref_url="https://www.suse.com/security/cve/CVE-2021-44532/" source="CVE"/>
		<reference ref_id="CVE-2021-44533" ref_url="https://www.suse.com/security/cve/CVE-2021-44533/" source="CVE"/>
		<reference ref_id="CVE-2022-21824" ref_url="https://www.suse.com/security/cve/CVE-2022-21824/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2022:5139.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2022:5139.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22959">CVE-2021-22959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22960">CVE-2021-22960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37701/">CVE-2021-37701 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37701">CVE-2021-37701 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37712/">CVE-2021-37712 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37712">CVE-2021-37712 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">CVE-2021-3918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44531/">CVE-2021-44531 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44531">CVE-2021-44531 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44532/">CVE-2021-44532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44532">CVE-2021-44532 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44533/">CVE-2021-44533 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44533">CVE-2021-44533 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21824/">CVE-2022-21824 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21824">CVE-2022-21824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053600" comment="nodejs-12.22.12-1.module+el8.6.0+15324+1f2c5d8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053601" comment="nodejs-devel-12.22.12-1.module+el8.6.0+15324+1f2c5d8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053602" comment="nodejs-docs-12.22.12-1.module+el8.6.0+15324+1f2c5d8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053603" comment="nodejs-full-i18n-12.22.12-1.module+el8.6.0+15324+1f2c5d8d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837544" comment="nodejs-nodemon-2.0.3-1.module+el8.4.0+11732+c668cc9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053604" comment="npm-6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1568" version="1" class="patch">
	<metadata>
		<title>enhancement update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2023:3850.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2023:3850.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053605" comment="krb5-devel-1.18.2-25.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053606" comment="krb5-libs-1.18.2-25.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053607" comment="krb5-pkinit-1.18.2-25.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053608" comment="krb5-server-1.18.2-25.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053609" comment="krb5-server-ldap-1.18.2-25.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053610" comment="krb5-workstation-1.18.2-25.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053611" comment="libkadm5-1.18.2-25.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1569" version="1" class="patch">
	<metadata>
		<title>enhancement update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216/" source="CVE"/>
		<reference ref_id="CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2023:7117.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2023:7117.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053612" comment="microcode_ctl-20230808-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1570" version="1" class="patch">
	<metadata>
		<title>enhancement update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-34440" ref_url="https://www.suse.com/security/cve/CVE-2023-34440/" source="CVE"/>
		<reference ref_id="CVE-2023-43758" ref_url="https://www.suse.com/security/cve/CVE-2023-43758/" source="CVE"/>
		<reference ref_id="CVE-2024-24582" ref_url="https://www.suse.com/security/cve/CVE-2024-24582/" source="CVE"/>
		<reference ref_id="CVE-2024-28047" ref_url="https://www.suse.com/security/cve/CVE-2024-28047/" source="CVE"/>
		<reference ref_id="CVE-2024-28127" ref_url="https://www.suse.com/security/cve/CVE-2024-28127/" source="CVE"/>
		<reference ref_id="CVE-2024-29214" ref_url="https://www.suse.com/security/cve/CVE-2024-29214/" source="CVE"/>
		<reference ref_id="CVE-2024-31068" ref_url="https://www.suse.com/security/cve/CVE-2024-31068/" source="CVE"/>
		<reference ref_id="CVE-2024-31157" ref_url="https://www.suse.com/security/cve/CVE-2024-31157/" source="CVE"/>
		<reference ref_id="CVE-2024-36293" ref_url="https://www.suse.com/security/cve/CVE-2024-36293/" source="CVE"/>
		<reference ref_id="CVE-2024-39279" ref_url="https://www.suse.com/security/cve/CVE-2024-39279/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2025:3114.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2025:3114.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34440/">CVE-2023-34440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34440">CVE-2023-34440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43758/">CVE-2023-43758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43758">CVE-2023-43758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24582/">CVE-2024-24582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24582">CVE-2024-24582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28047/">CVE-2024-28047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28047">CVE-2024-28047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28127/">CVE-2024-28127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28127">CVE-2024-28127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29214/">CVE-2024-29214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29214">CVE-2024-29214 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-31068/">CVE-2024-31068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31068">CVE-2024-31068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31157/">CVE-2024-31157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31157">CVE-2024-31157 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36293/">CVE-2024-36293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36293">CVE-2024-36293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39279/">CVE-2024-39279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39279">CVE-2024-39279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053613" comment="microcode_ctl-20250211-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1571" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0966.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0966.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831613" comment="firefox-60.6.1-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1572" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0968.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0968.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12180">CVE-2018-12180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831614" comment="edk2-ovmf-20180508gitee3198e672e2-9.el8_0.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1573" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0971.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0971.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831615" comment="ghostscript-9.25-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831616" comment="ghostscript-doc-9.25-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831617" comment="ghostscript-tools-dvipdf-9.25-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831618" comment="ghostscript-tools-fonts-9.25-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831619" comment="ghostscript-tools-printing-9.25-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831620" comment="ghostscript-x11-9.25-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831621" comment="libgs-9.25-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831622" comment="libgs-devel-9.25-2.el8_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1574" version="1" class="patch">
	<metadata>
		<title>security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0972.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0972.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831623" comment="libwsman-devel-2.6.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831624" comment="libwsman1-2.6.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831625" comment="openwsman-client-2.6.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831626" comment="openwsman-python3-2.6.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831627" comment="openwsman-server-2.6.5-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1575" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0975.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0975.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831628" comment="buildah-1.5-3.gite94b4f9.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831629" comment="container-selinux-2.94-1.git1e99f1d.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831630" comment="containernetworking-plugins-0.7.4-3.git9ebe139.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831631" comment="containers-common-0.1.32-3.git1715c90.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831632" comment="fuse-overlayfs-0.3-2.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831633" comment="oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831634" comment="oci-umount-2.3.4-2.git87f9237.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831635" comment="podman-1.0.0-2.git921f98f.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831636" comment="podman-docker-1.0.0-2.git921f98f.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831637" comment="runc-1.0.0-55.rc5.dev.git2abd837.module+el8.0.0+3049+59fd2bba is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831638" comment="skopeo-0.1.32-3.git1715c90.module+el8.0.0+2958+4e823551 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831639" comment="slirp4netns-0.1-2.dev.gitc4e1bc5.module+el8.0.0+2958+4e823551 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1576" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-0211" ref_url="https://www.suse.com/security/cve/CVE-2019-0211/" source="CVE"/>
		<reference ref_id="CVE-2019-0215" ref_url="https://www.suse.com/security/cve/CVE-2019-0215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0980.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0980.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0211/">CVE-2019-0211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0211">CVE-2019-0211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0215/">CVE-2019-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0215">CVE-2019-0215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831640" comment="httpd-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831641" comment="httpd-devel-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831642" comment="httpd-filesystem-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831643" comment="httpd-manual-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831644" comment="httpd-tools-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831645" comment="mod_http2-1.11.3-2.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831646" comment="mod_ldap-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831647" comment="mod_md-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831648" comment="mod_proxy_html-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831649" comment="mod_session-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831650" comment="mod_ssl-2.4.37-11.module+el8.0.0+2969+90015743 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1577" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<reference ref_id="CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0981.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0981.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7164">CVE-2019-7164 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7548">CVE-2019-7548 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831651" comment="babel-2.5.1-9.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831652" comment="python-nose-docs-1.3.7-30.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831653" comment="python-psycopg2-doc-2.7.5-7.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831654" comment="python-sqlalchemy-doc-1.3.2-1.module+el8.0.0+2974+76d21d2e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831655" comment="python2-2.7.15-22.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831656" comment="python2-Cython-0.28.1-7.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831657" comment="python2-PyMySQL-0.8.0-10.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831658" comment="python2-attrs-17.4.0-10.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831659" comment="python2-babel-2.5.1-9.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831660" comment="python2-backports-1.0-15.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831661" comment="python2-backports-ssl_match_hostname-3.5.0.1-11.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831662" comment="python2-bson-3.6.1-9.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831663" comment="python2-chardet-3.0.4-10.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831664" comment="python2-coverage-4.5.1-4.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831665" comment="python2-debug-2.7.15-22.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831666" comment="python2-devel-2.7.15-22.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831667" comment="python2-dns-1.15.0-9.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831668" comment="python2-docs-2.7.15-4.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831669" comment="python2-docs-info-2.7.15-4.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831670" comment="python2-docutils-0.14-12.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831671" comment="python2-funcsigs-1.0.2-13.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831672" comment="python2-idna-2.5-7.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831673" comment="python2-ipaddress-1.0.18-6.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831674" comment="python2-jinja2-2.10-8.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831675" comment="python2-libs-2.7.15-22.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831676" comment="python2-lxml-4.2.3-3.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831677" comment="python2-markupsafe-0.23-19.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831678" comment="python2-mock-2.0.0-13.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831679" comment="python2-nose-1.3.7-30.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831680" comment="python2-numpy-1.14.2-10.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831681" comment="python2-numpy-doc-1.14.2-10.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831682" comment="python2-numpy-f2py-1.14.2-10.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831683" comment="python2-pip-9.0.3-13.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831684" comment="python2-pluggy-0.6.0-8.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831685" comment="python2-psycopg2-2.7.5-7.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831686" comment="python2-psycopg2-debug-2.7.5-7.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831687" comment="python2-psycopg2-tests-2.7.5-7.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831688" comment="python2-py-1.5.3-6.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831689" comment="python2-pygments-2.2.0-20.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831690" comment="python2-pymongo-3.6.1-9.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831691" comment="python2-pymongo-gridfs-3.6.1-9.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831692" comment="python2-pysocks-1.6.8-6.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831693" comment="python2-pytest-3.4.2-13.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831694" comment="python2-pytest-mock-1.9.0-4.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831695" comment="python2-pytz-2017.2-12.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831696" comment="python2-pyyaml-3.12-16.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831697" comment="python2-requests-2.20.0-2.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831698" comment="python2-rpm-macros-3-38.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831699" comment="python2-scipy-1.0.0-19.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831700" comment="python2-setuptools-39.0.1-11.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831701" comment="python2-setuptools_scm-1.15.7-6.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831702" comment="python2-six-1.11.0-5.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831703" comment="python2-sqlalchemy-1.3.2-1.module+el8.0.0+2974+76d21d2e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831704" comment="python2-test-2.7.15-22.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831705" comment="python2-tkinter-2.7.15-22.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831706" comment="python2-tools-2.7.15-22.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831707" comment="python2-urllib3-1.23-7.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831708" comment="python2-virtualenv-15.1.0-18.module+el8.0.0+2961+596d0223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831709" comment="python2-wheel-0.30.0-13.module+el8.0.0+2961+596d0223 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1578" version="1" class="patch">
	<metadata>
		<title>security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5953">CVE-2019-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831710" comment="wget-1.19.5-7.el8_0.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1579" version="1" class="patch">
	<metadata>
		<title>security update for python-PyMySQL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<reference ref_id="CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0984.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0984.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7164">CVE-2019-7164 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7548">CVE-2019-7548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831711" comment="python-nose-docs-1.3.7-30.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831712" comment="python-pymongo-doc-3.6.1-9.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831713" comment="python-sqlalchemy-doc-1.3.2-1.module+el8.0.0+2975+e0f02136 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831714" comment="python-virtualenv-doc-15.1.0-18.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831715" comment="python3-PyMySQL-0.8.0-10.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831716" comment="python3-bson-3.6.1-9.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831717" comment="python3-docs-3.6.7-2.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831718" comment="python3-docutils-0.14-12.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831719" comment="python3-nose-1.3.7-30.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831720" comment="python3-pygments-2.2.0-20.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831721" comment="python3-pymongo-3.6.1-9.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831722" comment="python3-pymongo-gridfs-3.6.1-9.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831723" comment="python3-scipy-1.0.0-19.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831724" comment="python3-sqlalchemy-1.3.2-1.module+el8.0.0+2975+e0f02136 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831725" comment="python3-virtualenv-15.1.0-18.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831726" comment="python3-wheel-0.30.0-13.module+el8.0.0+2966+d39a1df3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831727" comment="python36-3.6.8-2.module+el8.0.0+2975+e0f02136 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831728" comment="python36-debug-3.6.8-2.module+el8.0.0+2975+e0f02136 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831729" comment="python36-devel-3.6.8-2.module+el8.0.0+2975+e0f02136 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831730" comment="python36-rpm-macros-3.6.8-2.module+el8.0.0+2975+e0f02136 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1580" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_mellon (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3878" ref_url="https://www.suse.com/security/cve/CVE-2019-3878/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0985.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0985.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3878/">CVE-2019-3878 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3878">CVE-2019-3878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831731" comment="mod_auth_mellon-0.14.0-3.el8_0.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1581" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0990.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0990.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831732" comment="systemd-239-13.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831733" comment="systemd-container-239-13.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831734" comment="systemd-devel-239-13.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831735" comment="systemd-journal-remote-239-13.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831736" comment="systemd-libs-239-13.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831737" comment="systemd-pam-239-13.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831738" comment="systemd-tests-239-13.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831739" comment="systemd-udev-239-13.el8_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1582" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0997.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0997.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831740" comment="platform-python-3.6.8-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831741" comment="platform-python-debug-3.6.8-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831742" comment="platform-python-devel-3.6.8-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831743" comment="python3-idle-3.6.8-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831744" comment="python3-libs-3.6.8-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831745" comment="python3-test-3.6.8-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831746" comment="python3-tkinter-3.6.8-2.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1583" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11234">CVE-2019-11234 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11235">CVE-2019-11235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831747" comment="freeradius-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831748" comment="freeradius-devel-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831749" comment="freeradius-doc-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831750" comment="freeradius-krb5-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831751" comment="freeradius-ldap-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831752" comment="freeradius-mysql-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831753" comment="freeradius-perl-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831754" comment="freeradius-postgresql-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831755" comment="freeradius-rest-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831756" comment="freeradius-sqlite-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831757" comment="freeradius-unixODBC-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831758" comment="freeradius-utils-3.0.17-4.module+el8.0.0+3108+851cb559 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1584" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10063" ref_url="https://www.suse.com/security/cve/CVE-2019-10063/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10063/">CVE-2019-10063 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10063">CVE-2019-10063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831759" comment="flatpak-1.0.6-3.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831760" comment="flatpak-libs-1.0.6-3.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1585" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2018-18509" ref_url="https://www.suse.com/security/cve/CVE-2018-18509/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1144.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1144.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18509/">CVE-2018-18509 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18509">CVE-2018-18509 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831761" comment="thunderbird-60.6.1-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1586" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831762" comment="bind-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831763" comment="bind-chroot-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831764" comment="bind-devel-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831765" comment="bind-export-devel-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831766" comment="bind-export-libs-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831767" comment="bind-libs-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831768" comment="bind-libs-lite-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831769" comment="bind-license-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831770" comment="bind-lite-devel-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831771" comment="bind-pkcs11-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831772" comment="bind-pkcs11-devel-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831773" comment="bind-pkcs11-libs-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831774" comment="bind-pkcs11-utils-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831775" comment="bind-sdb-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831776" comment="bind-sdb-chroot-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831777" comment="bind-utils-9.11.4-17.P2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831778" comment="python3-bind-9.11.4-17.P2.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1587" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1146.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1146.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831779" comment="java-1.8.0-openjdk-1.8.0.212.b04-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831780" comment="java-1.8.0-openjdk-accessibility-1.8.0.212.b04-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831781" comment="java-1.8.0-openjdk-demo-1.8.0.212.b04-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831782" comment="java-1.8.0-openjdk-devel-1.8.0.212.b04-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831783" comment="java-1.8.0-openjdk-headless-1.8.0.212.b04-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831784" comment="java-1.8.0-openjdk-javadoc-1.8.0.212.b04-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831785" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.212.b04-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831786" comment="java-1.8.0-openjdk-src-1.8.0.212.b04-1.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1588" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1152.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1152.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10906">CVE-2019-10906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831787" comment="python3-jinja2-2.10.1-2.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1589" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-9003" ref_url="https://www.suse.com/security/cve/CVE-2019-9003/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1167.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1167.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9003/">CVE-2019-9003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9003">CVE-2019-9003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831788" comment="bpftool-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831789" comment="kernel-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831790" comment="kernel-abi-whitelists-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831791" comment="kernel-core-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831792" comment="kernel-cross-headers-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831793" comment="kernel-debug-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831794" comment="kernel-debug-core-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831796" comment="kernel-debug-modules-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831797" comment="kernel-debug-modules-extra-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831799" comment="kernel-doc-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831800" comment="kernel-headers-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831801" comment="kernel-modules-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831802" comment="kernel-modules-extra-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831803" comment="kernel-tools-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831804" comment="kernel-tools-libs-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831806" comment="perf-4.18.0-80.1.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831807" comment="python3-perf-4.18.0-80.1.2.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1590" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1175.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1175.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831808" comment="hivex-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831809" comment="hivex-devel-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831810" comment="libguestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831811" comment="libguestfs-bash-completion-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831812" comment="libguestfs-benchmarking-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831813" comment="libguestfs-devel-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831814" comment="libguestfs-gfs2-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831815" comment="libguestfs-gobject-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831816" comment="libguestfs-gobject-devel-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831817" comment="libguestfs-inspect-icons-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831818" comment="libguestfs-java-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831819" comment="libguestfs-java-devel-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831820" comment="libguestfs-javadoc-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831821" comment="libguestfs-man-pages-ja-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831822" comment="libguestfs-man-pages-uk-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831823" comment="libguestfs-rescue-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831824" comment="libguestfs-rsync-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831825" comment="libguestfs-tools-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831826" comment="libguestfs-tools-c-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831827" comment="libguestfs-winsupport-8.0-2.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831828" comment="libguestfs-xfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831829" comment="libiscsi-1.18.0-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831830" comment="libiscsi-devel-1.18.0-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831831" comment="libiscsi-utils-1.18.0-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831832" comment="libssh2-1.8.0-7.module+el8.0.0+3075+09be6b65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831833" comment="libvirt-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831834" comment="libvirt-admin-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831835" comment="libvirt-bash-completion-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831836" comment="libvirt-client-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831837" comment="libvirt-daemon-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831838" comment="libvirt-daemon-config-network-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831839" comment="libvirt-daemon-config-nwfilter-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831840" comment="libvirt-daemon-driver-interface-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831841" comment="libvirt-daemon-driver-network-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831842" comment="libvirt-daemon-driver-nodedev-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831843" comment="libvirt-daemon-driver-nwfilter-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831844" comment="libvirt-daemon-driver-qemu-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831845" comment="libvirt-daemon-driver-secret-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831846" comment="libvirt-daemon-driver-storage-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831847" comment="libvirt-daemon-driver-storage-core-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831848" comment="libvirt-daemon-driver-storage-disk-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831849" comment="libvirt-daemon-driver-storage-gluster-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831850" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831851" comment="libvirt-daemon-driver-storage-logical-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831852" comment="libvirt-daemon-driver-storage-mpath-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831853" comment="libvirt-daemon-driver-storage-rbd-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831854" comment="libvirt-daemon-driver-storage-scsi-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831855" comment="libvirt-daemon-kvm-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831856" comment="libvirt-dbus-1.2.0-2.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831857" comment="libvirt-devel-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831858" comment="libvirt-docs-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831859" comment="libvirt-libs-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831860" comment="libvirt-lock-sanlock-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831861" comment="libvirt-nss-4.5.0-23.1.module+el8.0.0+3151+3ba813f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831862" comment="lua-guestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831863" comment="nbdkit-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831864" comment="nbdkit-bash-completion-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831865" comment="nbdkit-basic-plugins-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831866" comment="nbdkit-devel-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831867" comment="nbdkit-example-plugins-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831868" comment="nbdkit-plugin-gzip-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831869" comment="nbdkit-plugin-python-common-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831870" comment="nbdkit-plugin-python3-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831871" comment="nbdkit-plugin-vddk-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831872" comment="nbdkit-plugin-xz-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831873" comment="netcf-0.2.8-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831874" comment="netcf-devel-0.2.8-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831875" comment="netcf-libs-0.2.8-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831876" comment="perl-Sys-Guestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831877" comment="perl-Sys-Virt-4.5.0-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831878" comment="perl-hivex-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831879" comment="python3-hivex-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831880" comment="python3-libguestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831881" comment="python3-libvirt-4.5.0-1.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831882" comment="qemu-guest-agent-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831883" comment="qemu-img-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831884" comment="qemu-kvm-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831885" comment="qemu-kvm-block-curl-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831886" comment="qemu-kvm-block-gluster-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831887" comment="qemu-kvm-block-iscsi-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831888" comment="qemu-kvm-block-rbd-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831889" comment="qemu-kvm-block-ssh-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831890" comment="qemu-kvm-common-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831891" comment="qemu-kvm-core-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831892" comment="ruby-hivex-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831893" comment="ruby-libguestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831894" comment="seabios-1.11.1-3.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831895" comment="seabios-bin-1.11.1-3.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831896" comment="seavgabios-bin-1.11.1-3.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831897" comment="sgabios-0.20170427git-2.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831898" comment="sgabios-bin-0.20170427git-2.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831899" comment="supermin-5.1.19-8.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831900" comment="supermin-devel-5.1.19-8.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831901" comment="virt-dib-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831902" comment="virt-p2v-maker-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831903" comment="virt-v2v-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1591" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-0757" ref_url="https://www.suse.com/security/cve/CVE-2019-0757/" source="CVE"/>
		<reference ref_id="CVE-2019-0820" ref_url="https://www.suse.com/security/cve/CVE-2019-0820/" source="CVE"/>
		<reference ref_id="CVE-2019-0980" ref_url="https://www.suse.com/security/cve/CVE-2019-0980/" source="CVE"/>
		<reference ref_id="CVE-2019-0981" ref_url="https://www.suse.com/security/cve/CVE-2019-0981/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1259.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1259.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0757/">CVE-2019-0757 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0757">CVE-2019-0757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0820/">CVE-2019-0820 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0820">CVE-2019-0820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0980/">CVE-2019-0980 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0980">CVE-2019-0980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0981/">CVE-2019-0981 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0981">CVE-2019-0981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831904" comment="dotnet-2.1.507-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831905" comment="dotnet-host-2.1.11-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831906" comment="dotnet-host-fxr-2.1-2.1.11-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831907" comment="dotnet-runtime-2.1-2.1.11-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831908" comment="dotnet-sdk-2.1-2.1.507-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831909" comment="dotnet-sdk-2.1.5xx-2.1.507-2.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1592" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1268.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1268.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10132">CVE-2019-10132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831808" comment="hivex-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831809" comment="hivex-devel-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831810" comment="libguestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831811" comment="libguestfs-bash-completion-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831812" comment="libguestfs-benchmarking-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831813" comment="libguestfs-devel-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831814" comment="libguestfs-gfs2-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831815" comment="libguestfs-gobject-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831816" comment="libguestfs-gobject-devel-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831817" comment="libguestfs-inspect-icons-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831818" comment="libguestfs-java-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831819" comment="libguestfs-java-devel-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831820" comment="libguestfs-javadoc-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831821" comment="libguestfs-man-pages-ja-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831822" comment="libguestfs-man-pages-uk-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831823" comment="libguestfs-rescue-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831824" comment="libguestfs-rsync-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831825" comment="libguestfs-tools-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831826" comment="libguestfs-tools-c-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831827" comment="libguestfs-winsupport-8.0-2.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831828" comment="libguestfs-xfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831829" comment="libiscsi-1.18.0-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831830" comment="libiscsi-devel-1.18.0-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831831" comment="libiscsi-utils-1.18.0-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831832" comment="libssh2-1.8.0-7.module+el8.0.0+3075+09be6b65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831910" comment="libvirt-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831911" comment="libvirt-admin-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831912" comment="libvirt-bash-completion-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831913" comment="libvirt-client-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831914" comment="libvirt-daemon-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831915" comment="libvirt-daemon-config-network-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831916" comment="libvirt-daemon-config-nwfilter-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831917" comment="libvirt-daemon-driver-interface-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831918" comment="libvirt-daemon-driver-network-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831919" comment="libvirt-daemon-driver-nodedev-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831920" comment="libvirt-daemon-driver-nwfilter-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831921" comment="libvirt-daemon-driver-qemu-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831922" comment="libvirt-daemon-driver-secret-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831923" comment="libvirt-daemon-driver-storage-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831924" comment="libvirt-daemon-driver-storage-core-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831925" comment="libvirt-daemon-driver-storage-disk-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831926" comment="libvirt-daemon-driver-storage-gluster-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831927" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831928" comment="libvirt-daemon-driver-storage-logical-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831929" comment="libvirt-daemon-driver-storage-mpath-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831930" comment="libvirt-daemon-driver-storage-rbd-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831931" comment="libvirt-daemon-driver-storage-scsi-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831932" comment="libvirt-daemon-kvm-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831856" comment="libvirt-dbus-1.2.0-2.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831933" comment="libvirt-devel-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831934" comment="libvirt-docs-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831935" comment="libvirt-libs-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831936" comment="libvirt-lock-sanlock-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831937" comment="libvirt-nss-4.5.0-23.2.module+el8.0.0+3213+f56c86d8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831862" comment="lua-guestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831863" comment="nbdkit-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831864" comment="nbdkit-bash-completion-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831865" comment="nbdkit-basic-plugins-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831866" comment="nbdkit-devel-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831867" comment="nbdkit-example-plugins-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831868" comment="nbdkit-plugin-gzip-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831869" comment="nbdkit-plugin-python-common-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831870" comment="nbdkit-plugin-python3-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831871" comment="nbdkit-plugin-vddk-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831872" comment="nbdkit-plugin-xz-1.4.2-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831873" comment="netcf-0.2.8-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831874" comment="netcf-devel-0.2.8-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831875" comment="netcf-libs-0.2.8-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831876" comment="perl-Sys-Guestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831877" comment="perl-Sys-Virt-4.5.0-4.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831878" comment="perl-hivex-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831879" comment="python3-hivex-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831880" comment="python3-libguestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831881" comment="python3-libvirt-4.5.0-1.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831882" comment="qemu-guest-agent-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831883" comment="qemu-img-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831884" comment="qemu-kvm-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831885" comment="qemu-kvm-block-curl-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831886" comment="qemu-kvm-block-gluster-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831887" comment="qemu-kvm-block-iscsi-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831888" comment="qemu-kvm-block-rbd-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831889" comment="qemu-kvm-block-ssh-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831890" comment="qemu-kvm-common-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831891" comment="qemu-kvm-core-2.12.0-64.module+el8.0.0+3180+d6a3561d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831892" comment="ruby-hivex-1.3.15-6.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831893" comment="ruby-libguestfs-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831894" comment="seabios-1.11.1-3.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831895" comment="seabios-bin-1.11.1-3.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831896" comment="seavgabios-bin-1.11.1-3.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831897" comment="sgabios-0.20170427git-2.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831898" comment="sgabios-bin-0.20170427git-2.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831899" comment="supermin-5.1.19-8.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831900" comment="supermin-devel-5.1.19-8.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831901" comment="virt-dib-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831902" comment="virt-p2v-maker-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831903" comment="virt-v2v-1.38.4-10.module+el8.0.0+3075+09be6b65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1593" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1269.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1269.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18511">CVE-2018-18511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9797">CVE-2019-9797 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831938" comment="firefox-60.7.0-1.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1594" version="1" class="patch">
	<metadata>
		<title>security update for pacemaker (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-16877" ref_url="https://www.suse.com/security/cve/CVE-2018-16877/" source="CVE"/>
		<reference ref_id="CVE-2018-16878" ref_url="https://www.suse.com/security/cve/CVE-2018-16878/" source="CVE"/>
		<reference ref_id="CVE-2019-3885" ref_url="https://www.suse.com/security/cve/CVE-2019-3885/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1279.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1279.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16877/">CVE-2018-16877 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16877">CVE-2018-16877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16878/">CVE-2018-16878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16878">CVE-2018-16878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3885/">CVE-2019-3885 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3885">CVE-2019-3885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831939" comment="pacemaker-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831940" comment="pacemaker-cli-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831941" comment="pacemaker-cluster-libs-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831942" comment="pacemaker-cts-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831943" comment="pacemaker-doc-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831944" comment="pacemaker-libs-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831945" comment="pacemaker-libs-devel-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831946" comment="pacemaker-nagios-plugins-metadata-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831947" comment="pacemaker-remote-2.0.1-4.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831948" comment="pacemaker-schemas-2.0.1-4.el8_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1595" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1308.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1308.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18511">CVE-2018-18511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9797">CVE-2019-9797 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831949" comment="thunderbird-60.7.0-1.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1596" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1479.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1479.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9213">CVE-2019-9213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831950" comment="bpftool-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831951" comment="kernel-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831952" comment="kernel-abi-whitelists-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831953" comment="kernel-core-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831954" comment="kernel-cross-headers-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831955" comment="kernel-debug-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831956" comment="kernel-debug-core-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831958" comment="kernel-debug-modules-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831959" comment="kernel-debug-modules-extra-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831961" comment="kernel-doc-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831962" comment="kernel-headers-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831963" comment="kernel-modules-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831964" comment="kernel-modules-extra-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831965" comment="kernel-tools-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831966" comment="kernel-tools-libs-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831968" comment="perf-4.18.0-80.4.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831969" comment="python3-perf-4.18.0-80.4.2.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1597" version="1" class="patch">
	<metadata>
		<title>security update for gvfs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3827" ref_url="https://www.suse.com/security/cve/CVE-2019-3827/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1517.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1517.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3827/">CVE-2019-3827 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3827">CVE-2019-3827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831970" comment="gvfs-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831971" comment="gvfs-afc-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831972" comment="gvfs-afp-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831973" comment="gvfs-archive-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831974" comment="gvfs-client-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831975" comment="gvfs-devel-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831976" comment="gvfs-fuse-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831977" comment="gvfs-goa-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831978" comment="gvfs-gphoto2-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831979" comment="gvfs-mtp-1.36.2-2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831980" comment="gvfs-smb-1.36.2-2.el8_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1598" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1518.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1518.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831981" comment="java-11-openjdk-11.0.3.7-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831982" comment="java-11-openjdk-demo-11.0.3.7-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831983" comment="java-11-openjdk-devel-11.0.3.7-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831984" comment="java-11-openjdk-headless-11.0.3.7-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831985" comment="java-11-openjdk-javadoc-11.0.3.7-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831986" comment="java-11-openjdk-javadoc-zip-11.0.3.7-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831987" comment="java-11-openjdk-jmods-11.0.3.7-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831988" comment="java-11-openjdk-src-11.0.3.7-2.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1599" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9741" ref_url="https://www.suse.com/security/cve/CVE-2019-9741/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1519.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1519.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9741/">CVE-2019-9741 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9741">CVE-2019-9741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831989" comment="go-toolset-1.11.5-2.module+el8.0.0+3175+261ae921 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831990" comment="golang-1.11.5-2.module+el8.0.0+3175+261ae921 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831991" comment="golang-bin-1.11.5-2.module+el8.0.0+3175+261ae921 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831992" comment="golang-docs-1.11.5-2.module+el8.0.0+3175+261ae921 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831993" comment="golang-misc-1.11.5-2.module+el8.0.0+3175+261ae921 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831994" comment="golang-race-1.11.5-2.module+el8.0.0+3175+261ae921 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831995" comment="golang-src-1.11.5-2.module+el8.0.0+3175+261ae921 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831996" comment="golang-tests-1.11.5-2.module+el8.0.0+3175+261ae921 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1600" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-collections (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<reference ref_id="CVE-2018-8037" ref_url="https://www.suse.com/security/cve/CVE-2018-8037/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1529.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1529.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-8037/">CVE-2018-8037 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8037">CVE-2018-8037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831997" comment="apache-commons-collections-3.2.2-10.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831998" comment="apache-commons-lang-2.6-21.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831999" comment="bea-stax-api-1.2.0-16.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832000" comment="glassfish-fastinfoset-1.2.13-9.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832001" comment="glassfish-jaxb-api-2.2.12-8.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832002" comment="glassfish-jaxb-core-2.2.11-11.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832003" comment="glassfish-jaxb-runtime-2.2.11-11.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832004" comment="glassfish-jaxb-txw2-2.2.11-11.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832005" comment="jackson-annotations-2.9.8-1.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832006" comment="jackson-core-2.9.8-1.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832007" comment="jackson-databind-2.9.8-1.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832008" comment="jackson-jaxrs-json-provider-2.9.8-1.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832009" comment="jackson-jaxrs-providers-2.9.8-1.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832010" comment="jackson-module-jaxb-annotations-2.7.6-4.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832011" comment="jakarta-commons-httpclient-3.1-28.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832012" comment="javassist-3.18.1-8.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832013" comment="javassist-javadoc-3.18.1-8.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832014" comment="pki-servlet-4.0-api-9.0.7-14.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832015" comment="pki-servlet-container-9.0.7-14.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832016" comment="python-nss-doc-1.0.1-10.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832017" comment="python3-nss-1.0.1-10.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832018" comment="relaxngDatatype-2011.1-7.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832019" comment="resteasy-3.0.26-3.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832020" comment="slf4j-1.7.25-4.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832021" comment="slf4j-jdk14-1.7.25-4.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832022" comment="stax-ex-1.7.7-8.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832023" comment="velocity-1.7-24.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832024" comment="xalan-j2-2.7.1-38.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832025" comment="xerces-j2-2.11.0-34.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832026" comment="xml-commons-apis-1.4.01-25.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832027" comment="xml-commons-resolver-1.2-26.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832028" comment="xmlstreambuffer-1.5.4-8.module+el8.0.0+3248+9d514f3b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832029" comment="xsom-0-19.20110809svn.module+el8.0.0+3248+9d514f3b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1601" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1580.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1580.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10166">CVE-2019-10166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10168">CVE-2019-10168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832030" comment="hivex-1.3.15-6.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832031" comment="hivex-devel-1.3.15-6.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832032" comment="libguestfs-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832033" comment="libguestfs-bash-completion-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832034" comment="libguestfs-benchmarking-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832035" comment="libguestfs-devel-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832036" comment="libguestfs-gfs2-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832037" comment="libguestfs-gobject-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832038" comment="libguestfs-gobject-devel-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832039" comment="libguestfs-inspect-icons-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832040" comment="libguestfs-java-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832041" comment="libguestfs-java-devel-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832042" comment="libguestfs-javadoc-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832043" comment="libguestfs-man-pages-ja-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832044" comment="libguestfs-man-pages-uk-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832045" comment="libguestfs-rescue-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832046" comment="libguestfs-rsync-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832047" comment="libguestfs-tools-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832048" comment="libguestfs-tools-c-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832049" comment="libguestfs-winsupport-8.0-2.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832050" comment="libguestfs-xfs-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832051" comment="libiscsi-1.18.0-6.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832052" comment="libiscsi-devel-1.18.0-6.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832053" comment="libiscsi-utils-1.18.0-6.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832054" comment="libssh2-1.8.0-7.module+el8.0.0.z+3418+a72cf898.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832055" comment="libvirt-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832056" comment="libvirt-admin-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832057" comment="libvirt-bash-completion-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832058" comment="libvirt-client-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832059" comment="libvirt-daemon-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832060" comment="libvirt-daemon-config-network-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832061" comment="libvirt-daemon-config-nwfilter-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832062" comment="libvirt-daemon-driver-interface-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832063" comment="libvirt-daemon-driver-network-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832064" comment="libvirt-daemon-driver-nodedev-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832065" comment="libvirt-daemon-driver-nwfilter-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832066" comment="libvirt-daemon-driver-qemu-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832067" comment="libvirt-daemon-driver-secret-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832068" comment="libvirt-daemon-driver-storage-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832069" comment="libvirt-daemon-driver-storage-core-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832070" comment="libvirt-daemon-driver-storage-disk-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832071" comment="libvirt-daemon-driver-storage-gluster-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832072" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832073" comment="libvirt-daemon-driver-storage-logical-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832074" comment="libvirt-daemon-driver-storage-mpath-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832075" comment="libvirt-daemon-driver-storage-rbd-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832076" comment="libvirt-daemon-driver-storage-scsi-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832077" comment="libvirt-daemon-kvm-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832078" comment="libvirt-dbus-1.2.0-2.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832079" comment="libvirt-devel-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832080" comment="libvirt-docs-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832081" comment="libvirt-libs-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832082" comment="libvirt-lock-sanlock-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832083" comment="libvirt-nss-4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832084" comment="lua-guestfs-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832085" comment="nbdkit-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832086" comment="nbdkit-bash-completion-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832087" comment="nbdkit-basic-plugins-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832088" comment="nbdkit-devel-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832089" comment="nbdkit-example-plugins-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832090" comment="nbdkit-plugin-gzip-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832091" comment="nbdkit-plugin-python-common-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832092" comment="nbdkit-plugin-python3-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832093" comment="nbdkit-plugin-vddk-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832094" comment="nbdkit-plugin-xz-1.4.2-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832095" comment="netcf-0.2.8-10.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832096" comment="netcf-devel-0.2.8-10.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832097" comment="netcf-libs-0.2.8-10.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832098" comment="perl-Sys-Guestfs-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832099" comment="perl-Sys-Virt-4.5.0-4.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832100" comment="perl-hivex-1.3.15-6.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832101" comment="python3-hivex-1.3.15-6.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832102" comment="python3-libguestfs-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832103" comment="python3-libvirt-4.5.0-1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832104" comment="qemu-guest-agent-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832105" comment="qemu-img-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832106" comment="qemu-kvm-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832107" comment="qemu-kvm-block-curl-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832108" comment="qemu-kvm-block-gluster-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832109" comment="qemu-kvm-block-iscsi-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832110" comment="qemu-kvm-block-rbd-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832111" comment="qemu-kvm-block-ssh-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832112" comment="qemu-kvm-common-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832113" comment="qemu-kvm-core-2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832114" comment="ruby-hivex-1.3.15-6.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832115" comment="ruby-libguestfs-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832116" comment="seabios-1.11.1-3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832117" comment="seabios-bin-1.11.1-3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832118" comment="seavgabios-bin-1.11.1-3.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832119" comment="sgabios-0.20170427git-2.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832120" comment="sgabios-bin-0.20170427git-2.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832121" comment="supermin-5.1.19-8.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832122" comment="supermin-devel-5.1.19-8.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832123" comment="virt-dib-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832124" comment="virt-p2v-maker-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832125" comment="virt-v2v-1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1602" version="1" class="patch">
	<metadata>
		<title>security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1619.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1619.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825885" comment="vim-X11-8.0.1763-11.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825886" comment="vim-common-8.0.1763-11.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825887" comment="vim-enhanced-8.0.1763-11.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825888" comment="vim-filesystem-8.0.1763-11.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825889" comment="vim-minimal-8.0.1763-11.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1603" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11703" ref_url="https://www.suse.com/security/cve/CVE-2019-11703/" source="CVE"/>
		<reference ref_id="CVE-2019-11704" ref_url="https://www.suse.com/security/cve/CVE-2019-11704/" source="CVE"/>
		<reference ref_id="CVE-2019-11705" ref_url="https://www.suse.com/security/cve/CVE-2019-11705/" source="CVE"/>
		<reference ref_id="CVE-2019-11706" ref_url="https://www.suse.com/security/cve/CVE-2019-11706/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1623.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1623.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11703/">CVE-2019-11703 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11703">CVE-2019-11703 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11704/">CVE-2019-11704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11704">CVE-2019-11704 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11705/">CVE-2019-11705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11705">CVE-2019-11705 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11706/">CVE-2019-11706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11706">CVE-2019-11706 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832126" comment="thunderbird-60.7.2-2.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1604" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1696.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1696.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832127" comment="firefox-60.7.2-3.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1605" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1714.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1714.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6471">CVE-2019-6471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832128" comment="bind-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832129" comment="bind-chroot-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832130" comment="bind-devel-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832131" comment="bind-export-devel-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832132" comment="bind-export-libs-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832133" comment="bind-libs-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832134" comment="bind-libs-lite-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832135" comment="bind-license-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832136" comment="bind-lite-devel-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832137" comment="bind-pkcs11-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832138" comment="bind-pkcs11-devel-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832139" comment="bind-pkcs11-libs-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832140" comment="bind-pkcs11-utils-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832141" comment="bind-sdb-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832142" comment="bind-sdb-chroot-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832143" comment="bind-utils-9.11.4-17.P2.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832144" comment="python3-bind-9.11.4-17.P2.el8_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1606" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1764.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1764.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832145" comment="firefox-60.8.0-1.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1607" version="1" class="patch">
	<metadata>
		<title>security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11356" ref_url="https://www.suse.com/security/cve/CVE-2019-11356/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1771.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1771.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11356/">CVE-2019-11356 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11356">CVE-2019-11356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832146" comment="cyrus-imapd-3.0.7-15.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832147" comment="cyrus-imapd-utils-3.0.7-15.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832148" comment="cyrus-imapd-vzic-3.0.7-15.el8_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1608" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1799.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1799.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832149" comment="thunderbird-60.8.0-1.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1609" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1816.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1816.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832150" comment="java-1.8.0-openjdk-1.8.0.222.b10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832151" comment="java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832152" comment="java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832153" comment="java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832154" comment="java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832155" comment="java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832156" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832157" comment="java-1.8.0-openjdk-src-1.8.0.222.b10-0.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1610" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2818" ref_url="https://www.suse.com/security/cve/CVE-2019-2818/" source="CVE"/>
		<reference ref_id="CVE-2019-2821" ref_url="https://www.suse.com/security/cve/CVE-2019-2821/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1817.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1817.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2818/">CVE-2019-2818 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2818">CVE-2019-2818 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2821/">CVE-2019-2821 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2821">CVE-2019-2821 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832158" comment="java-11-openjdk-11.0.4.11-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832159" comment="java-11-openjdk-demo-11.0.4.11-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832160" comment="java-11-openjdk-devel-11.0.4.11-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832161" comment="java-11-openjdk-headless-11.0.4.11-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832162" comment="java-11-openjdk-javadoc-11.0.4.11-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832163" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832164" comment="java-11-openjdk-jmods-11.0.4.11-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832165" comment="java-11-openjdk-src-11.0.4.11-0.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1611" version="1" class="patch">
	<metadata>
		<title>security update for nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18508" ref_url="https://www.suse.com/security/cve/CVE-2018-18508/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-17007" ref_url="https://www.suse.com/security/cve/CVE-2019-17007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18508/">CVE-2018-18508 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18508">CVE-2018-18508 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17007/">CVE-2019-17007 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17007">CVE-2019-17007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832166" comment="nspr-4.21.0-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832167" comment="nspr-devel-4.21.0-2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832168" comment="nss-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832169" comment="nss-devel-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832170" comment="nss-softokn-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832171" comment="nss-softokn-devel-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832172" comment="nss-softokn-freebl-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832173" comment="nss-softokn-freebl-devel-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832174" comment="nss-sysinit-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832175" comment="nss-tools-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832176" comment="nss-util-3.44.0-7.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832177" comment="nss-util-devel-3.44.0-7.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1612" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784/" source="CVE"/>
		<reference ref_id="CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-11811" ref_url="https://www.suse.com/security/cve/CVE-2019-11811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1959.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1959.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20784">CVE-2018-20784 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11085">CVE-2019-11085 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11811/">CVE-2019-11811 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11811">CVE-2019-11811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832178" comment="bpftool-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832179" comment="kernel-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832180" comment="kernel-abi-whitelists-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832181" comment="kernel-core-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832182" comment="kernel-cross-headers-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832183" comment="kernel-debug-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832184" comment="kernel-debug-core-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832186" comment="kernel-debug-modules-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832187" comment="kernel-debug-modules-extra-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832189" comment="kernel-doc-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832190" comment="kernel-headers-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832191" comment="kernel-modules-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832192" comment="kernel-modules-extra-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832193" comment="kernel-tools-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832194" comment="kernel-tools-libs-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832196" comment="perf-4.18.0-80.7.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832197" comment="python3-perf-4.18.0-80.7.1.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1613" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1972.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1972.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832198" comment="ruby-2.5.3-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832199" comment="ruby-devel-2.5.3-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832200" comment="ruby-doc-2.5.3-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832201" comment="ruby-irb-2.5.3-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832202" comment="ruby-libs-2.5.3-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832203" comment="rubygem-abrt-0.3.0-4.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832204" comment="rubygem-abrt-doc-0.3.0-4.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832205" comment="rubygem-bigdecimal-1.3.4-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832206" comment="rubygem-bson-4.3.0-2.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832207" comment="rubygem-bson-doc-4.3.0-2.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832208" comment="rubygem-bundler-1.16.1-3.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832209" comment="rubygem-bundler-doc-1.16.1-3.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832210" comment="rubygem-did_you_mean-1.2.0-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832211" comment="rubygem-io-console-0.4.6-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832212" comment="rubygem-json-2.1.0-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832213" comment="rubygem-minitest-5.10.3-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832214" comment="rubygem-mongo-2.5.1-2.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832215" comment="rubygem-mongo-doc-2.5.1-2.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832216" comment="rubygem-mysql2-0.4.10-4.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832217" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832218" comment="rubygem-net-telnet-0.1.1-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832219" comment="rubygem-openssl-2.1.2-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832220" comment="rubygem-pg-1.0.0-2.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832221" comment="rubygem-pg-doc-1.0.0-2.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832222" comment="rubygem-power_assert-1.1.1-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832223" comment="rubygem-psych-3.0.2-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832224" comment="rubygem-rake-12.3.0-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832225" comment="rubygem-rdoc-6.0.1-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832226" comment="rubygem-test-unit-3.2.7-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832227" comment="rubygem-xmlrpc-0.3.0-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832228" comment="rubygems-2.7.6-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832229" comment="rubygems-devel-2.7.6-104.module+el8.0.0+3250+4b7d6d43 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1614" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10192" ref_url="https://www.suse.com/security/cve/CVE-2019-10192/" source="CVE"/>
		<reference ref_id="CVE-2019-10193" ref_url="https://www.suse.com/security/cve/CVE-2019-10193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2002.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2002.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10192/">CVE-2019-10192 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10192">CVE-2019-10192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10193/">CVE-2019-10193 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10193">CVE-2019-10193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832230" comment="redis-5.0.3-2.module+el8.0.0.z+3657+acb471dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832231" comment="redis-devel-5.0.3-2.module+el8.0.0.z+3657+acb471dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832232" comment="redis-doc-5.0.3-2.module+el8.0.0.z+3657+acb471dc is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1615" version="1" class="patch">
	<metadata>
		<title>security update for icedtea-web (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10181" ref_url="https://www.suse.com/security/cve/CVE-2019-10181/" source="CVE"/>
		<reference ref_id="CVE-2019-10182" ref_url="https://www.suse.com/security/cve/CVE-2019-10182/" source="CVE"/>
		<reference ref_id="CVE-2019-10185" ref_url="https://www.suse.com/security/cve/CVE-2019-10185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2004.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2004.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10181/">CVE-2019-10181 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10181">CVE-2019-10181 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10182/">CVE-2019-10182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10182">CVE-2019-10182 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10185/">CVE-2019-10185 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10185">CVE-2019-10185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832233" comment="icedtea-web-1.7.1-17.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832234" comment="icedtea-web-javadoc-1.7.1-17.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1616" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2411.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2411.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13272">CVE-2019-13272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832235" comment="bpftool-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832236" comment="kernel-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832237" comment="kernel-abi-whitelists-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832238" comment="kernel-core-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832239" comment="kernel-cross-headers-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832240" comment="kernel-debug-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832241" comment="kernel-debug-core-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832243" comment="kernel-debug-modules-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832244" comment="kernel-debug-modules-extra-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832246" comment="kernel-doc-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832247" comment="kernel-headers-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832248" comment="kernel-modules-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832249" comment="kernel-modules-extra-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832250" comment="kernel-tools-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832251" comment="kernel-tools-libs-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832253" comment="perf-4.18.0-80.7.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832254" comment="python3-perf-4.18.0-80.7.2.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1617" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2465.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2465.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10216">CVE-2019-10216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832255" comment="ghostscript-9.25-2.el8_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832256" comment="ghostscript-doc-9.25-2.el8_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832257" comment="ghostscript-tools-dvipdf-9.25-2.el8_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832258" comment="ghostscript-tools-fonts-9.25-2.el8_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832259" comment="ghostscript-tools-printing-9.25-2.el8_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832260" comment="ghostscript-x11-9.25-2.el8_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832261" comment="libgs-9.25-2.el8_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832262" comment="libgs-devel-9.25-2.el8_0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1618" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2420" ref_url="https://www.suse.com/security/cve/CVE-2019-2420/" source="CVE"/>
		<reference ref_id="CVE-2019-2434" ref_url="https://www.suse.com/security/cve/CVE-2019-2434/" source="CVE"/>
		<reference ref_id="CVE-2019-2436" ref_url="https://www.suse.com/security/cve/CVE-2019-2436/" source="CVE"/>
		<reference ref_id="CVE-2019-2455" ref_url="https://www.suse.com/security/cve/CVE-2019-2455/" source="CVE"/>
		<reference ref_id="CVE-2019-2481" ref_url="https://www.suse.com/security/cve/CVE-2019-2481/" source="CVE"/>
		<reference ref_id="CVE-2019-2482" ref_url="https://www.suse.com/security/cve/CVE-2019-2482/" source="CVE"/>
		<reference ref_id="CVE-2019-2486" ref_url="https://www.suse.com/security/cve/CVE-2019-2486/" source="CVE"/>
		<reference ref_id="CVE-2019-2494" ref_url="https://www.suse.com/security/cve/CVE-2019-2494/" source="CVE"/>
		<reference ref_id="CVE-2019-2495" ref_url="https://www.suse.com/security/cve/CVE-2019-2495/" source="CVE"/>
		<reference ref_id="CVE-2019-2502" ref_url="https://www.suse.com/security/cve/CVE-2019-2502/" source="CVE"/>
		<reference ref_id="CVE-2019-2503" ref_url="https://www.suse.com/security/cve/CVE-2019-2503/" source="CVE"/>
		<reference ref_id="CVE-2019-2507" ref_url="https://www.suse.com/security/cve/CVE-2019-2507/" source="CVE"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2528" ref_url="https://www.suse.com/security/cve/CVE-2019-2528/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2530" ref_url="https://www.suse.com/security/cve/CVE-2019-2530/" source="CVE"/>
		<reference ref_id="CVE-2019-2531" ref_url="https://www.suse.com/security/cve/CVE-2019-2531/" source="CVE"/>
		<reference ref_id="CVE-2019-2532" ref_url="https://www.suse.com/security/cve/CVE-2019-2532/" source="CVE"/>
		<reference ref_id="CVE-2019-2533" ref_url="https://www.suse.com/security/cve/CVE-2019-2533/" source="CVE"/>
		<reference ref_id="CVE-2019-2534" ref_url="https://www.suse.com/security/cve/CVE-2019-2534/" source="CVE"/>
		<reference ref_id="CVE-2019-2535" ref_url="https://www.suse.com/security/cve/CVE-2019-2535/" source="CVE"/>
		<reference ref_id="CVE-2019-2536" ref_url="https://www.suse.com/security/cve/CVE-2019-2536/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="CVE-2019-2539" ref_url="https://www.suse.com/security/cve/CVE-2019-2539/" source="CVE"/>
		<reference ref_id="CVE-2019-2580" ref_url="https://www.suse.com/security/cve/CVE-2019-2580/" source="CVE"/>
		<reference ref_id="CVE-2019-2581" ref_url="https://www.suse.com/security/cve/CVE-2019-2581/" source="CVE"/>
		<reference ref_id="CVE-2019-2584" ref_url="https://www.suse.com/security/cve/CVE-2019-2584/" source="CVE"/>
		<reference ref_id="CVE-2019-2585" ref_url="https://www.suse.com/security/cve/CVE-2019-2585/" source="CVE"/>
		<reference ref_id="CVE-2019-2587" ref_url="https://www.suse.com/security/cve/CVE-2019-2587/" source="CVE"/>
		<reference ref_id="CVE-2019-2589" ref_url="https://www.suse.com/security/cve/CVE-2019-2589/" source="CVE"/>
		<reference ref_id="CVE-2019-2592" ref_url="https://www.suse.com/security/cve/CVE-2019-2592/" source="CVE"/>
		<reference ref_id="CVE-2019-2593" ref_url="https://www.suse.com/security/cve/CVE-2019-2593/" source="CVE"/>
		<reference ref_id="CVE-2019-2596" ref_url="https://www.suse.com/security/cve/CVE-2019-2596/" source="CVE"/>
		<reference ref_id="CVE-2019-2606" ref_url="https://www.suse.com/security/cve/CVE-2019-2606/" source="CVE"/>
		<reference ref_id="CVE-2019-2607" ref_url="https://www.suse.com/security/cve/CVE-2019-2607/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2617" ref_url="https://www.suse.com/security/cve/CVE-2019-2617/" source="CVE"/>
		<reference ref_id="CVE-2019-2620" ref_url="https://www.suse.com/security/cve/CVE-2019-2620/" source="CVE"/>
		<reference ref_id="CVE-2019-2623" ref_url="https://www.suse.com/security/cve/CVE-2019-2623/" source="CVE"/>
		<reference ref_id="CVE-2019-2624" ref_url="https://www.suse.com/security/cve/CVE-2019-2624/" source="CVE"/>
		<reference ref_id="CVE-2019-2625" ref_url="https://www.suse.com/security/cve/CVE-2019-2625/" source="CVE"/>
		<reference ref_id="CVE-2019-2626" ref_url="https://www.suse.com/security/cve/CVE-2019-2626/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="CVE-2019-2630" ref_url="https://www.suse.com/security/cve/CVE-2019-2630/" source="CVE"/>
		<reference ref_id="CVE-2019-2631" ref_url="https://www.suse.com/security/cve/CVE-2019-2631/" source="CVE"/>
		<reference ref_id="CVE-2019-2634" ref_url="https://www.suse.com/security/cve/CVE-2019-2634/" source="CVE"/>
		<reference ref_id="CVE-2019-2635" ref_url="https://www.suse.com/security/cve/CVE-2019-2635/" source="CVE"/>
		<reference ref_id="CVE-2019-2636" ref_url="https://www.suse.com/security/cve/CVE-2019-2636/" source="CVE"/>
		<reference ref_id="CVE-2019-2644" ref_url="https://www.suse.com/security/cve/CVE-2019-2644/" source="CVE"/>
		<reference ref_id="CVE-2019-2681" ref_url="https://www.suse.com/security/cve/CVE-2019-2681/" source="CVE"/>
		<reference ref_id="CVE-2019-2683" ref_url="https://www.suse.com/security/cve/CVE-2019-2683/" source="CVE"/>
		<reference ref_id="CVE-2019-2685" ref_url="https://www.suse.com/security/cve/CVE-2019-2685/" source="CVE"/>
		<reference ref_id="CVE-2019-2686" ref_url="https://www.suse.com/security/cve/CVE-2019-2686/" source="CVE"/>
		<reference ref_id="CVE-2019-2687" ref_url="https://www.suse.com/security/cve/CVE-2019-2687/" source="CVE"/>
		<reference ref_id="CVE-2019-2688" ref_url="https://www.suse.com/security/cve/CVE-2019-2688/" source="CVE"/>
		<reference ref_id="CVE-2019-2689" ref_url="https://www.suse.com/security/cve/CVE-2019-2689/" source="CVE"/>
		<reference ref_id="CVE-2019-2691" ref_url="https://www.suse.com/security/cve/CVE-2019-2691/" source="CVE"/>
		<reference ref_id="CVE-2019-2693" ref_url="https://www.suse.com/security/cve/CVE-2019-2693/" source="CVE"/>
		<reference ref_id="CVE-2019-2694" ref_url="https://www.suse.com/security/cve/CVE-2019-2694/" source="CVE"/>
		<reference ref_id="CVE-2019-2695" ref_url="https://www.suse.com/security/cve/CVE-2019-2695/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2738" ref_url="https://www.suse.com/security/cve/CVE-2019-2738/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2752" ref_url="https://www.suse.com/security/cve/CVE-2019-2752/" source="CVE"/>
		<reference ref_id="CVE-2019-2755" ref_url="https://www.suse.com/security/cve/CVE-2019-2755/" source="CVE"/>
		<reference ref_id="CVE-2019-2757" ref_url="https://www.suse.com/security/cve/CVE-2019-2757/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2774" ref_url="https://www.suse.com/security/cve/CVE-2019-2774/" source="CVE"/>
		<reference ref_id="CVE-2019-2778" ref_url="https://www.suse.com/security/cve/CVE-2019-2778/" source="CVE"/>
		<reference ref_id="CVE-2019-2780" ref_url="https://www.suse.com/security/cve/CVE-2019-2780/" source="CVE"/>
		<reference ref_id="CVE-2019-2784" ref_url="https://www.suse.com/security/cve/CVE-2019-2784/" source="CVE"/>
		<reference ref_id="CVE-2019-2785" ref_url="https://www.suse.com/security/cve/CVE-2019-2785/" source="CVE"/>
		<reference ref_id="CVE-2019-2789" ref_url="https://www.suse.com/security/cve/CVE-2019-2789/" source="CVE"/>
		<reference ref_id="CVE-2019-2795" ref_url="https://www.suse.com/security/cve/CVE-2019-2795/" source="CVE"/>
		<reference ref_id="CVE-2019-2796" ref_url="https://www.suse.com/security/cve/CVE-2019-2796/" source="CVE"/>
		<reference ref_id="CVE-2019-2797" ref_url="https://www.suse.com/security/cve/CVE-2019-2797/" source="CVE"/>
		<reference ref_id="CVE-2019-2798" ref_url="https://www.suse.com/security/cve/CVE-2019-2798/" source="CVE"/>
		<reference ref_id="CVE-2019-2800" ref_url="https://www.suse.com/security/cve/CVE-2019-2800/" source="CVE"/>
		<reference ref_id="CVE-2019-2801" ref_url="https://www.suse.com/security/cve/CVE-2019-2801/" source="CVE"/>
		<reference ref_id="CVE-2019-2802" ref_url="https://www.suse.com/security/cve/CVE-2019-2802/" source="CVE"/>
		<reference ref_id="CVE-2019-2803" ref_url="https://www.suse.com/security/cve/CVE-2019-2803/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2808" ref_url="https://www.suse.com/security/cve/CVE-2019-2808/" source="CVE"/>
		<reference ref_id="CVE-2019-2810" ref_url="https://www.suse.com/security/cve/CVE-2019-2810/" source="CVE"/>
		<reference ref_id="CVE-2019-2811" ref_url="https://www.suse.com/security/cve/CVE-2019-2811/" source="CVE"/>
		<reference ref_id="CVE-2019-2812" ref_url="https://www.suse.com/security/cve/CVE-2019-2812/" source="CVE"/>
		<reference ref_id="CVE-2019-2814" ref_url="https://www.suse.com/security/cve/CVE-2019-2814/" source="CVE"/>
		<reference ref_id="CVE-2019-2815" ref_url="https://www.suse.com/security/cve/CVE-2019-2815/" source="CVE"/>
		<reference ref_id="CVE-2019-2819" ref_url="https://www.suse.com/security/cve/CVE-2019-2819/" source="CVE"/>
		<reference ref_id="CVE-2019-2826" ref_url="https://www.suse.com/security/cve/CVE-2019-2826/" source="CVE"/>
		<reference ref_id="CVE-2019-2830" ref_url="https://www.suse.com/security/cve/CVE-2019-2830/" source="CVE"/>
		<reference ref_id="CVE-2019-2834" ref_url="https://www.suse.com/security/cve/CVE-2019-2834/" source="CVE"/>
		<reference ref_id="CVE-2019-2879" ref_url="https://www.suse.com/security/cve/CVE-2019-2879/" source="CVE"/>
		<reference ref_id="CVE-2019-2948" ref_url="https://www.suse.com/security/cve/CVE-2019-2948/" source="CVE"/>
		<reference ref_id="CVE-2019-2950" ref_url="https://www.suse.com/security/cve/CVE-2019-2950/" source="CVE"/>
		<reference ref_id="CVE-2019-2969" ref_url="https://www.suse.com/security/cve/CVE-2019-2969/" source="CVE"/>
		<reference ref_id="CVE-2019-3003" ref_url="https://www.suse.com/security/cve/CVE-2019-3003/" source="CVE"/>
		<reference ref_id="CVE-2022-21589" ref_url="https://www.suse.com/security/cve/CVE-2022-21589/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2511.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2511.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2420/">CVE-2019-2420 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2420">CVE-2019-2420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2434/">CVE-2019-2434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2434">CVE-2019-2434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2436/">CVE-2019-2436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2436">CVE-2019-2436 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2455/">CVE-2019-2455 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2455">CVE-2019-2455 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2481/">CVE-2019-2481 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2481">CVE-2019-2481 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2482/">CVE-2019-2482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2482">CVE-2019-2482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2486/">CVE-2019-2486 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2486">CVE-2019-2486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2494/">CVE-2019-2494 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2494">CVE-2019-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2495/">CVE-2019-2495 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2495">CVE-2019-2495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2502/">CVE-2019-2502 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2502">CVE-2019-2502 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2503/">CVE-2019-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2503">CVE-2019-2503 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2507/">CVE-2019-2507 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2507">CVE-2019-2507 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2510">CVE-2019-2510 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2528/">CVE-2019-2528 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2528">CVE-2019-2528 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2529">CVE-2019-2529 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2530/">CVE-2019-2530 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2530">CVE-2019-2530 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2531/">CVE-2019-2531 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2531">CVE-2019-2531 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2532/">CVE-2019-2532 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2532">CVE-2019-2532 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2533/">CVE-2019-2533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2533">CVE-2019-2533 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2534/">CVE-2019-2534 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2534">CVE-2019-2534 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2535/">CVE-2019-2535 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2535">CVE-2019-2535 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2536/">CVE-2019-2536 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2536">CVE-2019-2536 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2537">CVE-2019-2537 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2539/">CVE-2019-2539 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2539">CVE-2019-2539 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2580/">CVE-2019-2580 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2580">CVE-2019-2580 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2581/">CVE-2019-2581 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2581">CVE-2019-2581 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2584/">CVE-2019-2584 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2584">CVE-2019-2584 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2585/">CVE-2019-2585 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2585">CVE-2019-2585 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2587/">CVE-2019-2587 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2587">CVE-2019-2587 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2589/">CVE-2019-2589 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2589">CVE-2019-2589 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2592/">CVE-2019-2592 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2592">CVE-2019-2592 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2593/">CVE-2019-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2593">CVE-2019-2593 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2596/">CVE-2019-2596 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2596">CVE-2019-2596 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2606/">CVE-2019-2606 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2606">CVE-2019-2606 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2607/">CVE-2019-2607 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2607">CVE-2019-2607 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2617/">CVE-2019-2617 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2617">CVE-2019-2617 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2620/">CVE-2019-2620 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2620">CVE-2019-2620 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2623/">CVE-2019-2623 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2623">CVE-2019-2623 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2624/">CVE-2019-2624 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2624">CVE-2019-2624 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2625/">CVE-2019-2625 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2625">CVE-2019-2625 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2626/">CVE-2019-2626 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2626">CVE-2019-2626 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2628">CVE-2019-2628 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2630/">CVE-2019-2630 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2630">CVE-2019-2630 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2631/">CVE-2019-2631 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2631">CVE-2019-2631 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2634/">CVE-2019-2634 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2634">CVE-2019-2634 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2635/">CVE-2019-2635 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2635">CVE-2019-2635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2636/">CVE-2019-2636 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2636">CVE-2019-2636 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2644/">CVE-2019-2644 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2644">CVE-2019-2644 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2681/">CVE-2019-2681 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2681">CVE-2019-2681 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2683/">CVE-2019-2683 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2683">CVE-2019-2683 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2685/">CVE-2019-2685 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2685">CVE-2019-2685 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2686/">CVE-2019-2686 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2686">CVE-2019-2686 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2687/">CVE-2019-2687 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2687">CVE-2019-2687 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2688/">CVE-2019-2688 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2688">CVE-2019-2688 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2689/">CVE-2019-2689 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2689">CVE-2019-2689 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2691/">CVE-2019-2691 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2691">CVE-2019-2691 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2693/">CVE-2019-2693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2693">CVE-2019-2693 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2694/">CVE-2019-2694 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2694">CVE-2019-2694 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2695/">CVE-2019-2695 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2695">CVE-2019-2695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2738/">CVE-2019-2738 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2738">CVE-2019-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2752/">CVE-2019-2752 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2752">CVE-2019-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2755/">CVE-2019-2755 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2755">CVE-2019-2755 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2757/">CVE-2019-2757 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2757">CVE-2019-2757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2758">CVE-2019-2758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2774/">CVE-2019-2774 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2774">CVE-2019-2774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2778/">CVE-2019-2778 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2778">CVE-2019-2778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2780/">CVE-2019-2780 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2780">CVE-2019-2780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2784/">CVE-2019-2784 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2784">CVE-2019-2784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2785/">CVE-2019-2785 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2785">CVE-2019-2785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2789/">CVE-2019-2789 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2789">CVE-2019-2789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2795/">CVE-2019-2795 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2795">CVE-2019-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2796/">CVE-2019-2796 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2796">CVE-2019-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2797/">CVE-2019-2797 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2797">CVE-2019-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2798/">CVE-2019-2798 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2798">CVE-2019-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2800/">CVE-2019-2800 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2800">CVE-2019-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2801/">CVE-2019-2801 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2801">CVE-2019-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2802/">CVE-2019-2802 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2802">CVE-2019-2802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2803/">CVE-2019-2803 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2803">CVE-2019-2803 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2808/">CVE-2019-2808 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2808">CVE-2019-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2810/">CVE-2019-2810 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2810">CVE-2019-2810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2811/">CVE-2019-2811 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2811">CVE-2019-2811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2812/">CVE-2019-2812 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2812">CVE-2019-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2814/">CVE-2019-2814 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2814">CVE-2019-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2815/">CVE-2019-2815 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2815">CVE-2019-2815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2819/">CVE-2019-2819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2819">CVE-2019-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2826/">CVE-2019-2826 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2826">CVE-2019-2826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2830/">CVE-2019-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2830">CVE-2019-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2834/">CVE-2019-2834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2834">CVE-2019-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2879/">CVE-2019-2879 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2879">CVE-2019-2879 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2948/">CVE-2019-2948 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2948">CVE-2019-2948 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2950/">CVE-2019-2950 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2950">CVE-2019-2950 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2969/">CVE-2019-2969 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2969">CVE-2019-2969 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3003/">CVE-2019-3003 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3003">CVE-2019-3003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21589/">CVE-2022-21589 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21589">CVE-2022-21589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832263" comment="mecab-0.996-1.module+el8.0.0+3898+e09bb8de.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832264" comment="mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832265" comment="mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832266" comment="mysql-8.0.17-3.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832267" comment="mysql-common-8.0.17-3.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832268" comment="mysql-devel-8.0.17-3.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832269" comment="mysql-errmsg-8.0.17-3.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832270" comment="mysql-libs-8.0.17-3.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832271" comment="mysql-server-8.0.17-3.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832272" comment="mysql-test-8.0.17-3.module+el8.0.0+3898+e09bb8de is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1619" version="1" class="patch">
	<metadata>
		<title>security update for libserf (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-0203" ref_url="https://www.suse.com/security/cve/CVE-2019-0203/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2512.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2512.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0203/">CVE-2019-0203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0203">CVE-2019-0203 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832273" comment="libserf-1.3.9-9.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832274" comment="mod_dav_svn-1.10.2-2.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832275" comment="subversion-1.10.2-2.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832276" comment="subversion-devel-1.10.2-2.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832277" comment="subversion-gnome-1.10.2-2.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832278" comment="subversion-javahl-1.10.2-2.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832279" comment="subversion-libs-1.10.2-2.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832280" comment="subversion-perl-1.10.2-2.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832281" comment="subversion-tools-1.10.2-2.module+el8.0.0+3900+919b6753 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832282" comment="utf8proc-2.1.1-5.module+el8.0.0+3900+919b6753 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1620" version="1" class="patch">
	<metadata>
		<title>security update for pango (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1010238" ref_url="https://www.suse.com/security/cve/CVE-2019-1010238/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010238/">CVE-2019-1010238 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010238">CVE-2019-1010238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832283" comment="pango-1.42.4-5.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832284" comment="pango-devel-1.42.4-5.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1621" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832285" comment="ghostscript-9.25-2.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832286" comment="ghostscript-doc-9.25-2.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832287" comment="ghostscript-tools-dvipdf-9.25-2.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832288" comment="ghostscript-tools-fonts-9.25-2.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832289" comment="ghostscript-tools-printing-9.25-2.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832290" comment="ghostscript-x11-9.25-2.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832291" comment="libgs-9.25-2.el8_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832292" comment="libgs-devel-9.25-2.el8_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1622" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12527" ref_url="https://www.suse.com/security/cve/CVE-2019-12527/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2593.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2593.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12527/">CVE-2019-12527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12527">CVE-2019-12527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832293" comment="libecap-1.0.1-2.module+el8.0.0+4045+70edde92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832294" comment="libecap-devel-1.0.1-2.module+el8.0.0+4045+70edde92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832295" comment="squid-4.4-5.module+el8.0.0+4045+70edde92 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1623" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2663.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2663.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735">CVE-2019-11735 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738">CVE-2019-11738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747">CVE-2019-11747 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748">CVE-2019-11748 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749">CVE-2019-11749 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750">CVE-2019-11750 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832296" comment="firefox-68.1.0-1.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1624" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2692.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2692.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832297" comment="libnghttp2-1.33.0-1.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832298" comment="libnghttp2-devel-1.33.0-1.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832299" comment="nghttp2-1.33.0-1.el8_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1625" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-12817" ref_url="https://www.suse.com/security/cve/CVE-2019-12817/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3887" ref_url="https://www.suse.com/security/cve/CVE-2019-3887/" source="CVE"/>
		<reference ref_id="CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2703.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2703.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19824">CVE-2018-19824 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11487">CVE-2019-11487 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-12817/">CVE-2019-12817 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12817">CVE-2019-12817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3887/">CVE-2019-3887 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3887">CVE-2019-3887 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9500">CVE-2019-9500 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9503">CVE-2019-9503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832300" comment="bpftool-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832301" comment="kernel-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832302" comment="kernel-abi-whitelists-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832303" comment="kernel-core-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832304" comment="kernel-cross-headers-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832305" comment="kernel-debug-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832306" comment="kernel-debug-core-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832308" comment="kernel-debug-modules-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832309" comment="kernel-debug-modules-extra-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832311" comment="kernel-doc-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832312" comment="kernel-headers-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832313" comment="kernel-modules-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832314" comment="kernel-modules-extra-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832315" comment="kernel-tools-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832316" comment="kernel-tools-libs-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832318" comment="perf-4.18.0-80.11.1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832319" comment="python3-perf-4.18.0-80.11.1.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1626" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18897" ref_url="https://www.suse.com/security/cve/CVE-2018-18897/" source="CVE"/>
		<reference ref_id="CVE-2018-20481" ref_url="https://www.suse.com/security/cve/CVE-2018-20481/" source="CVE"/>
		<reference ref_id="CVE-2018-20551" ref_url="https://www.suse.com/security/cve/CVE-2018-20551/" source="CVE"/>
		<reference ref_id="CVE-2018-20650" ref_url="https://www.suse.com/security/cve/CVE-2018-20650/" source="CVE"/>
		<reference ref_id="CVE-2018-20662" ref_url="https://www.suse.com/security/cve/CVE-2018-20662/" source="CVE"/>
		<reference ref_id="CVE-2019-10871" ref_url="https://www.suse.com/security/cve/CVE-2019-10871/" source="CVE"/>
		<reference ref_id="CVE-2019-12293" ref_url="https://www.suse.com/security/cve/CVE-2019-12293/" source="CVE"/>
		<reference ref_id="CVE-2019-7310" ref_url="https://www.suse.com/security/cve/CVE-2019-7310/" source="CVE"/>
		<reference ref_id="CVE-2019-9200" ref_url="https://www.suse.com/security/cve/CVE-2019-9200/" source="CVE"/>
		<reference ref_id="CVE-2019-9631" ref_url="https://www.suse.com/security/cve/CVE-2019-9631/" source="CVE"/>
		<reference ref_id="CVE-2019-9903" ref_url="https://www.suse.com/security/cve/CVE-2019-9903/" source="CVE"/>
		<reference ref_id="CVE-2019-9959" ref_url="https://www.suse.com/security/cve/CVE-2019-9959/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2713.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2713.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18897/">CVE-2018-18897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18897">CVE-2018-18897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20481/">CVE-2018-20481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20481">CVE-2018-20481 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20551/">CVE-2018-20551 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20551">CVE-2018-20551 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20650/">CVE-2018-20650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20650">CVE-2018-20650 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20662/">CVE-2018-20662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20662">CVE-2018-20662 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10871/">CVE-2019-10871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10871">CVE-2019-10871 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12293/">CVE-2019-12293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12293">CVE-2019-12293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7310/">CVE-2019-7310 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7310">CVE-2019-7310 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9200/">CVE-2019-9200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9200">CVE-2019-9200 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9631/">CVE-2019-9631 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9631">CVE-2019-9631 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9903/">CVE-2019-9903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9903">CVE-2019-9903 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9959/">CVE-2019-9959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9959">CVE-2019-9959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832320" comment="poppler-0.66.0-11.el8_0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832321" comment="poppler-cpp-0.66.0-11.el8_0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832322" comment="poppler-cpp-devel-0.66.0-11.el8_0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832323" comment="poppler-devel-0.66.0-11.el8_0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832324" comment="poppler-glib-0.66.0-11.el8_0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832325" comment="poppler-glib-devel-0.66.0-11.el8_0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832326" comment="poppler-qt5-0.66.0-11.el8_0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832327" comment="poppler-qt5-devel-0.66.0-11.el8_0.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832328" comment="poppler-utils-0.66.0-11.el8_0.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1627" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-collections (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12384" ref_url="https://www.suse.com/security/cve/CVE-2019-12384/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2720.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2720.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12384/">CVE-2019-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12384">CVE-2019-12384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832329" comment="apache-commons-collections-3.2.2-10.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832330" comment="apache-commons-lang-2.6-21.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832331" comment="bea-stax-api-1.2.0-16.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832332" comment="glassfish-fastinfoset-1.2.13-9.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832333" comment="glassfish-jaxb-api-2.2.12-8.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832334" comment="glassfish-jaxb-core-2.2.11-11.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832335" comment="glassfish-jaxb-runtime-2.2.11-11.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832336" comment="glassfish-jaxb-txw2-2.2.11-11.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832337" comment="jackson-annotations-2.9.9-1.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832338" comment="jackson-core-2.9.9-1.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832339" comment="jackson-databind-2.9.9.2-1.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832340" comment="jackson-jaxrs-json-provider-2.9.9-1.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832341" comment="jackson-jaxrs-providers-2.9.9-1.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832342" comment="jackson-module-jaxb-annotations-2.7.6-4.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832343" comment="jakarta-commons-httpclient-3.1-28.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832344" comment="javassist-3.18.1-8.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832345" comment="javassist-javadoc-3.18.1-8.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832346" comment="pki-servlet-4.0-api-9.0.7-14.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832347" comment="pki-servlet-container-9.0.7-14.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832348" comment="python-nss-doc-1.0.1-10.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832349" comment="python3-nss-1.0.1-10.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832350" comment="relaxngDatatype-2011.1-7.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832351" comment="resteasy-3.0.26-3.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832352" comment="slf4j-1.7.25-4.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832353" comment="slf4j-jdk14-1.7.25-4.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832354" comment="stax-ex-1.7.7-8.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832355" comment="velocity-1.7-24.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832356" comment="xalan-j2-2.7.1-38.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832357" comment="xerces-j2-2.11.0-34.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832358" comment="xml-commons-apis-1.4.01-25.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832359" comment="xml-commons-resolver-1.2-26.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832360" comment="xmlstreambuffer-1.5.4-8.module+el8.0.0+3892+c903d3f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832361" comment="xsom-0-19.20110809svn.module+el8.0.0+3892+c903d3f0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1628" version="1" class="patch">
	<metadata>
		<title>security update for libwmf (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2722.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2722.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832362" comment="libwmf-0.2.9-8.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832363" comment="libwmf-devel-0.2.9-8.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832364" comment="libwmf-lite-0.2.9-8.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1629" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2726.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2726.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832365" comment="go-toolset-1.11.13-1.module+el8.0.1+4087+d8180914 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832366" comment="golang-1.11.13-2.module+el8.0.1+4087+d8180914 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832367" comment="golang-bin-1.11.13-2.module+el8.0.1+4087+d8180914 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832368" comment="golang-docs-1.11.13-2.module+el8.0.1+4087+d8180914 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832369" comment="golang-misc-1.11.13-2.module+el8.0.1+4087+d8180914 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832370" comment="golang-race-1.11.13-2.module+el8.0.1+4087+d8180914 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832371" comment="golang-src-1.11.13-2.module+el8.0.1+4087+d8180914 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832372" comment="golang-tests-1.11.13-2.module+el8.0.1+4087+d8180914 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1630" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1301" ref_url="https://www.suse.com/security/cve/CVE-2019-1301/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2731.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2731.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1301/">CVE-2019-1301 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1301">CVE-2019-1301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832373" comment="dotnet-2.1.509-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832374" comment="dotnet-host-2.1.13-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832375" comment="dotnet-host-fxr-2.1-2.1.13-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832376" comment="dotnet-runtime-2.1-2.1.13-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832377" comment="dotnet-sdk-2.1-2.1.509-1.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832378" comment="dotnet-sdk-2.1.5xx-2.1.509-1.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1631" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11739" ref_url="https://www.suse.com/security/cve/CVE-2019-11739/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2774.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2774.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11739/">CVE-2019-11739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11739">CVE-2019-11739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832379" comment="thunderbird-60.9.0-2.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1632" version="1" class="patch">
	<metadata>
		<title>security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20969" ref_url="https://www.suse.com/security/cve/CVE-2018-20969/" source="CVE"/>
		<reference ref_id="CVE-2019-13638" ref_url="https://www.suse.com/security/cve/CVE-2019-13638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2798.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2798.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20969/">CVE-2018-20969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20969">CVE-2018-20969 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13638/">CVE-2019-13638 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13638">CVE-2019-13638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832380" comment="patch-2.7.6-9.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1633" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2799.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2799.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9516">CVE-2019-9516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832381" comment="nginx-1.14.1-9.module+el8.0.0+4108+af250afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832382" comment="nginx-all-modules-1.14.1-9.module+el8.0.0+4108+af250afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832383" comment="nginx-filesystem-1.14.1-9.module+el8.0.0+4108+af250afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832384" comment="nginx-mod-http-image-filter-1.14.1-9.module+el8.0.0+4108+af250afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832385" comment="nginx-mod-http-perl-1.14.1-9.module+el8.0.0+4108+af250afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832386" comment="nginx-mod-http-xslt-filter-1.14.1-9.module+el8.0.0+4108+af250afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832387" comment="nginx-mod-mail-1.14.1-9.module+el8.0.0+4108+af250afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832388" comment="nginx-mod-stream-1.14.1-9.module+el8.0.0+4108+af250afe is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1634" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2822.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2822.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832389" comment="dovecot-2.2.36-5.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832390" comment="dovecot-devel-2.2.36-5.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832391" comment="dovecot-mysql-2.2.36-5.el8_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832392" comment="dovecot-pgsql-2.2.36-5.el8_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1635" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832393" comment="bpftool-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832394" comment="kernel-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832395" comment="kernel-abi-whitelists-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832396" comment="kernel-core-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832397" comment="kernel-cross-headers-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832398" comment="kernel-debug-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832399" comment="kernel-debug-core-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832401" comment="kernel-debug-modules-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832402" comment="kernel-debug-modules-extra-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832404" comment="kernel-doc-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832405" comment="kernel-headers-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832406" comment="kernel-modules-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832407" comment="kernel-modules-extra-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832408" comment="kernel-tools-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832409" comment="kernel-tools-libs-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832411" comment="perf-4.18.0-80.11.2.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832412" comment="python3-perf-4.18.0-80.11.2.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1636" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2893.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2893.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9517">CVE-2019-9517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832413" comment="httpd-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832414" comment="httpd-devel-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832415" comment="httpd-filesystem-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832416" comment="httpd-manual-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832417" comment="httpd-tools-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832418" comment="mod_http2-1.11.3-3.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832419" comment="mod_ldap-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832420" comment="mod_md-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832421" comment="mod_proxy_html-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832422" comment="mod_session-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832423" comment="mod_ssl-2.4.37-12.module+el8.0.0+4096+eb40e6da is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1637" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2925.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2925.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5737">CVE-2019-5737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9515">CVE-2019-9515 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9516">CVE-2019-9516 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9517">CVE-2019-9517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9518">CVE-2019-9518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832424" comment="nodejs-10.16.3-2.module+el8.0.0+4214+49953fda is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832425" comment="nodejs-devel-10.16.3-2.module+el8.0.0+4214+49953fda is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832426" comment="nodejs-docs-10.16.3-2.module+el8.0.0+4214+49953fda is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832427" comment="nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832428" comment="nodejs-packaging-17-3.module+el8+2873+aa7dfd9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832429" comment="npm-6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1638" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3134.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3134.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832430" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832431" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832432" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832433" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832434" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832435" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832436" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832437" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1639" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2977" ref_url="https://www.suse.com/security/cve/CVE-2019-2977/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2977/">CVE-2019-2977 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2977">CVE-2019-2977 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832438" comment="java-11-openjdk-11.0.5.10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832439" comment="java-11-openjdk-demo-11.0.5.10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832440" comment="java-11-openjdk-devel-11.0.5.10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832441" comment="java-11-openjdk-headless-11.0.5.10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832442" comment="java-11-openjdk-javadoc-11.0.5.10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832443" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832444" comment="java-11-openjdk-jmods-11.0.5.10-0.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832445" comment="java-11-openjdk-src-11.0.5.10-0.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1640" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3196.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3196.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832446" comment="firefox-68.2.0-2.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1641" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3237.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3237.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832447" comment="thunderbird-68.2.0-1.el8_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1642" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3335.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3335.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832448" comment="babel-2.5.1-9.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832449" comment="python-nose-docs-1.3.7-30.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832451" comment="python-sqlalchemy-doc-1.3.2-1.module+el8.1.0+2994+98e054d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832452" comment="python2-2.7.16-12.module+el8.1.0+4148+33a50073 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832456" comment="python2-babel-2.5.1-9.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832457" comment="python2-backports-1.0-15.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832458" comment="python2-backports-ssl_match_hostname-3.5.0.1-11.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832459" comment="python2-bson-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832462" comment="python2-debug-2.7.16-12.module+el8.1.0+4148+33a50073 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832463" comment="python2-devel-2.7.16-12.module+el8.1.0+4148+33a50073 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832471" comment="python2-jinja2-2.10-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832472" comment="python2-libs-2.7.16-12.module+el8.1.0+4148+33a50073 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832473" comment="python2-lxml-4.2.3-3.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832476" comment="python2-nose-1.3.7-30.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832477" comment="python2-numpy-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832478" comment="python2-numpy-doc-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832479" comment="python2-numpy-f2py-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832480" comment="python2-pip-9.0.3-14.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832481" comment="python2-pip-wheel-9.0.3-14.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832487" comment="python2-pygments-2.2.0-20.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832488" comment="python2-pymongo-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832489" comment="python2-pymongo-gridfs-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832495" comment="python2-requests-2.20.0-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832497" comment="python2-scipy-1.0.0-20.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832498" comment="python2-setuptools-39.0.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832499" comment="python2-setuptools-wheel-39.0.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832501" comment="python2-six-1.11.0-5.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832502" comment="python2-sqlalchemy-1.3.2-1.module+el8.1.0+2994+98e054d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832503" comment="python2-test-2.7.16-12.module+el8.1.0+4148+33a50073 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832504" comment="python2-tkinter-2.7.16-12.module+el8.1.0+4148+33a50073 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832505" comment="python2-tools-2.7.16-12.module+el8.1.0+4148+33a50073 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832506" comment="python2-urllib3-1.24.2-1.module+el8.1.0+3280+19512f10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832507" comment="python2-virtualenv-15.1.0-19.module+el8.1.0+3507+d69c168d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832508" comment="python2-wheel-0.31.1-2.module+el8.1.0+3725+aac5cd17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832509" comment="python2-wheel-wheel-0.31.1-2.module+el8.1.0+3725+aac5cd17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1643" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160/" source="CVE"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12181">CVE-2018-12181 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0160">CVE-2019-0160 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0161">CVE-2019-0161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832510" comment="edk2-ovmf-20190308git89910a39dcfd-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1644" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3345.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3345.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9755">CVE-2019-9755 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832511" comment="hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832512" comment="hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832513" comment="libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832514" comment="libguestfs-bash-completion-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832515" comment="libguestfs-benchmarking-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832516" comment="libguestfs-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832517" comment="libguestfs-gfs2-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832518" comment="libguestfs-gobject-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832519" comment="libguestfs-gobject-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832520" comment="libguestfs-inspect-icons-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832521" comment="libguestfs-java-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832522" comment="libguestfs-java-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832523" comment="libguestfs-javadoc-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832524" comment="libguestfs-man-pages-ja-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832525" comment="libguestfs-man-pages-uk-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832526" comment="libguestfs-rescue-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832527" comment="libguestfs-rsync-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832528" comment="libguestfs-tools-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832529" comment="libguestfs-tools-c-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832530" comment="libguestfs-winsupport-8.0-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832531" comment="libguestfs-xfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832532" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832533" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832534" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832535" comment="libvirt-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832536" comment="libvirt-admin-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832537" comment="libvirt-bash-completion-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832538" comment="libvirt-client-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832539" comment="libvirt-daemon-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832540" comment="libvirt-daemon-config-network-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832541" comment="libvirt-daemon-config-nwfilter-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832542" comment="libvirt-daemon-driver-interface-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832543" comment="libvirt-daemon-driver-network-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832544" comment="libvirt-daemon-driver-nodedev-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832545" comment="libvirt-daemon-driver-nwfilter-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832546" comment="libvirt-daemon-driver-qemu-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832547" comment="libvirt-daemon-driver-secret-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832548" comment="libvirt-daemon-driver-storage-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832549" comment="libvirt-daemon-driver-storage-core-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832550" comment="libvirt-daemon-driver-storage-disk-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832551" comment="libvirt-daemon-driver-storage-gluster-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832552" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832553" comment="libvirt-daemon-driver-storage-logical-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832554" comment="libvirt-daemon-driver-storage-mpath-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832555" comment="libvirt-daemon-driver-storage-rbd-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832556" comment="libvirt-daemon-driver-storage-scsi-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832557" comment="libvirt-daemon-kvm-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832558" comment="libvirt-dbus-1.2.0-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832559" comment="libvirt-devel-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832560" comment="libvirt-docs-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832561" comment="libvirt-libs-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832562" comment="libvirt-lock-sanlock-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832563" comment="libvirt-nss-4.5.0-35.module+el8.1.0+4227+b2722cb3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832564" comment="lua-guestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832565" comment="nbdkit-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832566" comment="nbdkit-bash-completion-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832567" comment="nbdkit-basic-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832568" comment="nbdkit-devel-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832569" comment="nbdkit-example-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832570" comment="nbdkit-plugin-gzip-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832571" comment="nbdkit-plugin-python-common-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832572" comment="nbdkit-plugin-python3-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832573" comment="nbdkit-plugin-vddk-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832574" comment="nbdkit-plugin-xz-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832575" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832576" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832577" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832578" comment="ocaml-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832579" comment="ocaml-hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832580" comment="ocaml-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832581" comment="ocaml-libguestfs-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832582" comment="perl-Sys-Guestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832583" comment="perl-Sys-Virt-4.5.0-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832584" comment="perl-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832585" comment="python3-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832586" comment="python3-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832587" comment="python3-libvirt-4.5.0-2.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832588" comment="qemu-guest-agent-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832589" comment="qemu-img-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832590" comment="qemu-kvm-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832591" comment="qemu-kvm-block-curl-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832592" comment="qemu-kvm-block-gluster-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832593" comment="qemu-kvm-block-iscsi-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832594" comment="qemu-kvm-block-rbd-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832595" comment="qemu-kvm-block-ssh-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832596" comment="qemu-kvm-common-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832597" comment="qemu-kvm-core-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832598" comment="qemu-kvm-tests-2.12.0-88.module+el8.1.0+4233+bc44be3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832599" comment="ruby-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832600" comment="ruby-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832601" comment="seabios-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832602" comment="seabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832603" comment="seavgabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832604" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832605" comment="supermin-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832606" comment="supermin-devel-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832607" comment="virt-dib-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832608" comment="virt-p2v-maker-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832609" comment="virt-v2v-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1645" version="1" class="patch">
	<metadata>
		<title>security update for gdb (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20657" ref_url="https://www.suse.com/security/cve/CVE-2018-20657/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3352.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3352.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20657/">CVE-2018-20657 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20657">CVE-2018-20657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832610" comment="gdb-8.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832611" comment="gdb-doc-8.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832612" comment="gdb-gdbserver-8.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832613" comment="gdb-headless-8.2-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1646" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10143" ref_url="https://www.suse.com/security/cve/CVE-2019-10143/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3353.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3353.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10143/">CVE-2019-10143 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10143">CVE-2019-10143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832614" comment="freeradius-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832615" comment="freeradius-devel-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832616" comment="freeradius-doc-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832617" comment="freeradius-krb5-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832618" comment="freeradius-ldap-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832619" comment="freeradius-mysql-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832620" comment="freeradius-perl-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832621" comment="freeradius-postgresql-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832622" comment="freeradius-rest-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832623" comment="freeradius-sqlite-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832624" comment="freeradius-unixODBC-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832625" comment="freeradius-utils-3.0.17-6.module+el8.1.0+3392+9bd8939b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1647" version="1" class="patch">
	<metadata>
		<title>security update for gnome-boxes (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3387.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3387.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13313">CVE-2019-13313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832626" comment="gnome-boxes-3.28.5-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832627" comment="libosinfo-1.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832628" comment="osinfo-db-20190611-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832629" comment="osinfo-db-tools-1.5.0-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1648" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3390.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3390.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19870">CVE-2018-19870 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832630" comment="qt5-assistant-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832631" comment="qt5-designer-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832632" comment="qt5-doctools-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832633" comment="qt5-linguist-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832634" comment="qt5-qdbusviewer-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832635" comment="qt5-qtbase-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832636" comment="qt5-qtbase-common-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832637" comment="qt5-qtbase-devel-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832638" comment="qt5-qtbase-examples-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832639" comment="qt5-qtbase-gui-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832640" comment="qt5-qtbase-mysql-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832641" comment="qt5-qtbase-odbc-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832642" comment="qt5-qtbase-postgresql-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832643" comment="qt5-qtbase-static-5.11.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832644" comment="qt5-qttools-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832645" comment="qt5-qttools-common-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832646" comment="qt5-qttools-devel-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832647" comment="qt5-qttools-examples-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832648" comment="qt5-qttools-libs-designer-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832649" comment="qt5-qttools-libs-designercomponents-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832650" comment="qt5-qttools-libs-help-5.11.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832651" comment="qt5-qttools-static-5.11.1-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1649" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10155" ref_url="https://www.suse.com/security/cve/CVE-2019-10155/" source="CVE"/>
		<reference ref_id="CVE-2019-12312" ref_url="https://www.suse.com/security/cve/CVE-2019-12312/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3391.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3391.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10155/">CVE-2019-10155 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10155">CVE-2019-10155 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12312/">CVE-2019-12312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12312">CVE-2019-12312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832652" comment="libreswan-3.29-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1650" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-10871" ref_url="https://www.suse.com/security/cve/CVE-2018-10871/" source="CVE"/>
		<reference ref_id="CVE-2019-10224" ref_url="https://www.suse.com/security/cve/CVE-2019-10224/" source="CVE"/>
		<reference ref_id="CVE-2019-14824" ref_url="https://www.suse.com/security/cve/CVE-2019-14824/" source="CVE"/>
		<reference ref_id="CVE-2019-3883" ref_url="https://www.suse.com/security/cve/CVE-2019-3883/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3401.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3401.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10871/">CVE-2018-10871 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10871">CVE-2018-10871 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10224/">CVE-2019-10224 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10224">CVE-2019-10224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14824/">CVE-2019-14824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14824">CVE-2019-14824 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3883/">CVE-2019-3883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3883">CVE-2019-3883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832653" comment="389-ds-base-1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832654" comment="389-ds-base-devel-1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832655" comment="389-ds-base-legacy-tools-1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832656" comment="389-ds-base-libs-1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832657" comment="389-ds-base-snmp-1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832658" comment="python3-lib389-1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1651" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-9946" ref_url="https://www.suse.com/security/cve/CVE-2019-9946/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3403.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3403.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9946/">CVE-2019-9946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9946">CVE-2019-9946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832659" comment="buildah-1.9.0-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832660" comment="buildah-tests-1.9.0-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832661" comment="cockpit-podman-4-1.module+el8.1.0+4081+b29780af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832662" comment="container-selinux-2.107-2.module+el8.1.0+4081+b29780af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832663" comment="containernetworking-plugins-0.8.1-2.module+el8.1.0+4081+b29780af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832664" comment="containers-common-0.1.37-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832665" comment="fuse-overlayfs-0.4.1-1.module+el8.1.0+4081+b29780af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832666" comment="oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832667" comment="oci-umount-2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832668" comment="podman-1.4.2-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832669" comment="podman-docker-1.4.2-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832670" comment="podman-manpages-1.4.2-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832671" comment="podman-remote-1.4.2-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832672" comment="podman-tests-1.4.2-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832673" comment="python-podman-api-1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832674" comment="runc-1.0.0-60.rc8.module+el8.1.0+4081+b29780af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832675" comment="skopeo-0.1.37-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832676" comment="skopeo-tests-0.1.37-5.module+el8.1.0+4240+893c1ab8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832677" comment="slirp4netns-0.3.0-4.module+el8.1.0+4306+1d917805 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832678" comment="toolbox-0.0.4-1.module+el8.1.0+4081+b29780af is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1652" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3419.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3419.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832679" comment="libtiff-4.0.9-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832680" comment="libtiff-devel-4.0.9-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832681" comment="libtiff-tools-4.0.9-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1653" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_mellon (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3877" ref_url="https://www.suse.com/security/cve/CVE-2019-3877/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3421.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3421.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3877/">CVE-2019-3877 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3877">CVE-2019-3877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832682" comment="mod_auth_mellon-0.14.0-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832683" comment="mod_auth_mellon-diagnostics-0.14.0-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1654" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14809" ref_url="https://www.suse.com/security/cve/CVE-2019-14809/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3433.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3433.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14809/">CVE-2019-14809 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14809">CVE-2019-14809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832684" comment="go-toolset-1.12.8-1.module+el8.1.0+4089+be929cf8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832685" comment="golang-1.12.8-2.module+el8.1.0+4089+be929cf8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832686" comment="golang-bin-1.12.8-2.module+el8.1.0+4089+be929cf8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832687" comment="golang-docs-1.12.8-2.module+el8.1.0+4089+be929cf8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832688" comment="golang-misc-1.12.8-2.module+el8.1.0+4089+be929cf8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832689" comment="golang-race-1.12.8-2.module+el8.1.0+4089+be929cf8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832690" comment="golang-src-1.12.8-2.module+el8.1.0+4089+be929cf8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832691" comment="golang-tests-1.12.8-2.module+el8.1.0+4089+be929cf8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1655" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3436.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3436.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0217">CVE-2019-0217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0220">CVE-2019-0220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832692" comment="httpd-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832693" comment="httpd-devel-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832694" comment="httpd-filesystem-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832695" comment="httpd-manual-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832696" comment="httpd-tools-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832697" comment="mod_http2-1.11.3-3.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832698" comment="mod_ldap-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832699" comment="mod_md-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832700" comment="mod_proxy_html-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832701" comment="mod_session-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832702" comment="mod_ssl-2.4.37-16.module+el8.1.0+4134+e6bad0ed is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1656" version="1" class="patch">
	<metadata>
		<title>security update for virt-manager (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10183" ref_url="https://www.suse.com/security/cve/CVE-2019-10183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10183/">CVE-2019-10183 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10183">CVE-2019-10183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832703" comment="virt-install-2.2.1-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832704" comment="virt-manager-2.2.1-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832705" comment="virt-manager-common-2.2.1-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1657" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3467.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3467.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832706" comment="dovecot-2.2.36-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832707" comment="dovecot-devel-2.2.36-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832708" comment="dovecot-mysql-2.2.36-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832709" comment="dovecot-pgsql-2.2.36-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832710" comment="dovecot-pigeonhole-2.2.36-10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1658" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3476.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3476.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832711" comment="libecap-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832712" comment="libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832713" comment="squid-4.4-8.module+el8.1.0+4044+36416a77 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1659" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3494.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3494.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832714" comment="buildah-1.5-5.gite94b4f9.module+el8.1.0+4241+a7060183 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832715" comment="container-selinux-2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832716" comment="containernetworking-plugins-0.7.4-3.git9ebe139.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832717" comment="containers-common-0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832718" comment="fuse-overlayfs-0.3-5.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832719" comment="oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832720" comment="oci-umount-2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832721" comment="podman-1.0.0-3.git921f98f.module+el8.1.0+4241+a7060183 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832722" comment="podman-docker-1.0.0-3.git921f98f.module+el8.1.0+4241+a7060183 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832723" comment="runc-1.0.0-55.rc5.dev.git2abd837.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832724" comment="skopeo-0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832725" comment="slirp4netns-0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1660" version="1" class="patch">
	<metadata>
		<title>security update for http-parser (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3497.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3497.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12121">CVE-2018-12121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832726" comment="http-parser-2.8.0-5.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1661" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3513.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3513.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832727" comment="compat-libpthread-nonshared-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832728" comment="glibc-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832729" comment="glibc-all-langpacks-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832730" comment="glibc-benchtests-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832731" comment="glibc-common-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832732" comment="glibc-devel-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832733" comment="glibc-headers-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832734" comment="glibc-langpack-aa-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832735" comment="glibc-langpack-af-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832736" comment="glibc-langpack-agr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832737" comment="glibc-langpack-ak-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832738" comment="glibc-langpack-am-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832739" comment="glibc-langpack-an-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832740" comment="glibc-langpack-anp-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832741" comment="glibc-langpack-ar-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832742" comment="glibc-langpack-as-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832743" comment="glibc-langpack-ast-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832744" comment="glibc-langpack-ayc-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832745" comment="glibc-langpack-az-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832746" comment="glibc-langpack-be-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832747" comment="glibc-langpack-bem-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832748" comment="glibc-langpack-ber-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832749" comment="glibc-langpack-bg-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832750" comment="glibc-langpack-bhb-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832751" comment="glibc-langpack-bho-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832752" comment="glibc-langpack-bi-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832753" comment="glibc-langpack-bn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832754" comment="glibc-langpack-bo-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832755" comment="glibc-langpack-br-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832756" comment="glibc-langpack-brx-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832757" comment="glibc-langpack-bs-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832758" comment="glibc-langpack-byn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832759" comment="glibc-langpack-ca-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832760" comment="glibc-langpack-ce-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832761" comment="glibc-langpack-chr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832762" comment="glibc-langpack-cmn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832763" comment="glibc-langpack-crh-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832764" comment="glibc-langpack-cs-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832765" comment="glibc-langpack-csb-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832766" comment="glibc-langpack-cv-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832767" comment="glibc-langpack-cy-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832768" comment="glibc-langpack-da-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832769" comment="glibc-langpack-de-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832770" comment="glibc-langpack-doi-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832771" comment="glibc-langpack-dsb-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832772" comment="glibc-langpack-dv-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832773" comment="glibc-langpack-dz-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832774" comment="glibc-langpack-el-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832775" comment="glibc-langpack-en-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832776" comment="glibc-langpack-eo-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832777" comment="glibc-langpack-es-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832778" comment="glibc-langpack-et-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832779" comment="glibc-langpack-eu-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832780" comment="glibc-langpack-fa-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832781" comment="glibc-langpack-ff-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832782" comment="glibc-langpack-fi-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832783" comment="glibc-langpack-fil-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832784" comment="glibc-langpack-fo-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832785" comment="glibc-langpack-fr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832786" comment="glibc-langpack-fur-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832787" comment="glibc-langpack-fy-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832788" comment="glibc-langpack-ga-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832789" comment="glibc-langpack-gd-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832790" comment="glibc-langpack-gez-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832791" comment="glibc-langpack-gl-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832792" comment="glibc-langpack-gu-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832793" comment="glibc-langpack-gv-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832794" comment="glibc-langpack-ha-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832795" comment="glibc-langpack-hak-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832796" comment="glibc-langpack-he-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832797" comment="glibc-langpack-hi-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832798" comment="glibc-langpack-hif-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832799" comment="glibc-langpack-hne-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832800" comment="glibc-langpack-hr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832801" comment="glibc-langpack-hsb-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832802" comment="glibc-langpack-ht-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832803" comment="glibc-langpack-hu-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832804" comment="glibc-langpack-hy-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832805" comment="glibc-langpack-ia-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832806" comment="glibc-langpack-id-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832807" comment="glibc-langpack-ig-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832808" comment="glibc-langpack-ik-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832809" comment="glibc-langpack-is-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832810" comment="glibc-langpack-it-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832811" comment="glibc-langpack-iu-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832812" comment="glibc-langpack-ja-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832813" comment="glibc-langpack-ka-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832814" comment="glibc-langpack-kab-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832815" comment="glibc-langpack-kk-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832816" comment="glibc-langpack-kl-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832817" comment="glibc-langpack-km-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832818" comment="glibc-langpack-kn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832819" comment="glibc-langpack-ko-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832820" comment="glibc-langpack-kok-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832821" comment="glibc-langpack-ks-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832822" comment="glibc-langpack-ku-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832823" comment="glibc-langpack-kw-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832824" comment="glibc-langpack-ky-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832825" comment="glibc-langpack-lb-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832826" comment="glibc-langpack-lg-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832827" comment="glibc-langpack-li-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832828" comment="glibc-langpack-lij-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832829" comment="glibc-langpack-ln-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832830" comment="glibc-langpack-lo-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832831" comment="glibc-langpack-lt-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832832" comment="glibc-langpack-lv-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832833" comment="glibc-langpack-lzh-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832834" comment="glibc-langpack-mag-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832835" comment="glibc-langpack-mai-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832836" comment="glibc-langpack-mfe-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832837" comment="glibc-langpack-mg-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832838" comment="glibc-langpack-mhr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832839" comment="glibc-langpack-mi-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832840" comment="glibc-langpack-miq-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832841" comment="glibc-langpack-mjw-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832842" comment="glibc-langpack-mk-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832843" comment="glibc-langpack-ml-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832844" comment="glibc-langpack-mn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832845" comment="glibc-langpack-mni-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832846" comment="glibc-langpack-mr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832847" comment="glibc-langpack-ms-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832848" comment="glibc-langpack-mt-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832849" comment="glibc-langpack-my-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832850" comment="glibc-langpack-nan-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832851" comment="glibc-langpack-nb-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832852" comment="glibc-langpack-nds-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832853" comment="glibc-langpack-ne-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832854" comment="glibc-langpack-nhn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832855" comment="glibc-langpack-niu-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832856" comment="glibc-langpack-nl-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832857" comment="glibc-langpack-nn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832858" comment="glibc-langpack-nr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832859" comment="glibc-langpack-nso-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832860" comment="glibc-langpack-oc-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832861" comment="glibc-langpack-om-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832862" comment="glibc-langpack-or-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832863" comment="glibc-langpack-os-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832864" comment="glibc-langpack-pa-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832865" comment="glibc-langpack-pap-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832866" comment="glibc-langpack-pl-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832867" comment="glibc-langpack-ps-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832868" comment="glibc-langpack-pt-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832869" comment="glibc-langpack-quz-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832870" comment="glibc-langpack-raj-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832871" comment="glibc-langpack-ro-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832872" comment="glibc-langpack-ru-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832873" comment="glibc-langpack-rw-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832874" comment="glibc-langpack-sa-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832875" comment="glibc-langpack-sah-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832876" comment="glibc-langpack-sat-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832877" comment="glibc-langpack-sc-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832878" comment="glibc-langpack-sd-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832879" comment="glibc-langpack-se-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832880" comment="glibc-langpack-sgs-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832881" comment="glibc-langpack-shn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832882" comment="glibc-langpack-shs-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832883" comment="glibc-langpack-si-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832884" comment="glibc-langpack-sid-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832885" comment="glibc-langpack-sk-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832886" comment="glibc-langpack-sl-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832887" comment="glibc-langpack-sm-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832888" comment="glibc-langpack-so-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832889" comment="glibc-langpack-sq-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832890" comment="glibc-langpack-sr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832891" comment="glibc-langpack-ss-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832892" comment="glibc-langpack-st-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832893" comment="glibc-langpack-sv-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832894" comment="glibc-langpack-sw-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832895" comment="glibc-langpack-szl-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832896" comment="glibc-langpack-ta-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832897" comment="glibc-langpack-tcy-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832898" comment="glibc-langpack-te-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832899" comment="glibc-langpack-tg-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832900" comment="glibc-langpack-th-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832901" comment="glibc-langpack-the-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832902" comment="glibc-langpack-ti-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832903" comment="glibc-langpack-tig-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832904" comment="glibc-langpack-tk-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832905" comment="glibc-langpack-tl-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832906" comment="glibc-langpack-tn-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832907" comment="glibc-langpack-to-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832908" comment="glibc-langpack-tpi-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832909" comment="glibc-langpack-tr-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832910" comment="glibc-langpack-ts-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832911" comment="glibc-langpack-tt-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832912" comment="glibc-langpack-ug-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832913" comment="glibc-langpack-uk-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832914" comment="glibc-langpack-unm-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832915" comment="glibc-langpack-ur-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832916" comment="glibc-langpack-uz-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832917" comment="glibc-langpack-ve-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832918" comment="glibc-langpack-vi-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832919" comment="glibc-langpack-wa-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832920" comment="glibc-langpack-wae-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832921" comment="glibc-langpack-wal-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832922" comment="glibc-langpack-wo-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832923" comment="glibc-langpack-xh-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832924" comment="glibc-langpack-yi-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832925" comment="glibc-langpack-yo-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832926" comment="glibc-langpack-yue-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832927" comment="glibc-langpack-yuw-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832928" comment="glibc-langpack-zh-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832929" comment="glibc-langpack-zu-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832930" comment="glibc-locale-source-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832931" comment="glibc-minimal-langpack-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832932" comment="glibc-nss-devel-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832933" comment="glibc-static-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832934" comment="glibc-utils-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832935" comment="libnsl-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832936" comment="nscd-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832937" comment="nss_db-2.28-72.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832938" comment="nss_hesiod-2.28-72.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1662" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-19854" ref_url="https://www.suse.com/security/cve/CVE-2018-19854/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-13233" ref_url="https://www.suse.com/security/cve/CVE-2019-13233/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-15919" ref_url="https://www.suse.com/security/cve/CVE-2019-15919/" source="CVE"/>
		<reference ref_id="CVE-2019-15920" ref_url="https://www.suse.com/security/cve/CVE-2019-15920/" source="CVE"/>
		<reference ref_id="CVE-2019-15921" ref_url="https://www.suse.com/security/cve/CVE-2019-15921/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16994" ref_url="https://www.suse.com/security/cve/CVE-2019-16994/" source="CVE"/>
		<reference ref_id="CVE-2019-20811" ref_url="https://www.suse.com/security/cve/CVE-2019-20811/" source="CVE"/>
		<reference ref_id="CVE-2019-25160" ref_url="https://www.suse.com/security/cve/CVE-2019-25160/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3874" ref_url="https://www.suse.com/security/cve/CVE-2019-3874/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-3900" ref_url="https://www.suse.com/security/cve/CVE-2019-3900/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3517.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3517.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1593">CVE-2015-1593 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16884">CVE-2018-16884 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19854/">CVE-2018-19854 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19854">CVE-2018-19854 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10126">CVE-2019-10126 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10638">CVE-2019-10638 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11599">CVE-2019-11599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11833">CVE-2019-11833 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11884">CVE-2019-11884 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12382">CVE-2019-12382 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13233/">CVE-2019-13233 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13233">CVE-2019-13233 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13648">CVE-2019-13648 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15214">CVE-2019-15214 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15666">CVE-2019-15666 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15916">CVE-2019-15916 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15919/">CVE-2019-15919 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15919">CVE-2019-15919 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15920/">CVE-2019-15920 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15920">CVE-2019-15920 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15921/">CVE-2019-15921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15921">CVE-2019-15921 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15924">CVE-2019-15924 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15927">CVE-2019-15927 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16994/">CVE-2019-16994 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16994">CVE-2019-16994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20811/">CVE-2019-20811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20811">CVE-2019-20811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-25160/">CVE-2019-25160 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25160">CVE-2019-25160 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3459">CVE-2019-3459 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3460">CVE-2019-3460 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3874/">CVE-2019-3874 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3874">CVE-2019-3874 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3882">CVE-2019-3882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3900/">CVE-2019-3900 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3900">CVE-2019-3900 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5489">CVE-2019-5489 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506">CVE-2019-9506 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10720">CVE-2020-10720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832939" comment="bpftool-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832940" comment="kernel-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832941" comment="kernel-abi-whitelists-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832942" comment="kernel-core-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832943" comment="kernel-cross-headers-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832944" comment="kernel-debug-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832945" comment="kernel-debug-core-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832947" comment="kernel-debug-modules-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832948" comment="kernel-debug-modules-extra-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832950" comment="kernel-doc-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832951" comment="kernel-headers-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832952" comment="kernel-modules-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832953" comment="kernel-modules-extra-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832954" comment="kernel-tools-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832955" comment="kernel-tools-libs-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832957" comment="perf-4.18.0-147.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832958" comment="python3-perf-4.18.0-147.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1663" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3520.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3520.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832959" comment="platform-python-3.6.8-15.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832960" comment="platform-python-debug-3.6.8-15.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832961" comment="platform-python-devel-3.6.8-15.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832962" comment="python3-idle-3.6.8-15.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832963" comment="python3-libs-3.6.8-15.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832964" comment="python3-test-3.6.8-15.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832965" comment="python3-tkinter-3.6.8-15.1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1664" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3525.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3525.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6470">CVE-2019-6470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832966" comment="dhcp-client-4.3.6-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832967" comment="dhcp-common-4.3.6-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832968" comment="dhcp-libs-4.3.6-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832969" comment="dhcp-relay-4.3.6-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832970" comment="dhcp-server-4.3.6-34.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1665" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3530.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3530.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832971" comment="glib2-2.56.4-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832972" comment="glib2-devel-2.56.4-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832973" comment="glib2-doc-2.56.4-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832974" comment="glib2-fam-2.56.4-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832975" comment="glib2-static-2.56.4-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832976" comment="glib2-tests-2.56.4-7.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1666" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3552.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3552.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832977" comment="bind-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832978" comment="bind-chroot-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832979" comment="bind-devel-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832980" comment="bind-export-devel-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832981" comment="bind-export-libs-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832982" comment="bind-libs-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832983" comment="bind-libs-lite-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832984" comment="bind-license-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832985" comment="bind-lite-devel-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832986" comment="bind-pkcs11-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832987" comment="bind-pkcs11-devel-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832988" comment="bind-pkcs11-libs-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832989" comment="bind-pkcs11-utils-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832990" comment="bind-sdb-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832991" comment="bind-sdb-chroot-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832992" comment="bind-utils-9.11.4-26.P2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832993" comment="python3-bind-9.11.4-26.P2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1667" version="1" class="patch">
	<metadata>
		<title>security update for SDL (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="CVE-2019-12795" ref_url="https://www.suse.com/security/cve/CVE-2019-12795/" source="CVE"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<reference ref_id="CVE-2019-6237" ref_url="https://www.suse.com/security/cve/CVE-2019-6237/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8518" ref_url="https://www.suse.com/security/cve/CVE-2019-8518/" source="CVE"/>
		<reference ref_id="CVE-2019-8523" ref_url="https://www.suse.com/security/cve/CVE-2019-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8571" ref_url="https://www.suse.com/security/cve/CVE-2019-8571/" source="CVE"/>
		<reference ref_id="CVE-2019-8583" ref_url="https://www.suse.com/security/cve/CVE-2019-8583/" source="CVE"/>
		<reference ref_id="CVE-2019-8584" ref_url="https://www.suse.com/security/cve/CVE-2019-8584/" source="CVE"/>
		<reference ref_id="CVE-2019-8586" ref_url="https://www.suse.com/security/cve/CVE-2019-8586/" source="CVE"/>
		<reference ref_id="CVE-2019-8587" ref_url="https://www.suse.com/security/cve/CVE-2019-8587/" source="CVE"/>
		<reference ref_id="CVE-2019-8594" ref_url="https://www.suse.com/security/cve/CVE-2019-8594/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8596" ref_url="https://www.suse.com/security/cve/CVE-2019-8596/" source="CVE"/>
		<reference ref_id="CVE-2019-8597" ref_url="https://www.suse.com/security/cve/CVE-2019-8597/" source="CVE"/>
		<reference ref_id="CVE-2019-8601" ref_url="https://www.suse.com/security/cve/CVE-2019-8601/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8608" ref_url="https://www.suse.com/security/cve/CVE-2019-8608/" source="CVE"/>
		<reference ref_id="CVE-2019-8609" ref_url="https://www.suse.com/security/cve/CVE-2019-8609/" source="CVE"/>
		<reference ref_id="CVE-2019-8610" ref_url="https://www.suse.com/security/cve/CVE-2019-8610/" source="CVE"/>
		<reference ref_id="CVE-2019-8611" ref_url="https://www.suse.com/security/cve/CVE-2019-8611/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8619" ref_url="https://www.suse.com/security/cve/CVE-2019-8619/" source="CVE"/>
		<reference ref_id="CVE-2019-8622" ref_url="https://www.suse.com/security/cve/CVE-2019-8622/" source="CVE"/>
		<reference ref_id="CVE-2019-8623" ref_url="https://www.suse.com/security/cve/CVE-2019-8623/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8735" ref_url="https://www.suse.com/security/cve/CVE-2019-8735/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3553.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3553.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11070">CVE-2019-11070 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12795/">CVE-2019-12795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12795">CVE-2019-12795 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3820">CVE-2019-3820 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6237/">CVE-2019-6237 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6237">CVE-2019-6237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6251">CVE-2019-6251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8506">CVE-2019-8506 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8518/">CVE-2019-8518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8518">CVE-2019-8518 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8523/">CVE-2019-8523 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8523">CVE-2019-8523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8524">CVE-2019-8524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8535">CVE-2019-8535 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8536">CVE-2019-8536 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8544">CVE-2019-8544 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8571/">CVE-2019-8571 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8571">CVE-2019-8571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8583/">CVE-2019-8583 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8583">CVE-2019-8583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8584/">CVE-2019-8584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8584">CVE-2019-8584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8586/">CVE-2019-8586 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8586">CVE-2019-8586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8587/">CVE-2019-8587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8587">CVE-2019-8587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8594/">CVE-2019-8594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8594">CVE-2019-8594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8596/">CVE-2019-8596 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8596">CVE-2019-8596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8597/">CVE-2019-8597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8597">CVE-2019-8597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8601/">CVE-2019-8601 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8601">CVE-2019-8601 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8608/">CVE-2019-8608 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8608">CVE-2019-8608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8609/">CVE-2019-8609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8609">CVE-2019-8609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8610/">CVE-2019-8610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8610">CVE-2019-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8611/">CVE-2019-8611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8611">CVE-2019-8611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8619/">CVE-2019-8619 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8619">CVE-2019-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8622/">CVE-2019-8622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8622">CVE-2019-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8623/">CVE-2019-8623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8623">CVE-2019-8623 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8735/">CVE-2019-8735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8735">CVE-2019-8735 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832994" comment="SDL-1.2.15-35.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832995" comment="SDL-devel-1.2.15-35.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832996" comment="accountsservice-0.6.50-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832997" comment="accountsservice-devel-0.6.50-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832998" comment="accountsservice-libs-0.6.50-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832999" comment="appstream-data-8-20190805.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833000" comment="baobab-3.28.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833001" comment="chrome-gnome-shell-10.1-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833002" comment="evince-3.28.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833003" comment="evince-browser-plugin-3.28.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833004" comment="evince-libs-3.28.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833005" comment="evince-nautilus-3.28.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833006" comment="file-roller-3.28.1-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833007" comment="gdk-pixbuf2-2.36.12-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833008" comment="gdk-pixbuf2-devel-2.36.12-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833009" comment="gdk-pixbuf2-modules-2.36.12-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833010" comment="gdk-pixbuf2-xlib-2.36.12-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833011" comment="gdk-pixbuf2-xlib-devel-2.36.12-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833012" comment="gdm-3.28.3-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833013" comment="gjs-1.56.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833014" comment="gjs-devel-1.56.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833015" comment="gnome-classic-session-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833016" comment="gnome-control-center-3.28.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833017" comment="gnome-control-center-filesystem-3.28.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833018" comment="gnome-desktop3-3.32.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833019" comment="gnome-desktop3-devel-3.32.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833020" comment="gnome-remote-desktop-0.1.6-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833021" comment="gnome-settings-daemon-3.32.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833022" comment="gnome-shell-3.32.2-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833023" comment="gnome-shell-extension-apps-menu-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833024" comment="gnome-shell-extension-auto-move-windows-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833025" comment="gnome-shell-extension-common-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833026" comment="gnome-shell-extension-dash-to-dock-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833027" comment="gnome-shell-extension-desktop-icons-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833028" comment="gnome-shell-extension-disable-screenshield-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833029" comment="gnome-shell-extension-drive-menu-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833030" comment="gnome-shell-extension-horizontal-workspaces-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833031" comment="gnome-shell-extension-launch-new-instance-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833032" comment="gnome-shell-extension-native-window-placement-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833033" comment="gnome-shell-extension-no-hot-corner-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833034" comment="gnome-shell-extension-panel-favorites-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833035" comment="gnome-shell-extension-places-menu-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833036" comment="gnome-shell-extension-screenshot-window-sizer-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833037" comment="gnome-shell-extension-systemMonitor-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833038" comment="gnome-shell-extension-top-icons-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833039" comment="gnome-shell-extension-updates-dialog-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833040" comment="gnome-shell-extension-user-theme-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833041" comment="gnome-shell-extension-window-grouper-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833042" comment="gnome-shell-extension-window-list-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833043" comment="gnome-shell-extension-windowsNavigator-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833044" comment="gnome-shell-extension-workspace-indicator-3.32.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833045" comment="gnome-software-3.30.6-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833046" comment="gnome-software-editor-3.30.6-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833047" comment="gnome-tweaks-3.28.1-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833048" comment="gsettings-desktop-schemas-3.32.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833049" comment="gsettings-desktop-schemas-devel-3.32.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833050" comment="gtk-update-icon-cache-3.22.30-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833051" comment="gtk3-3.22.30-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833052" comment="gtk3-devel-3.22.30-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833053" comment="gtk3-immodule-xim-3.22.30-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833054" comment="gvfs-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833055" comment="gvfs-afc-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833056" comment="gvfs-afp-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833057" comment="gvfs-archive-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833058" comment="gvfs-client-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833059" comment="gvfs-devel-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833060" comment="gvfs-fuse-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833061" comment="gvfs-goa-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833062" comment="gvfs-gphoto2-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833063" comment="gvfs-mtp-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833064" comment="gvfs-smb-1.36.2-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833065" comment="libpurple-2.13.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833066" comment="libpurple-devel-2.13.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833067" comment="mozjs60-60.9.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833068" comment="mozjs60-devel-60.9.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833069" comment="mutter-3.32.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833070" comment="mutter-devel-3.32.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833071" comment="nautilus-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833072" comment="nautilus-devel-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833073" comment="nautilus-extensions-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833074" comment="pango-1.42.4-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833075" comment="pango-devel-1.42.4-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833076" comment="pidgin-2.13.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833077" comment="pidgin-devel-2.13.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833078" comment="plymouth-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833079" comment="plymouth-core-libs-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833080" comment="plymouth-graphics-libs-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833081" comment="plymouth-plugin-fade-throbber-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833082" comment="plymouth-plugin-label-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833083" comment="plymouth-plugin-script-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833084" comment="plymouth-plugin-space-flares-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833085" comment="plymouth-plugin-throbgress-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833086" comment="plymouth-plugin-two-step-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833087" comment="plymouth-scripts-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833088" comment="plymouth-system-theme-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833089" comment="plymouth-theme-charge-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833090" comment="plymouth-theme-fade-in-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833091" comment="plymouth-theme-script-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833092" comment="plymouth-theme-solar-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833093" comment="plymouth-theme-spinfinity-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833094" comment="plymouth-theme-spinner-0.9.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833095" comment="wayland-protocols-devel-1.17-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833096" comment="webkit2gtk3-2.24.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833097" comment="webkit2gtk3-devel-2.24.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833098" comment="webkit2gtk3-jsc-2.24.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833099" comment="webkit2gtk3-jsc-devel-2.24.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833100" comment="webkit2gtk3-plugin-process-gtk2-2.24.3-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1668" version="1" class="patch">
	<metadata>
		<title>security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-7146" ref_url="https://www.suse.com/security/cve/CVE-2019-7146/" source="CVE"/>
		<reference ref_id="CVE-2019-7149" ref_url="https://www.suse.com/security/cve/CVE-2019-7149/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3575.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3575.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7146/">CVE-2019-7146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7146">CVE-2019-7146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7149/">CVE-2019-7149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7149">CVE-2019-7149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7664">CVE-2019-7664 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833101" comment="elfutils-0.176-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833102" comment="elfutils-default-yama-scope-0.176-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833103" comment="elfutils-devel-0.176-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833104" comment="elfutils-devel-static-0.176-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833105" comment="elfutils-libelf-0.176-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833106" comment="elfutils-libelf-devel-0.176-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833107" comment="elfutils-libelf-devel-static-0.176-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833108" comment="elfutils-libs-0.176-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1669" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833109" comment="ctdb-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833110" comment="ctdb-tests-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833111" comment="libsmbclient-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833112" comment="libsmbclient-devel-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833113" comment="libwbclient-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833114" comment="libwbclient-devel-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833115" comment="python3-samba-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833116" comment="python3-samba-test-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833117" comment="samba-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833118" comment="samba-client-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833119" comment="samba-client-libs-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833120" comment="samba-common-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833121" comment="samba-common-libs-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833122" comment="samba-common-tools-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833123" comment="samba-krb5-printing-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833124" comment="samba-libs-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833125" comment="samba-pidl-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833126" comment="samba-test-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833127" comment="samba-test-libs-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833128" comment="samba-winbind-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833129" comment="samba-winbind-clients-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833130" comment="samba-winbind-krb5-locator-4.10.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833131" comment="samba-winbind-modules-4.10.4-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1670" version="1" class="patch">
	<metadata>
		<title>security update for createrepo_c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<reference ref_id="CVE-2019-3817" ref_url="https://www.suse.com/security/cve/CVE-2019-3817/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3583.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3583.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3817/">CVE-2019-3817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3817">CVE-2019-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833132" comment="createrepo_c-0.11.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833133" comment="createrepo_c-devel-0.11.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833134" comment="createrepo_c-libs-0.11.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833135" comment="dnf-4.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833136" comment="dnf-automatic-4.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833137" comment="dnf-data-4.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833138" comment="dnf-plugins-core-4.0.8-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833139" comment="libcomps-0.1.11-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833140" comment="libcomps-devel-0.1.11-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833141" comment="libdnf-0.35.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833142" comment="librepo-1.10.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833143" comment="libsolv-0.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833144" comment="microdnf-3.0.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833145" comment="python3-createrepo_c-0.11.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833146" comment="python3-dnf-4.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833147" comment="python3-dnf-plugin-versionlock-4.0.8-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833148" comment="python3-dnf-plugins-core-4.0.8-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833149" comment="python3-hawkey-0.35.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833150" comment="python3-libcomps-0.1.11-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833151" comment="python3-libdnf-0.35.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833152" comment="python3-librepo-1.10.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833153" comment="yum-4.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833154" comment="yum-utils-4.0.8-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1671" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3590.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3590.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833155" comment="python3-urllib3-1.24.2-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1672" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15718" ref_url="https://www.suse.com/security/cve/CVE-2019-15718/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15718/">CVE-2019-15718 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15718">CVE-2019-15718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833156" comment="systemd-239-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833157" comment="systemd-container-239-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833158" comment="systemd-devel-239-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833159" comment="systemd-journal-remote-239-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833160" comment="systemd-libs-239-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833161" comment="systemd-pam-239-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833162" comment="systemd-tests-239-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833163" comment="systemd-udev-239-18.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1673" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3829" ref_url="https://www.suse.com/security/cve/CVE-2019-3829/" source="CVE"/>
		<reference ref_id="CVE-2019-3836" ref_url="https://www.suse.com/security/cve/CVE-2019-3836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3829/">CVE-2019-3829 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3829">CVE-2019-3829 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3836/">CVE-2019-3836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3836">CVE-2019-3836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833164" comment="gnutls-3.6.8-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833165" comment="gnutls-c++-3.6.8-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833166" comment="gnutls-dane-3.6.8-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833167" comment="gnutls-devel-3.6.8-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833168" comment="gnutls-utils-3.6.8-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1674" version="1" class="patch">
	<metadata>
		<title>security update for libqb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12779" ref_url="https://www.suse.com/security/cve/CVE-2019-12779/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3610.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3610.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12779/">CVE-2019-12779 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12779">CVE-2019-12779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833169" comment="libqb-1.0.3-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833170" comment="libqb-devel-1.0.3-10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1675" version="1" class="patch">
	<metadata>
		<title>security update for libseccomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3624.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3624.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833171" comment="libseccomp-2.4.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833172" comment="libseccomp-devel-2.4.1-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1676" version="1" class="patch">
	<metadata>
		<title>security update for gettext (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18751">CVE-2018-18751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833173" comment="gettext-0.19.8.1-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833174" comment="gettext-common-devel-0.19.8.1-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833175" comment="gettext-devel-0.19.8.1-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833176" comment="gettext-libs-0.19.8.1-17.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1677" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3651.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3651.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833177" comment="libipa_hbac-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833178" comment="libsss_autofs-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833179" comment="libsss_certmap-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833180" comment="libsss_idmap-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833181" comment="libsss_nss_idmap-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833182" comment="libsss_nss_idmap-devel-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833183" comment="libsss_simpleifp-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833184" comment="libsss_sudo-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833185" comment="python3-libipa_hbac-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833186" comment="python3-libsss_nss_idmap-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833187" comment="python3-sss-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833188" comment="python3-sss-murmur-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833189" comment="python3-sssdconfig-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833190" comment="sssd-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833191" comment="sssd-ad-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833192" comment="sssd-client-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833193" comment="sssd-common-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833194" comment="sssd-common-pac-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833195" comment="sssd-dbus-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833196" comment="sssd-ipa-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833197" comment="sssd-kcm-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833198" comment="sssd-krb5-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833199" comment="sssd-krb5-common-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833200" comment="sssd-ldap-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833201" comment="sssd-libwbclient-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833202" comment="sssd-nfs-idmap-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833203" comment="sssd-polkit-rules-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833204" comment="sssd-proxy-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833205" comment="sssd-tools-2.2.0-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833206" comment="sssd-winbind-idmap-2.2.0-19.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1678" version="1" class="patch">
	<metadata>
		<title>security update for lldpad (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-10932" ref_url="https://www.suse.com/security/cve/CVE-2018-10932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3673.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3673.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10932/">CVE-2018-10932 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10932">CVE-2018-10932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833207" comment="lldpad-1.0.1-13.git036e314.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1679" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3694.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3694.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833208" comment="sudo-1.8.25p1-8.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1680" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3698.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3698.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000877">CVE-2018-1000877 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000878">CVE-2018-1000878 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000019">CVE-2019-1000019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000020">CVE-2019-1000020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833209" comment="bsdtar-3.3.2-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833210" comment="libarchive-3.3.2-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833211" comment="libarchive-devel-3.3.2-7.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1681" version="1" class="patch">
	<metadata>
		<title>security update for evolution (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3890" ref_url="https://www.suse.com/security/cve/CVE-2019-3890/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3699.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3699.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3890/">CVE-2019-3890 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3890">CVE-2019-3890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833212" comment="evolution-3.28.5-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833213" comment="evolution-bogofilter-3.28.5-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833214" comment="evolution-data-server-3.28.5-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833215" comment="evolution-data-server-devel-3.28.5-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833216" comment="evolution-data-server-doc-3.28.5-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833217" comment="evolution-data-server-langpacks-3.28.5-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833218" comment="evolution-data-server-perl-3.28.5-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833219" comment="evolution-data-server-tests-3.28.5-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833220" comment="evolution-devel-3.28.5-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833221" comment="evolution-ews-3.28.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833222" comment="evolution-ews-langpacks-3.28.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833223" comment="evolution-help-3.28.5-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833224" comment="evolution-langpacks-3.28.5-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833225" comment="evolution-pst-3.28.5-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833226" comment="evolution-spamassassin-3.28.5-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1682" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735/" source="CVE"/>
		<reference ref_id="CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0735">CVE-2018-0735 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1543">CVE-2019-1543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833227" comment="openssl-1.1.1c-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833228" comment="openssl-devel-1.1.1c-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833229" comment="openssl-libs-1.1.1c-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833230" comment="openssl-perl-1.1.1c-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1683" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2018-20483" ref_url="https://www.suse.com/security/cve/CVE-2018-20483/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3701.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3701.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16890">CVE-2018-16890 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20483/">CVE-2018-20483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20483">CVE-2018-20483 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3822">CVE-2019-3822 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3823">CVE-2019-3823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833231" comment="curl-7.61.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833232" comment="libcurl-7.61.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833233" comment="libcurl-devel-7.61.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833234" comment="libcurl-minimal-7.61.1-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1684" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833235" comment="openssh-8.0p1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833236" comment="openssh-askpass-8.0p1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833237" comment="openssh-cavs-8.0p1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833238" comment="openssh-clients-8.0p1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833239" comment="openssh-keycat-8.0p1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833240" comment="openssh-ldap-8.0p1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833241" comment="openssh-server-8.0p1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833242" comment="pam_ssh_agent_auth-0.10.3-7.3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1685" version="1" class="patch">
	<metadata>
		<title>security update for libvorbis (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3703.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3703.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833243" comment="libvorbis-1.3.6-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833244" comment="libvorbis-devel-1.3.6-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833245" comment="libvorbis-devel-docs-1.3.6-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1686" version="1" class="patch">
	<metadata>
		<title>security update for numpy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3704.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3704.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6446">CVE-2019-6446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833246" comment="python3-numpy-1.14.3-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833247" comment="python3-numpy-f2py-1.14.3-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1687" version="1" class="patch">
	<metadata>
		<title>security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3705.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3705.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833248" comment="libjpeg-turbo-1.5.3-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833249" comment="libjpeg-turbo-devel-1.5.3-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833250" comment="libjpeg-turbo-utils-1.5.3-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833251" comment="turbojpeg-1.5.3-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833252" comment="turbojpeg-devel-1.5.3-10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1688" version="1" class="patch">
	<metadata>
		<title>security update for lua (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-6706" ref_url="https://www.suse.com/security/cve/CVE-2019-6706/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3706.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3706.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6706/">CVE-2019-6706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6706">CVE-2019-6706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833253" comment="lua-5.3.4-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833254" comment="lua-devel-5.3.4-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833255" comment="lua-libs-5.3.4-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1689" version="1" class="patch">
	<metadata>
		<title>security update for dbus (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3707.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3707.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833256" comment="dbus-1.12.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833257" comment="dbus-common-1.12.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833258" comment="dbus-daemon-1.12.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833259" comment="dbus-devel-1.12.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833260" comment="dbus-libs-1.12.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833261" comment="dbus-tools-1.12.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833262" comment="dbus-x11-1.12.8-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1690" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2922" ref_url="https://www.suse.com/security/cve/CVE-2020-2922/" source="CVE"/>
		<reference ref_id="CVE-2021-2007" ref_url="https://www.suse.com/security/cve/CVE-2021-2007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3708.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3708.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2510">CVE-2019-2510 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2537">CVE-2019-2537 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2628">CVE-2019-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2758">CVE-2019-2758 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2922/">CVE-2020-2922 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2922">CVE-2020-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2007/">CVE-2021-2007 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2007">CVE-2021-2007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833263" comment="Judy-1.0.5-18.module+el8+2765+cfa4f87b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833264" comment="Judy-devel-1.0.5-18.module+el8+2765+cfa4f87b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833265" comment="asio-devel-1.10.8-7.module+el8+2765+cfa4f87b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833266" comment="galera-25.3.26-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833267" comment="mariadb-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833268" comment="mariadb-backup-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833269" comment="mariadb-common-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833270" comment="mariadb-devel-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833271" comment="mariadb-embedded-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833272" comment="mariadb-embedded-devel-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833273" comment="mariadb-errmsg-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833274" comment="mariadb-gssapi-server-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833275" comment="mariadb-oqgraph-engine-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833276" comment="mariadb-server-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833277" comment="mariadb-server-galera-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833278" comment="mariadb-server-utils-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833279" comment="mariadb-test-10.3.17-1.module+el8.1.0+3974+90eded84 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1691" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3735.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3735.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833280" comment="php-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833281" comment="php-bcmath-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833282" comment="php-cli-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833283" comment="php-common-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833284" comment="php-dba-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833285" comment="php-dbg-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833286" comment="php-devel-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833287" comment="php-embedded-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833288" comment="php-enchant-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833289" comment="php-fpm-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833290" comment="php-gd-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833291" comment="php-gmp-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833292" comment="php-intl-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833293" comment="php-json-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833294" comment="php-ldap-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833295" comment="php-mbstring-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833296" comment="php-mysqlnd-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833297" comment="php-odbc-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833298" comment="php-opcache-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833299" comment="php-pdo-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833300" comment="php-pgsql-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833301" comment="php-process-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833302" comment="php-recode-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833303" comment="php-snmp-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833304" comment="php-soap-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833305" comment="php-xml-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833306" comment="php-xmlrpc-7.2.11-4.module+el8.1.0+4555+f5cb8e18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1692" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3736.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3736.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833307" comment="apcu-panel-5.1.17-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833308" comment="libzip-1.5.2-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833309" comment="libzip-devel-1.5.2-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833310" comment="libzip-tools-1.5.2-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833311" comment="php-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833312" comment="php-bcmath-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833313" comment="php-cli-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833314" comment="php-common-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833315" comment="php-dba-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833316" comment="php-dbg-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833317" comment="php-devel-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833318" comment="php-embedded-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833319" comment="php-enchant-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833320" comment="php-fpm-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833321" comment="php-gd-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833322" comment="php-gmp-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833323" comment="php-intl-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833324" comment="php-json-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833325" comment="php-ldap-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833326" comment="php-mbstring-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833327" comment="php-mysqlnd-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833328" comment="php-odbc-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833329" comment="php-opcache-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833330" comment="php-pdo-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833331" comment="php-pear-1.10.9-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833332" comment="php-pecl-apcu-5.1.17-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833333" comment="php-pecl-apcu-devel-5.1.17-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833334" comment="php-pecl-zip-1.15.4-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833335" comment="php-pgsql-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833336" comment="php-process-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833337" comment="php-recode-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833338" comment="php-snmp-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833339" comment="php-soap-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833340" comment="php-xml-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833341" comment="php-xmlrpc-7.3.5-5.module+el8.1.0+4560+e0eee7d6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1693" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3832.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3832.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833342" comment="bpftool-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833343" comment="kernel-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833344" comment="kernel-abi-whitelists-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833345" comment="kernel-core-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833346" comment="kernel-cross-headers-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833347" comment="kernel-debug-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833348" comment="kernel-debug-core-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833350" comment="kernel-debug-modules-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833351" comment="kernel-debug-modules-extra-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833353" comment="kernel-doc-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833354" comment="kernel-headers-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833355" comment="kernel-modules-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833356" comment="kernel-modules-extra-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833357" comment="kernel-tools-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833358" comment="kernel-tools-libs-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833360" comment="perf-4.18.0-147.0.2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833361" comment="python3-perf-4.18.0-147.0.2.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1694" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3871.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3871.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833362" comment="bpftool-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833363" comment="kernel-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833364" comment="kernel-abi-whitelists-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833365" comment="kernel-core-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833366" comment="kernel-cross-headers-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833367" comment="kernel-debug-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833368" comment="kernel-debug-core-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833370" comment="kernel-debug-modules-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833371" comment="kernel-debug-modules-extra-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833373" comment="kernel-doc-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833374" comment="kernel-headers-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833375" comment="kernel-modules-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833376" comment="kernel-modules-extra-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833377" comment="kernel-tools-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833378" comment="kernel-tools-libs-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833380" comment="perf-4.18.0-147.0.3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833381" comment="python3-perf-4.18.0-147.0.3.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1695" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3890.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3890.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833382" comment="ghostscript-9.25-5.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833383" comment="ghostscript-doc-9.25-5.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833384" comment="ghostscript-tools-dvipdf-9.25-5.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833385" comment="ghostscript-tools-fonts-9.25-5.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833386" comment="ghostscript-tools-printing-9.25-5.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833387" comment="ghostscript-x11-9.25-5.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833388" comment="libgs-9.25-5.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833389" comment="libgs-devel-9.25-5.el8_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1696" version="1" class="patch">
	<metadata>
		<title>security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833390" comment="SDL-1.2.15-36.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833391" comment="SDL-devel-1.2.15-36.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1697" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833392" comment="firefox-68.3.0-1.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1698" version="1" class="patch">
	<metadata>
		<title>security update for nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4114.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4114.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833393" comment="nss-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833394" comment="nss-devel-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833395" comment="nss-softokn-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833396" comment="nss-softokn-devel-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833397" comment="nss-softokn-freebl-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833398" comment="nss-softokn-freebl-devel-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833399" comment="nss-sysinit-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833400" comment="nss-tools-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833401" comment="nss-util-3.44.0-9.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833402" comment="nss-util-devel-3.44.0-9.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1699" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4195.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4195.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833403" comment="thunderbird-68.3.0-2.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1700" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-16884" ref_url="https://www.suse.com/security/cve/CVE-2019-16884/" source="CVE"/>
		<reference ref_id="CVE-2019-18466" ref_url="https://www.suse.com/security/cve/CVE-2019-18466/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4269.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4269.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16884/">CVE-2019-16884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16884">CVE-2019-16884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18466/">CVE-2019-18466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18466">CVE-2019-18466 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833404" comment="container-selinux-2.123.0-2.module+el8.1.0+4900+9d7326b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833405" comment="containernetworking-plugins-0.8.1-3.module+el8.1.0+4881+045289ee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833406" comment="containers-common-0.1.37-6.module+el8.1.0+4876+e678a192 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833407" comment="podman-1.4.2-6.module+el8.1.0+4830+f49150d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833408" comment="podman-docker-1.4.2-6.module+el8.1.0+4830+f49150d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833409" comment="podman-manpages-1.4.2-6.module+el8.1.0+4830+f49150d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833410" comment="podman-remote-1.4.2-6.module+el8.1.0+4830+f49150d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833411" comment="runc-1.0.0-61.rc8.module+el8.1.0+4873+4a24e241 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833412" comment="skopeo-0.1.37-6.module+el8.1.0+4876+e678a192 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1701" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4273.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4273.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9512">CVE-2019-9512 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9514">CVE-2019-9514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833413" comment="buildah-1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832715" comment="container-selinux-2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833414" comment="containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833415" comment="containers-common-0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832718" comment="fuse-overlayfs-0.3-5.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832719" comment="oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832720" comment="oci-umount-2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833416" comment="podman-1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833417" comment="podman-docker-1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833418" comment="runc-1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833419" comment="skopeo-0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832725" comment="slirp4netns-0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1702" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4356.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4356.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1348">CVE-2019-1348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1349">CVE-2019-1349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1352">CVE-2019-1352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833420" comment="git-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833421" comment="git-all-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833422" comment="git-core-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833423" comment="git-core-doc-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833424" comment="git-daemon-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833425" comment="git-email-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833426" comment="git-gui-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833427" comment="git-instaweb-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833428" comment="git-subtree-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833429" comment="git-svn-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833430" comment="gitk-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833431" comment="gitweb-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833432" comment="perl-Git-2.18.2-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833433" comment="perl-Git-SVN-2.18.2-1.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1703" version="1" class="patch">
	<metadata>
		<title>security update for libyang (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19333" ref_url="https://www.suse.com/security/cve/CVE-2019-19333/" source="CVE"/>
		<reference ref_id="CVE-2019-19334" ref_url="https://www.suse.com/security/cve/CVE-2019-19334/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4360.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4360.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19333/">CVE-2019-19333 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19333">CVE-2019-19333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19334/">CVE-2019-19334 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19334">CVE-2019-19334 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833434" comment="libyang-0.16.105-3.el8_1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1704" version="1" class="patch">
	<metadata>
		<title>security update for fribidi (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4361.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4361.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18397">CVE-2019-18397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833435" comment="fribidi-1.0.4-7.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833436" comment="fribidi-devel-1.0.4-7.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1705" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833437" comment="firefox-68.4.1-1.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1706" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833438" comment="thunderbird-68.4.1-2.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1707" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2655" ref_url="https://www.suse.com/security/cve/CVE-2020-2655/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2655/">CVE-2020-2655 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2655">CVE-2020-2655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833439" comment="java-11-openjdk-11.0.6.10-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833440" comment="java-11-openjdk-demo-11.0.6.10-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833441" comment="java-11-openjdk-devel-11.0.6.10-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833442" comment="java-11-openjdk-headless-11.0.6.10-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833443" comment="java-11-openjdk-javadoc-11.0.6.10-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833444" comment="java-11-openjdk-javadoc-zip-11.0.6.10-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833445" comment="java-11-openjdk-jmods-11.0.6.10-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833446" comment="java-11-openjdk-src-11.0.6.10-0.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1708" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.0 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-0602" ref_url="https://www.suse.com/security/cve/CVE-2020-0602/" source="CVE"/>
		<reference ref_id="CVE-2020-0603" ref_url="https://www.suse.com/security/cve/CVE-2020-0603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0130.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0130.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0602/">CVE-2020-0602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0602">CVE-2020-0602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0603/">CVE-2020-0603 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0603">CVE-2020-0603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833447" comment="aspnetcore-runtime-3.0-3.0.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833448" comment="aspnetcore-targeting-pack-3.0-3.0.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833449" comment="dotnet-3.0.102-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833450" comment="dotnet-apphost-pack-3.0-3.0.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833451" comment="dotnet-host-3.0.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833452" comment="dotnet-hostfxr-3.0-3.0.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833453" comment="dotnet-runtime-3.0-3.0.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833454" comment="dotnet-sdk-3.0-3.0.102-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833455" comment="dotnet-targeting-pack-3.0-3.0.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833456" comment="dotnet-templates-3.0-3.0.102-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833457" comment="netstandard-targeting-pack-2.1-3.0.102-2.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1709" version="1" class="patch">
	<metadata>
		<title>security update for python-reportlab (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17626" ref_url="https://www.suse.com/security/cve/CVE-2019-17626/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-17626/">CVE-2019-17626 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17626">CVE-2019-17626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833458" comment="python3-reportlab-3.4.0-6.el8_1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1710" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0202.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0202.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833459" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833460" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833461" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833462" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833463" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833464" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833465" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833466" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1711" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0271.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0271.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18408">CVE-2019-18408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833467" comment="bsdtar-3.3.2-8.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833468" comment="libarchive-3.3.2-8.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833469" comment="libarchive-devel-3.3.2-8.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1712" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13734" ref_url="https://www.suse.com/security/cve/CVE-2019-13734/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0273.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0273.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13734/">CVE-2019-13734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13734">CVE-2019-13734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833470" comment="lemon-3.26.0-4.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833471" comment="sqlite-3.26.0-4.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833472" comment="sqlite-devel-3.26.0-4.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833473" comment="sqlite-doc-3.26.0-4.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833474" comment="sqlite-libs-3.26.0-4.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1713" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0274.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0274.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6851">CVE-2020-6851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833475" comment="openjpeg2-2.3.1-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833476" comment="openjpeg2-devel-2.3.1-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833477" comment="openjpeg2-devel-docs-2.3.1-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833478" comment="openjpeg2-tools-2.3.1-2.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1714" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0279.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0279.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832511" comment="hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832512" comment="hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832513" comment="libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832514" comment="libguestfs-bash-completion-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832515" comment="libguestfs-benchmarking-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832516" comment="libguestfs-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832517" comment="libguestfs-gfs2-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832518" comment="libguestfs-gobject-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832519" comment="libguestfs-gobject-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832520" comment="libguestfs-inspect-icons-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832521" comment="libguestfs-java-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832522" comment="libguestfs-java-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832523" comment="libguestfs-javadoc-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832524" comment="libguestfs-man-pages-ja-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832525" comment="libguestfs-man-pages-uk-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832526" comment="libguestfs-rescue-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832527" comment="libguestfs-rsync-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832528" comment="libguestfs-tools-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832529" comment="libguestfs-tools-c-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832530" comment="libguestfs-winsupport-8.0-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832531" comment="libguestfs-xfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832532" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832533" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832534" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833479" comment="libvirt-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833480" comment="libvirt-admin-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833481" comment="libvirt-bash-completion-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833482" comment="libvirt-client-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833483" comment="libvirt-daemon-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833484" comment="libvirt-daemon-config-network-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833485" comment="libvirt-daemon-config-nwfilter-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833486" comment="libvirt-daemon-driver-interface-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833487" comment="libvirt-daemon-driver-network-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833488" comment="libvirt-daemon-driver-nodedev-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833489" comment="libvirt-daemon-driver-nwfilter-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833490" comment="libvirt-daemon-driver-qemu-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833491" comment="libvirt-daemon-driver-secret-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833492" comment="libvirt-daemon-driver-storage-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833493" comment="libvirt-daemon-driver-storage-core-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833494" comment="libvirt-daemon-driver-storage-disk-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833495" comment="libvirt-daemon-driver-storage-gluster-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833496" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833497" comment="libvirt-daemon-driver-storage-logical-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833498" comment="libvirt-daemon-driver-storage-mpath-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833499" comment="libvirt-daemon-driver-storage-rbd-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833500" comment="libvirt-daemon-driver-storage-scsi-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833501" comment="libvirt-daemon-kvm-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832558" comment="libvirt-dbus-1.2.0-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833502" comment="libvirt-devel-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833503" comment="libvirt-docs-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833504" comment="libvirt-libs-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833505" comment="libvirt-lock-sanlock-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833506" comment="libvirt-nss-4.5.0-35.2.module+el8.1.0+5256+4b9ab730 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832564" comment="lua-guestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832565" comment="nbdkit-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832566" comment="nbdkit-bash-completion-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832567" comment="nbdkit-basic-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832568" comment="nbdkit-devel-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832569" comment="nbdkit-example-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832570" comment="nbdkit-plugin-gzip-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832571" comment="nbdkit-plugin-python-common-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832572" comment="nbdkit-plugin-python3-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832573" comment="nbdkit-plugin-vddk-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832574" comment="nbdkit-plugin-xz-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832575" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832576" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832577" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832578" comment="ocaml-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832579" comment="ocaml-hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832580" comment="ocaml-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832581" comment="ocaml-libguestfs-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832582" comment="perl-Sys-Guestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832583" comment="perl-Sys-Virt-4.5.0-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832584" comment="perl-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832585" comment="python3-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832586" comment="python3-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832587" comment="python3-libvirt-4.5.0-2.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833507" comment="qemu-guest-agent-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833508" comment="qemu-img-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833509" comment="qemu-kvm-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833510" comment="qemu-kvm-block-curl-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833511" comment="qemu-kvm-block-gluster-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833512" comment="qemu-kvm-block-iscsi-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833513" comment="qemu-kvm-block-rbd-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833514" comment="qemu-kvm-block-ssh-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833515" comment="qemu-kvm-common-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833516" comment="qemu-kvm-core-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833517" comment="qemu-kvm-tests-2.12.0-88.module+el8.1.0+5149+3ff2765e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832599" comment="ruby-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832600" comment="ruby-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832601" comment="seabios-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832602" comment="seabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832603" comment="seavgabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832604" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832605" comment="supermin-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832606" comment="supermin-devel-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832607" comment="virt-dib-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832608" comment="virt-p2v-maker-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832609" comment="virt-v2v-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1715" version="1" class="patch">
	<metadata>
		<title>security update for go-toolset (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-16276" ref_url="https://www.suse.com/security/cve/CVE-2019-16276/" source="CVE"/>
		<reference ref_id="CVE-2019-17596" ref_url="https://www.suse.com/security/cve/CVE-2019-17596/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0329.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0329.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16276/">CVE-2019-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16276">CVE-2019-16276 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17596/">CVE-2019-17596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17596">CVE-2019-17596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833518" comment="go-toolset-1.12.12-2.module+el8.1.0+5317+8a49ffbb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833519" comment="golang-1.12.12-4.module+el8.1.0+5317+8a49ffbb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833520" comment="golang-bin-1.12.12-4.module+el8.1.0+5317+8a49ffbb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833521" comment="golang-docs-1.12.12-4.module+el8.1.0+5317+8a49ffbb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833522" comment="golang-misc-1.12.12-4.module+el8.1.0+5317+8a49ffbb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833523" comment="golang-race-1.12.12-4.module+el8.1.0+5317+8a49ffbb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833524" comment="golang-src-1.12.12-4.module+el8.1.0+5317+8a49ffbb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833525" comment="golang-tests-1.12.12-4.module+el8.1.0+5317+8a49ffbb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1716" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14865" ref_url="https://www.suse.com/security/cve/CVE-2019-14865/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0335.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0335.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14865/">CVE-2019-14865 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14865">CVE-2019-14865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833526" comment="grub2-common-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833527" comment="grub2-efi-ia32-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833528" comment="grub2-efi-ia32-cdboot-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833529" comment="grub2-efi-ia32-modules-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833530" comment="grub2-efi-x64-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833531" comment="grub2-efi-x64-cdboot-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833532" comment="grub2-efi-x64-modules-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833533" comment="grub2-pc-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833534" comment="grub2-pc-modules-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833535" comment="grub2-tools-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833536" comment="grub2-tools-efi-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833537" comment="grub2-tools-extra-2.02-78.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833538" comment="grub2-tools-minimal-2.02-78.el8_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1717" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14898" ref_url="https://www.suse.com/security/cve/CVE-2019-14898/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0339.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0339.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14898/">CVE-2019-14898 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14898">CVE-2019-14898 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833539" comment="bpftool-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833540" comment="kernel-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833541" comment="kernel-abi-whitelists-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833542" comment="kernel-core-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833543" comment="kernel-cross-headers-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833544" comment="kernel-debug-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833545" comment="kernel-debug-core-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833547" comment="kernel-debug-modules-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833548" comment="kernel-debug-modules-extra-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833550" comment="kernel-doc-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833551" comment="kernel-headers-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833552" comment="kernel-modules-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833553" comment="kernel-modules-extra-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833554" comment="kernel-tools-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833555" comment="kernel-tools-libs-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833557" comment="perf-4.18.0-147.5.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833558" comment="python3-perf-4.18.0-147.5.1.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1718" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0348.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0348.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833559" comment="buildah-1.11.6-4.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833560" comment="buildah-tests-1.11.6-4.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833561" comment="cockpit-podman-11-1.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833562" comment="conmon-2.0.6-1.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833563" comment="container-selinux-2.124.0-1.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833564" comment="containernetworking-plugins-0.8.3-4.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833565" comment="containers-common-0.1.40-8.module+el8.1.1+5351+506397b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833566" comment="fuse-overlayfs-0.7.2-1.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833567" comment="podman-1.6.4-2.module+el8.1.1+5363+bf8ff1af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833568" comment="podman-docker-1.6.4-2.module+el8.1.1+5363+bf8ff1af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833569" comment="podman-manpages-1.6.4-2.module+el8.1.1+5363+bf8ff1af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833570" comment="podman-remote-1.6.4-2.module+el8.1.1+5363+bf8ff1af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833571" comment="podman-tests-1.6.4-2.module+el8.1.1+5363+bf8ff1af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833572" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833573" comment="runc-1.0.0-64.rc9.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833574" comment="skopeo-0.1.40-8.module+el8.1.1+5351+506397b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833575" comment="skopeo-tests-0.1.40-8.module+el8.1.1+5351+506397b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833576" comment="slirp4netns-0.4.2-2.git21fdece.module+el8.1.1+5460+3ac089c3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833577" comment="toolbox-0.0.4-1.module+el8.1.1+4407+ac444e5d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833578" comment="udica-0.2.1-2.module+el8.1.1+4975+482d6f5d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1719" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0487.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0487.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833579" comment="sudo-1.8.25p1-8.el8_1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1720" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0512.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0512.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833580" comment="firefox-68.5.0-2.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1721" version="1" class="patch">
	<metadata>
		<title>security update for ksh (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14868" ref_url="https://www.suse.com/security/cve/CVE-2019-14868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0559.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0559.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14868/">CVE-2019-14868 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14868">CVE-2019-14868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833581" comment="ksh-20120801-253.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1722" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0570.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0570.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833582" comment="openjpeg2-2.3.1-3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833583" comment="openjpeg2-devel-2.3.1-3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833584" comment="openjpeg2-devel-docs-2.3.1-3.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833585" comment="openjpeg2-tools-2.3.1-3.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1723" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0575.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0575.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833586" comment="systemd-239-18.el8_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833587" comment="systemd-container-239-18.el8_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833588" comment="systemd-devel-239-18.el8_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833589" comment="systemd-journal-remote-239-18.el8_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833590" comment="systemd-libs-239-18.el8_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833591" comment="systemd-pam-239-18.el8_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833592" comment="systemd-tests-239-18.el8_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833593" comment="systemd-udev-239-18.el8_1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1724" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-6792" ref_url="https://www.suse.com/security/cve/CVE-2020-6792/" source="CVE"/>
		<reference ref_id="CVE-2020-6793" ref_url="https://www.suse.com/security/cve/CVE-2020-6793/" source="CVE"/>
		<reference ref_id="CVE-2020-6794" ref_url="https://www.suse.com/security/cve/CVE-2020-6794/" source="CVE"/>
		<reference ref_id="CVE-2020-6795" ref_url="https://www.suse.com/security/cve/CVE-2020-6795/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0577.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0577.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6792/">CVE-2020-6792 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6792">CVE-2020-6792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6793/">CVE-2020-6793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6793">CVE-2020-6793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6794/">CVE-2020-6794 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6794">CVE-2020-6794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6795/">CVE-2020-6795 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6795">CVE-2020-6795 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833594" comment="thunderbird-68.5.0-1.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1725" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604/" source="CVE"/>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<reference ref_id="CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606/" source="CVE"/>
		<reference ref_id="CVE-2019-16775" ref_url="https://www.suse.com/security/cve/CVE-2019-16775/" source="CVE"/>
		<reference ref_id="CVE-2019-16776" ref_url="https://www.suse.com/security/cve/CVE-2019-16776/" source="CVE"/>
		<reference ref_id="CVE-2019-16777" ref_url="https://www.suse.com/security/cve/CVE-2019-16777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0579.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0579.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15604">CVE-2019-15604 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15605">CVE-2019-15605 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15606">CVE-2019-15606 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16775/">CVE-2019-16775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16775">CVE-2019-16775 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16776/">CVE-2019-16776 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16776">CVE-2019-16776 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16777/">CVE-2019-16777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16777">CVE-2019-16777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833595" comment="nodejs-10.19.0-1.module+el8.1.0+5726+6ed65f8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833596" comment="nodejs-devel-10.19.0-1.module+el8.1.0+5726+6ed65f8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833597" comment="nodejs-docs-10.19.0-1.module+el8.1.0+5726+6ed65f8c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832427" comment="nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832428" comment="nodejs-packaging-17-3.module+el8+2873+aa7dfd9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833598" comment="npm-6.13.4-1.10.19.0.1.module+el8.1.0+5726+6ed65f8c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1726" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-16865" ref_url="https://www.suse.com/security/cve/CVE-2019-16865/" source="CVE"/>
		<reference ref_id="CVE-2020-5311" ref_url="https://www.suse.com/security/cve/CVE-2020-5311/" source="CVE"/>
		<reference ref_id="CVE-2020-5312" ref_url="https://www.suse.com/security/cve/CVE-2020-5312/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0580.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0580.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16865/">CVE-2019-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16865">CVE-2019-16865 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5311/">CVE-2020-5311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5311">CVE-2020-5311 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5312/">CVE-2020-5312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5312">CVE-2020-5312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833599" comment="python3-pillow-5.1.1-10.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1727" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604/" source="CVE"/>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<reference ref_id="CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0598.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0598.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15604">CVE-2019-15604 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15605">CVE-2019-15605 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15606">CVE-2019-15606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833600" comment="nodejs-12.16.1-1.module+el8.1.0+5811+44509afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833601" comment="nodejs-devel-12.16.1-1.module+el8.1.0+5811+44509afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833602" comment="nodejs-docs-12.16.1-1.module+el8.1.0+5811+44509afe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833603" comment="nodejs-nodemon-1.18.3-1.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833605" comment="npm-6.13.4-1.12.16.1.1.module+el8.1.0+5811+44509afe is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1728" version="1" class="patch">
	<metadata>
		<title>security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0633.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0633.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833606" comment="ppp-2.4.7-26.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833607" comment="ppp-devel-2.4.7-26.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1729" version="1" class="patch">
	<metadata>
		<title>security update for http-parser (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0708.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0708.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15605">CVE-2019-15605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833608" comment="http-parser-2.8.0-5.el8_1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1730" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0820.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0820.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833609" comment="firefox-68.6.0-1.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1731" version="1" class="patch">
	<metadata>
		<title>security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0902.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0902.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833610" comment="icu-60.3-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833611" comment="libicu-60.3-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833612" comment="libicu-devel-60.3-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833613" comment="libicu-doc-60.3-2.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1732" version="1" class="patch">
	<metadata>
		<title>security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0903.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0903.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833614" comment="zsh-5.5.1-6.el8_1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1733" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0919.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0919.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833615" comment="thunderbird-68.6.0-1.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1734" version="1" class="patch">
	<metadata>
		<title>security update for libvncserver (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0920.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0920.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20788">CVE-2019-20788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833616" comment="libvncserver-0.9.11-9.el8_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833617" comment="libvncserver-devel-0.9.11-9.el8_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1735" version="1" class="patch">
	<metadata>
		<title>security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0981.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0981.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833618" comment="exchange-bmc-os-info-1.8.18-12.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833619" comment="ipmievd-1.8.18-12.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833620" comment="ipmitool-1.8.18-12.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1736" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11100" ref_url="https://www.suse.com/security/cve/CVE-2020-11100/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1288.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1288.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11100/">CVE-2020-11100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11100">CVE-2020-11100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833621" comment="haproxy-1.8.15-6.el8_1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1737" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1293.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1293.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833622" comment="nodejs-12.16.1-2.module+el8.1.0+6117+b25a342c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833623" comment="nodejs-devel-12.16.1-2.module+el8.1.0+6117+b25a342c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833624" comment="nodejs-docs-12.16.1-2.module+el8.1.0+6117+b25a342c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833603" comment="nodejs-nodemon-1.18.3-1.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833625" comment="npm-6.13.4-1.12.16.1.2.module+el8.1.0+6117+b25a342c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1738" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1317.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1317.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833626" comment="nodejs-10.19.0-2.module+el8.1.0+6118+5aaa808b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833627" comment="nodejs-devel-10.19.0-2.module+el8.1.0+6118+5aaa808b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833628" comment="nodejs-docs-10.19.0-2.module+el8.1.0+6118+5aaa808b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832427" comment="nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832428" comment="nodejs-packaging-17-3.module+el8+2873+aa7dfd9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833629" comment="npm-6.13.4-1.10.19.0.2.module+el8.1.0+6118+5aaa808b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1739" version="1" class="patch">
	<metadata>
		<title>security update for telnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1318.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1318.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833630" comment="telnet-0.17-73.el8_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833631" comment="telnet-server-0.17-73.el8_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1740" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1341.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1341.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833632" comment="firefox-68.6.1-1.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1741" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1358.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1358.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832511" comment="hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832512" comment="hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832513" comment="libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832514" comment="libguestfs-bash-completion-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832515" comment="libguestfs-benchmarking-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832516" comment="libguestfs-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832517" comment="libguestfs-gfs2-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832518" comment="libguestfs-gobject-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832519" comment="libguestfs-gobject-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832520" comment="libguestfs-inspect-icons-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832521" comment="libguestfs-java-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832522" comment="libguestfs-java-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832523" comment="libguestfs-javadoc-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832524" comment="libguestfs-man-pages-ja-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832525" comment="libguestfs-man-pages-uk-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832526" comment="libguestfs-rescue-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832527" comment="libguestfs-rsync-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832528" comment="libguestfs-tools-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832529" comment="libguestfs-tools-c-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832530" comment="libguestfs-winsupport-8.0-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832531" comment="libguestfs-xfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832532" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832533" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832534" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833633" comment="libvirt-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833634" comment="libvirt-admin-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833635" comment="libvirt-bash-completion-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833636" comment="libvirt-client-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833637" comment="libvirt-daemon-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833638" comment="libvirt-daemon-config-network-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833639" comment="libvirt-daemon-config-nwfilter-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833640" comment="libvirt-daemon-driver-interface-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833641" comment="libvirt-daemon-driver-network-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833642" comment="libvirt-daemon-driver-nodedev-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833643" comment="libvirt-daemon-driver-nwfilter-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833644" comment="libvirt-daemon-driver-qemu-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833645" comment="libvirt-daemon-driver-secret-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833646" comment="libvirt-daemon-driver-storage-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833647" comment="libvirt-daemon-driver-storage-core-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833648" comment="libvirt-daemon-driver-storage-disk-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833649" comment="libvirt-daemon-driver-storage-gluster-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833650" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833651" comment="libvirt-daemon-driver-storage-logical-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833652" comment="libvirt-daemon-driver-storage-mpath-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833653" comment="libvirt-daemon-driver-storage-rbd-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833654" comment="libvirt-daemon-driver-storage-scsi-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833655" comment="libvirt-daemon-kvm-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832558" comment="libvirt-dbus-1.2.0-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833656" comment="libvirt-devel-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833657" comment="libvirt-docs-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833658" comment="libvirt-libs-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833659" comment="libvirt-lock-sanlock-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833660" comment="libvirt-nss-4.5.0-35.3.module+el8.1.0+5931+8897e7e1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832564" comment="lua-guestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832565" comment="nbdkit-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832566" comment="nbdkit-bash-completion-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832567" comment="nbdkit-basic-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832568" comment="nbdkit-devel-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832569" comment="nbdkit-example-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832570" comment="nbdkit-plugin-gzip-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832571" comment="nbdkit-plugin-python-common-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832572" comment="nbdkit-plugin-python3-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832573" comment="nbdkit-plugin-vddk-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832574" comment="nbdkit-plugin-xz-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832575" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832576" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832577" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832578" comment="ocaml-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832579" comment="ocaml-hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832580" comment="ocaml-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832581" comment="ocaml-libguestfs-devel-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832582" comment="perl-Sys-Guestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832583" comment="perl-Sys-Virt-4.5.0-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832584" comment="perl-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832585" comment="python3-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832586" comment="python3-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832587" comment="python3-libvirt-4.5.0-2.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833661" comment="qemu-guest-agent-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833662" comment="qemu-img-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833663" comment="qemu-kvm-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833664" comment="qemu-kvm-block-curl-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833665" comment="qemu-kvm-block-gluster-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833666" comment="qemu-kvm-block-iscsi-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833667" comment="qemu-kvm-block-rbd-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833668" comment="qemu-kvm-block-ssh-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833669" comment="qemu-kvm-common-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833670" comment="qemu-kvm-core-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833671" comment="qemu-kvm-tests-2.12.0-88.module+el8.1.0+5708+85d8e057.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832599" comment="ruby-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832600" comment="ruby-libguestfs-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832601" comment="seabios-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832602" comment="seabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832603" comment="seavgabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832604" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832605" comment="supermin-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832606" comment="supermin-devel-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832607" comment="virt-dib-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832608" comment="virt-p2v-maker-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832609" comment="virt-v2v-1.38.4-14.module+el8.1.0+4066+0f1aadab is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1742" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1360.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1360.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833413" comment="buildah-1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832715" comment="container-selinux-2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833414" comment="containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833415" comment="containers-common-0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832718" comment="fuse-overlayfs-0.3-5.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832719" comment="oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832720" comment="oci-umount-2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833416" comment="podman-1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833417" comment="podman-docker-1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833418" comment="runc-1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833419" comment="skopeo-0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833672" comment="slirp4netns-0.1-4.dev.gitc4e1bc5.module+el8.1.0+5654+5237a55d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1743" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1372.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1372.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15030">CVE-2019-15030 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15031">CVE-2019-15031 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833673" comment="bpftool-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833674" comment="kernel-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833675" comment="kernel-abi-whitelists-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833676" comment="kernel-core-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833677" comment="kernel-cross-headers-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833678" comment="kernel-debug-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833679" comment="kernel-debug-core-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833681" comment="kernel-debug-modules-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833682" comment="kernel-debug-modules-extra-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833684" comment="kernel-doc-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833685" comment="kernel-headers-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833686" comment="kernel-modules-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833687" comment="kernel-modules-extra-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833688" comment="kernel-tools-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833689" comment="kernel-tools-libs-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833691" comment="perf-4.18.0-147.8.1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833692" comment="python3-perf-4.18.0-147.8.1.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1744" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1379.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1379.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833693" comment="buildah-1.11.6-6.module+el8.1.1+5865+cc793d95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833694" comment="buildah-tests-1.11.6-6.module+el8.1.1+5865+cc793d95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833561" comment="cockpit-podman-11-1.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833562" comment="conmon-2.0.6-1.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833563" comment="container-selinux-2.124.0-1.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833564" comment="containernetworking-plugins-0.8.3-4.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833565" comment="containers-common-0.1.40-8.module+el8.1.1+5351+506397b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833695" comment="fuse-overlayfs-0.7.2-5.module+el8.1.1+6114+953c5a57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833696" comment="podman-1.6.4-4.module+el8.1.1+5885+44006e55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833697" comment="podman-docker-1.6.4-4.module+el8.1.1+5885+44006e55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833698" comment="podman-manpages-1.6.4-4.module+el8.1.1+5885+44006e55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833699" comment="podman-remote-1.6.4-4.module+el8.1.1+5885+44006e55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833700" comment="podman-tests-1.6.4-4.module+el8.1.1+5885+44006e55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833572" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833573" comment="runc-1.0.0-64.rc9.module+el8.1.1+5259+bcdd613a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833574" comment="skopeo-0.1.40-8.module+el8.1.1+5351+506397b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833575" comment="skopeo-tests-0.1.40-8.module+el8.1.1+5351+506397b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833701" comment="slirp4netns-0.4.2-3.git21fdece.module+el8.1.1+5657+524a77d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833577" comment="toolbox-0.0.4-1.module+el8.1.1+4407+ac444e5d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833578" comment="udica-0.2.1-2.module+el8.1.1+4975+482d6f5d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1745" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1406.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1406.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833702" comment="firefox-68.7.0-2.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1746" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1495.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1495.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833703" comment="thunderbird-68.7.0-1.el8_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1747" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1497.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1497.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833704" comment="tigervnc-1.9.0-14.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833705" comment="tigervnc-icons-1.9.0-14.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833706" comment="tigervnc-license-1.9.0-14.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833707" comment="tigervnc-server-1.9.0-14.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833708" comment="tigervnc-server-applet-1.9.0-14.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833709" comment="tigervnc-server-minimal-1.9.0-14.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833710" comment="tigervnc-server-module-1.9.0-14.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1748" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1513.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1513.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833711" comment="git-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833712" comment="git-all-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833713" comment="git-core-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833714" comment="git-core-doc-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833715" comment="git-daemon-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833716" comment="git-email-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833717" comment="git-gui-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833718" comment="git-instaweb-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833719" comment="git-subtree-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833720" comment="git-svn-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833721" comment="gitk-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833722" comment="gitweb-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833723" comment="perl-Git-2.18.2-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833724" comment="perl-Git-SVN-2.18.2-2.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1749" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2767" ref_url="https://www.suse.com/security/cve/CVE-2020-2767/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2778" ref_url="https://www.suse.com/security/cve/CVE-2020-2778/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2816" ref_url="https://www.suse.com/security/cve/CVE-2020-2816/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1514.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1514.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2767/">CVE-2020-2767 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2767">CVE-2020-2767 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2778/">CVE-2020-2778 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2778">CVE-2020-2778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2816/">CVE-2020-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2816">CVE-2020-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833725" comment="java-11-openjdk-11.0.7.10-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833726" comment="java-11-openjdk-demo-11.0.7.10-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833727" comment="java-11-openjdk-devel-11.0.7.10-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833728" comment="java-11-openjdk-headless-11.0.7.10-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833729" comment="java-11-openjdk-javadoc-11.0.7.10-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833730" comment="java-11-openjdk-javadoc-zip-11.0.7.10-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833731" comment="java-11-openjdk-jmods-11.0.7.10-1.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833732" comment="java-11-openjdk-src-11.0.7.10-1.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1750" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1515.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1515.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833733" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833734" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833735" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833736" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833737" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833738" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833739" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el8_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833740" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el8_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1751" version="1" class="patch">
	<metadata>
		<title>security update for memcached (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11596" ref_url="https://www.suse.com/security/cve/CVE-2019-11596/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1576.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1576.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11596/">CVE-2019-11596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11596">CVE-2019-11596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833741" comment="memcached-1.5.9-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1752" version="1" class="patch">
	<metadata>
		<title>security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2017-18005" ref_url="https://www.suse.com/security/cve/CVE-2017-18005/" source="CVE"/>
		<reference ref_id="CVE-2018-10772" ref_url="https://www.suse.com/security/cve/CVE-2018-10772/" source="CVE"/>
		<reference ref_id="CVE-2018-11037" ref_url="https://www.suse.com/security/cve/CVE-2018-11037/" source="CVE"/>
		<reference ref_id="CVE-2018-14338" ref_url="https://www.suse.com/security/cve/CVE-2018-14338/" source="CVE"/>
		<reference ref_id="CVE-2018-17229" ref_url="https://www.suse.com/security/cve/CVE-2018-17229/" source="CVE"/>
		<reference ref_id="CVE-2018-17230" ref_url="https://www.suse.com/security/cve/CVE-2018-17230/" source="CVE"/>
		<reference ref_id="CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282/" source="CVE"/>
		<reference ref_id="CVE-2018-17581" ref_url="https://www.suse.com/security/cve/CVE-2018-17581/" source="CVE"/>
		<reference ref_id="CVE-2018-18915" ref_url="https://www.suse.com/security/cve/CVE-2018-18915/" source="CVE"/>
		<reference ref_id="CVE-2018-19107" ref_url="https://www.suse.com/security/cve/CVE-2018-19107/" source="CVE"/>
		<reference ref_id="CVE-2018-19108" ref_url="https://www.suse.com/security/cve/CVE-2018-19108/" source="CVE"/>
		<reference ref_id="CVE-2018-19535" ref_url="https://www.suse.com/security/cve/CVE-2018-19535/" source="CVE"/>
		<reference ref_id="CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607/" source="CVE"/>
		<reference ref_id="CVE-2018-20096" ref_url="https://www.suse.com/security/cve/CVE-2018-20096/" source="CVE"/>
		<reference ref_id="CVE-2018-20097" ref_url="https://www.suse.com/security/cve/CVE-2018-20097/" source="CVE"/>
		<reference ref_id="CVE-2018-20098" ref_url="https://www.suse.com/security/cve/CVE-2018-20098/" source="CVE"/>
		<reference ref_id="CVE-2018-20099" ref_url="https://www.suse.com/security/cve/CVE-2018-20099/" source="CVE"/>
		<reference ref_id="CVE-2018-4868" ref_url="https://www.suse.com/security/cve/CVE-2018-4868/" source="CVE"/>
		<reference ref_id="CVE-2018-9303" ref_url="https://www.suse.com/security/cve/CVE-2018-9303/" source="CVE"/>
		<reference ref_id="CVE-2018-9304" ref_url="https://www.suse.com/security/cve/CVE-2018-9304/" source="CVE"/>
		<reference ref_id="CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305/" source="CVE"/>
		<reference ref_id="CVE-2018-9306" ref_url="https://www.suse.com/security/cve/CVE-2018-9306/" source="CVE"/>
		<reference ref_id="CVE-2019-13109" ref_url="https://www.suse.com/security/cve/CVE-2019-13109/" source="CVE"/>
		<reference ref_id="CVE-2019-13111" ref_url="https://www.suse.com/security/cve/CVE-2019-13111/" source="CVE"/>
		<reference ref_id="CVE-2019-13112" ref_url="https://www.suse.com/security/cve/CVE-2019-13112/" source="CVE"/>
		<reference ref_id="CVE-2019-13113" ref_url="https://www.suse.com/security/cve/CVE-2019-13113/" source="CVE"/>
		<reference ref_id="CVE-2019-13114" ref_url="https://www.suse.com/security/cve/CVE-2019-13114/" source="CVE"/>
		<reference ref_id="CVE-2019-20421" ref_url="https://www.suse.com/security/cve/CVE-2019-20421/" source="CVE"/>
		<reference ref_id="CVE-2019-9143" ref_url="https://www.suse.com/security/cve/CVE-2019-9143/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1577.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1577.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18005/">CVE-2017-18005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18005">CVE-2017-18005 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10772/">CVE-2018-10772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10772">CVE-2018-10772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11037/">CVE-2018-11037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11037">CVE-2018-11037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14338/">CVE-2018-14338 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14338">CVE-2018-14338 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17229/">CVE-2018-17229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17229">CVE-2018-17229 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17230/">CVE-2018-17230 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17230">CVE-2018-17230 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17282">CVE-2018-17282 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17581/">CVE-2018-17581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17581">CVE-2018-17581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18915/">CVE-2018-18915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18915">CVE-2018-18915 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19107/">CVE-2018-19107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19107">CVE-2018-19107 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19108/">CVE-2018-19108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19108">CVE-2018-19108 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19535/">CVE-2018-19535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19535">CVE-2018-19535 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19607">CVE-2018-19607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20096/">CVE-2018-20096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20096">CVE-2018-20096 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20097/">CVE-2018-20097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20097">CVE-2018-20097 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20098/">CVE-2018-20098 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20098">CVE-2018-20098 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20099/">CVE-2018-20099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20099">CVE-2018-20099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4868/">CVE-2018-4868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4868">CVE-2018-4868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9303/">CVE-2018-9303 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9303">CVE-2018-9303 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9304/">CVE-2018-9304 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9304">CVE-2018-9304 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9305">CVE-2018-9305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-9306/">CVE-2018-9306 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9306">CVE-2018-9306 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13109/">CVE-2019-13109 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13109">CVE-2019-13109 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13111/">CVE-2019-13111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13111">CVE-2019-13111 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13112/">CVE-2019-13112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13112">CVE-2019-13112 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13113/">CVE-2019-13113 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13113">CVE-2019-13113 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13114/">CVE-2019-13114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13114">CVE-2019-13114 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20421/">CVE-2019-20421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20421">CVE-2019-20421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9143/">CVE-2019-9143 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9143">CVE-2019-9143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833742" comment="exiv2-0.27.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833743" comment="exiv2-devel-0.27.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833744" comment="exiv2-doc-0.27.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833745" comment="exiv2-libs-0.27.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833746" comment="gegl-0.2.0-39.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833747" comment="gnome-color-manager-3.28.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833748" comment="libgexiv2-0.10.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833749" comment="libgexiv2-devel-0.10.8-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1753" version="1" class="patch">
	<metadata>
		<title>security update for wavpack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841/" source="CVE"/>
		<reference ref_id="CVE-2019-1010315" ref_url="https://www.suse.com/security/cve/CVE-2019-1010315/" source="CVE"/>
		<reference ref_id="CVE-2019-1010317" ref_url="https://www.suse.com/security/cve/CVE-2019-1010317/" source="CVE"/>
		<reference ref_id="CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319/" source="CVE"/>
		<reference ref_id="CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1581.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1581.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19840">CVE-2018-19840 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19841">CVE-2018-19841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010315/">CVE-2019-1010315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010315">CVE-2019-1010315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1010317/">CVE-2019-1010317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010317">CVE-2019-1010317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010319">CVE-2019-1010319 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11498">CVE-2019-11498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833750" comment="wavpack-5.1.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833751" comment="wavpack-devel-5.1.0-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1754" version="1" class="patch">
	<metadata>
		<title>security update for evolution (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15587">CVE-2018-15587 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833752" comment="evolution-3.28.5-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833753" comment="evolution-bogofilter-3.28.5-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833754" comment="evolution-data-server-3.28.5-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833755" comment="evolution-data-server-devel-3.28.5-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833756" comment="evolution-data-server-doc-3.28.5-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833757" comment="evolution-data-server-langpacks-3.28.5-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833758" comment="evolution-data-server-perl-3.28.5-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833759" comment="evolution-data-server-tests-3.28.5-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833760" comment="evolution-devel-3.28.5-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833761" comment="evolution-ews-3.28.5-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833762" comment="evolution-ews-langpacks-3.28.5-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833763" comment="evolution-help-3.28.5-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833764" comment="evolution-langpacks-3.28.5-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833765" comment="evolution-pst-3.28.5-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833766" comment="evolution-spamassassin-3.28.5-12.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1755" version="1" class="patch">
	<metadata>
		<title>security update for tcpdump (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1604.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1604.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19519">CVE-2018-19519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833767" comment="tcpdump-4.9.2-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1756" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1605.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1605.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832448" comment="babel-2.5.1-9.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832449" comment="python-nose-docs-1.3.7-30.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832451" comment="python-sqlalchemy-doc-1.3.2-1.module+el8.1.0+2994+98e054d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833768" comment="python2-2.7.17-1.module+el8.2.0+4561+f4e0d66a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832456" comment="python2-babel-2.5.1-9.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832457" comment="python2-backports-1.0-15.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832458" comment="python2-backports-ssl_match_hostname-3.5.0.1-11.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832459" comment="python2-bson-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833769" comment="python2-debug-2.7.17-1.module+el8.2.0+4561+f4e0d66a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833770" comment="python2-devel-2.7.17-1.module+el8.2.0+4561+f4e0d66a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832471" comment="python2-jinja2-2.10-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833771" comment="python2-libs-2.7.17-1.module+el8.2.0+4561+f4e0d66a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832473" comment="python2-lxml-4.2.3-3.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832476" comment="python2-nose-1.3.7-30.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832477" comment="python2-numpy-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832478" comment="python2-numpy-doc-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832479" comment="python2-numpy-f2py-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833772" comment="python2-pip-9.0.3-16.module+el8.2.0+5478+b505947e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833773" comment="python2-pip-wheel-9.0.3-16.module+el8.2.0+5478+b505947e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832487" comment="python2-pygments-2.2.0-20.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832488" comment="python2-pymongo-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832489" comment="python2-pymongo-gridfs-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832497" comment="python2-scipy-1.0.0-20.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832498" comment="python2-setuptools-39.0.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832499" comment="python2-setuptools-wheel-39.0.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832501" comment="python2-six-1.11.0-5.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832502" comment="python2-sqlalchemy-1.3.2-1.module+el8.1.0+2994+98e054d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833775" comment="python2-test-2.7.17-1.module+el8.2.0+4561+f4e0d66a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833776" comment="python2-tkinter-2.7.17-1.module+el8.2.0+4561+f4e0d66a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833777" comment="python2-tools-2.7.17-1.module+el8.2.0+4561+f4e0d66a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832506" comment="python2-urllib3-1.24.2-1.module+el8.1.0+3280+19512f10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832507" comment="python2-virtualenv-15.1.0-19.module+el8.1.0+3507+d69c168d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832508" comment="python2-wheel-0.31.1-2.module+el8.1.0+3725+aac5cd17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832509" comment="python2-wheel-wheel-0.31.1-2.module+el8.1.0+3725+aac5cd17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1757" version="1" class="patch">
	<metadata>
		<title>security update for irssi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13045" ref_url="https://www.suse.com/security/cve/CVE-2019-13045/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1616.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1616.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13045/">CVE-2019-13045 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13045">CVE-2019-13045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833778" comment="irssi-1.1.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833779" comment="irssi-devel-1.1.1-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1758" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1624.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1624.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20783">CVE-2018-20783 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11034">CVE-2019-11034 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11035">CVE-2019-11035 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11036">CVE-2019-11036 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11039">CVE-2019-11039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11040">CVE-2019-11040 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11041">CVE-2019-11041 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11042">CVE-2019-11042 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9020">CVE-2019-9020 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9021">CVE-2019-9021 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9022">CVE-2019-9022 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9023">CVE-2019-9023 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9637">CVE-2019-9637 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9638">CVE-2019-9638 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9639">CVE-2019-9639 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9640">CVE-2019-9640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833780" comment="apcu-panel-5.1.12-2.module+el8.1.0+3202+af5476b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833781" comment="libzip-1.5.1-2.module+el8.1.0+3202+af5476b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833782" comment="libzip-devel-1.5.1-2.module+el8.1.0+3202+af5476b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833783" comment="libzip-tools-1.5.1-2.module+el8.1.0+3202+af5476b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833784" comment="php-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833785" comment="php-bcmath-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833786" comment="php-cli-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833787" comment="php-common-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833788" comment="php-dba-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833789" comment="php-dbg-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833790" comment="php-devel-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833791" comment="php-embedded-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833792" comment="php-enchant-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833793" comment="php-fpm-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833794" comment="php-gd-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833795" comment="php-gmp-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833796" comment="php-intl-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833797" comment="php-json-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833798" comment="php-ldap-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833799" comment="php-mbstring-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833800" comment="php-mysqlnd-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833801" comment="php-odbc-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833802" comment="php-opcache-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833803" comment="php-pdo-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833804" comment="php-pear-1.10.5-9.module+el8.1.0+3202+af5476b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833805" comment="php-pecl-apcu-5.1.12-2.module+el8.1.0+3202+af5476b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833806" comment="php-pecl-apcu-devel-5.1.12-2.module+el8.1.0+3202+af5476b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833807" comment="php-pecl-zip-1.15.3-1.module+el8.1.0+3186+20164e6f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833808" comment="php-pgsql-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833809" comment="php-process-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833810" comment="php-recode-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833811" comment="php-snmp-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833812" comment="php-soap-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833813" comment="php-xml-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833814" comment="php-xmlrpc-7.2.24-1.module+el8.2.0+4601+7c76a223 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1759" version="1" class="patch">
	<metadata>
		<title>security update for SDL (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-7263" ref_url="https://www.suse.com/security/cve/CVE-2018-7263/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1631.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1631.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7263/">CVE-2018-7263 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7263">CVE-2018-7263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833815" comment="SDL-1.2.15-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833816" comment="SDL-devel-1.2.15-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833817" comment="SDL2-2.0.10-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833818" comment="SDL2-devel-2.0.10-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833819" comment="SDL2-static-2.0.10-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833820" comment="gstreamer1-1.16.1-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833821" comment="gstreamer1-devel-1.16.1-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833822" comment="gstreamer1-plugins-bad-free-1.16.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833823" comment="gstreamer1-plugins-bad-free-devel-1.16.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833824" comment="gstreamer1-plugins-base-1.16.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833825" comment="gstreamer1-plugins-base-devel-1.16.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833826" comment="gstreamer1-plugins-good-1.16.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833827" comment="gstreamer1-plugins-good-gtk-1.16.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833828" comment="gstreamer1-plugins-ugly-free-1.16.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833829" comment="libmad-0.15.1b-25.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833830" comment="libmad-devel-0.15.1b-25.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833831" comment="orc-0.4.28-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833832" comment="orc-compiler-0.4.28-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833833" comment="orc-devel-0.4.28-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1760" version="1" class="patch">
	<metadata>
		<title>security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1635.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1635.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010180">CVE-2019-1010180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833834" comment="gdb-8.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833835" comment="gdb-doc-8.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833836" comment="gdb-gdbserver-8.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833837" comment="gdb-headless-8.2-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1761" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19662" ref_url="https://www.suse.com/security/cve/CVE-2018-19662/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1636.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1636.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19662/">CVE-2018-19662 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19662">CVE-2018-19662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833838" comment="libsndfile-1.0.28-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833839" comment="libsndfile-devel-1.0.28-10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1762" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-collections (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14540" ref_url="https://www.suse.com/security/cve/CVE-2019-14540/" source="CVE"/>
		<reference ref_id="CVE-2019-16335" ref_url="https://www.suse.com/security/cve/CVE-2019-16335/" source="CVE"/>
		<reference ref_id="CVE-2019-16942" ref_url="https://www.suse.com/security/cve/CVE-2019-16942/" source="CVE"/>
		<reference ref_id="CVE-2019-16943" ref_url="https://www.suse.com/security/cve/CVE-2019-16943/" source="CVE"/>
		<reference ref_id="CVE-2019-17531" ref_url="https://www.suse.com/security/cve/CVE-2019-17531/" source="CVE"/>
		<reference ref_id="CVE-2019-20330" ref_url="https://www.suse.com/security/cve/CVE-2019-20330/" source="CVE"/>
		<reference ref_id="CVE-2020-10672" ref_url="https://www.suse.com/security/cve/CVE-2020-10672/" source="CVE"/>
		<reference ref_id="CVE-2020-10673" ref_url="https://www.suse.com/security/cve/CVE-2020-10673/" source="CVE"/>
		<reference ref_id="CVE-2020-8840" ref_url="https://www.suse.com/security/cve/CVE-2020-8840/" source="CVE"/>
		<reference ref_id="CVE-2020-9546" ref_url="https://www.suse.com/security/cve/CVE-2020-9546/" source="CVE"/>
		<reference ref_id="CVE-2020-9547" ref_url="https://www.suse.com/security/cve/CVE-2020-9547/" source="CVE"/>
		<reference ref_id="CVE-2020-9548" ref_url="https://www.suse.com/security/cve/CVE-2020-9548/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1644.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1644.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14540/">CVE-2019-14540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14540">CVE-2019-14540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16335/">CVE-2019-16335 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16335">CVE-2019-16335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-16942/">CVE-2019-16942 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16942">CVE-2019-16942 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-16943/">CVE-2019-16943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16943">CVE-2019-16943 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17531/">CVE-2019-17531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17531">CVE-2019-17531 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20330/">CVE-2019-20330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20330">CVE-2019-20330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10672/">CVE-2020-10672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10672">CVE-2020-10672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10673/">CVE-2020-10673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10673">CVE-2020-10673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8840/">CVE-2020-8840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8840">CVE-2020-8840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9546/">CVE-2020-9546 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9546">CVE-2020-9546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9547/">CVE-2020-9547 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9547">CVE-2020-9547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-9548/">CVE-2020-9548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9548">CVE-2020-9548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833840" comment="apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833841" comment="apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833842" comment="bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833843" comment="glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833844" comment="glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833845" comment="glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833846" comment="glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833847" comment="glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833848" comment="jackson-annotations-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833849" comment="jackson-core-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833850" comment="jackson-databind-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833851" comment="jackson-jaxrs-json-provider-2.9.9-1.module+el8.1.0+3832+9784644d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833852" comment="jackson-jaxrs-providers-2.9.9-1.module+el8.1.0+3832+9784644d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833853" comment="jackson-module-jaxb-annotations-2.7.6-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833854" comment="jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833855" comment="javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833856" comment="javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833857" comment="jss-4.6.2-4.module+el8.2.0+6123+b4678599 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833858" comment="jss-javadoc-4.6.2-4.module+el8.2.0+6123+b4678599 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833859" comment="ldapjdk-4.21.0-2.module+el8.2.0+4573+c3c38c7b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833860" comment="ldapjdk-javadoc-4.21.0-2.module+el8.2.0+4573+c3c38c7b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833861" comment="pki-base-10.8.3-1.module+el8.2.0+5925+bad5981a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833862" comment="pki-base-java-10.8.3-1.module+el8.2.0+5925+bad5981a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833863" comment="pki-ca-10.8.3-1.module+el8.2.0+5925+bad5981a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833864" comment="pki-kra-10.8.3-1.module+el8.2.0+5925+bad5981a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833865" comment="pki-server-10.8.3-1.module+el8.2.0+5925+bad5981a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833866" comment="pki-servlet-4.0-api-9.0.7-16.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833867" comment="pki-servlet-engine-9.0.7-16.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833868" comment="pki-symkey-10.8.3-1.module+el8.2.0+5925+bad5981a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833869" comment="pki-tools-10.8.3-1.module+el8.2.0+5925+bad5981a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833870" comment="python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833871" comment="python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833872" comment="python3-pki-10.8.3-1.module+el8.2.0+5925+bad5981a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833873" comment="relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833874" comment="resteasy-3.0.26-3.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833875" comment="slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833876" comment="slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833877" comment="stax-ex-1.7.7-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833878" comment="tomcatjss-7.4.1-2.module+el8.2.0+4573+c3c38c7b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833879" comment="velocity-1.7-24.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833880" comment="xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833881" comment="xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833882" comment="xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833883" comment="xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833884" comment="xmlstreambuffer-1.5.4-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833885" comment="xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1763" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19921" ref_url="https://www.suse.com/security/cve/CVE-2019-19921/" source="CVE"/>
		<reference ref_id="CVE-2020-1702" ref_url="https://www.suse.com/security/cve/CVE-2020-1702/" source="CVE"/>
		<reference ref_id="CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1650.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1650.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19921/">CVE-2019-19921 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19921">CVE-2019-19921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1702/">CVE-2020-1702 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1702">CVE-2020-1702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1726">CVE-2020-1726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833886" comment="buildah-1.11.6-7.module+el8.2.0+5856+b8046c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833887" comment="buildah-tests-1.11.6-7.module+el8.2.0+5856+b8046c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833888" comment="cockpit-podman-12-1.module+el8.2.0+5950+6d183a6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833889" comment="conmon-2.0.6-1.module+el8.2.0+5182+3136e5d4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833890" comment="container-selinux-2.124.0-1.module+el8.2.0+5182+3136e5d4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833891" comment="containernetworking-plugins-0.8.3-5.module+el8.2.0+5201+6b31f0d9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833892" comment="containers-common-0.1.40-10.module+el8.2.0+5955+6cd70ceb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833893" comment="crit-3.12-9.module+el8.2.0+5029+3ac48e7d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833894" comment="criu-3.12-9.module+el8.2.0+5029+3ac48e7d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833895" comment="fuse-overlayfs-0.7.2-5.module+el8.2.0+6060+9dbc027d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833896" comment="podman-1.6.4-10.module+el8.2.0+6063+e761893a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833897" comment="podman-docker-1.6.4-10.module+el8.2.0+6063+e761893a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833898" comment="podman-remote-1.6.4-10.module+el8.2.0+6063+e761893a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833899" comment="podman-tests-1.6.4-10.module+el8.2.0+6063+e761893a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833900" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833901" comment="python3-criu-3.12-9.module+el8.2.0+5029+3ac48e7d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833902" comment="runc-1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833903" comment="skopeo-0.1.40-10.module+el8.2.0+5955+6cd70ceb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833904" comment="skopeo-tests-0.1.40-10.module+el8.2.0+5955+6cd70ceb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833905" comment="slirp4netns-0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833906" comment="toolbox-0.0.7-1.module+el8.2.0+6096+9c3f08f3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833907" comment="udica-0.2.1-2.module+el8.2.0+4896+8f613c81 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1764" version="1" class="patch">
	<metadata>
		<title>security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1653.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1653.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17828">CVE-2018-17828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833908" comment="zziplib-0.13.68-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833909" comment="zziplib-devel-0.13.68-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833910" comment="zziplib-utils-0.13.68-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1765" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1659.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1659.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15043">CVE-2019-15043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833911" comment="grafana-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833912" comment="grafana-azure-monitor-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833913" comment="grafana-cloudwatch-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833914" comment="grafana-elasticsearch-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833915" comment="grafana-graphite-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833916" comment="grafana-influxdb-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833917" comment="grafana-loki-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833918" comment="grafana-mssql-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833919" comment="grafana-mysql-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833920" comment="grafana-opentsdb-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833921" comment="grafana-postgres-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833922" comment="grafana-prometheus-6.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833923" comment="grafana-stackdriver-6.3.6-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1766" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_mellon (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13038" ref_url="https://www.suse.com/security/cve/CVE-2019-13038/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1660.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1660.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13038/">CVE-2019-13038 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13038">CVE-2019-13038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833924" comment="mod_auth_mellon-0.14.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833925" comment="mod_auth_mellon-diagnostics-0.14.0-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1767" version="1" class="patch">
	<metadata>
		<title>security update for python-qt5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<reference ref_id="CVE-2018-19871" ref_url="https://www.suse.com/security/cve/CVE-2018-19871/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2019-18281" ref_url="https://www.suse.com/security/cve/CVE-2019-18281/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1665.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1665.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19869">CVE-2018-19869 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19871/">CVE-2018-19871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19871">CVE-2018-19871 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19872">CVE-2018-19872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18281/">CVE-2019-18281 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18281">CVE-2019-18281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833926" comment="python-qt5-rpm-macros-5.13.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833927" comment="python3-pyqt5-sip-4.19.19-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833928" comment="python3-qt5-5.13.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833929" comment="python3-qt5-base-5.13.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833930" comment="qgnomeplatform-0.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833931" comment="qt5-assistant-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833932" comment="qt5-designer-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833933" comment="qt5-doctools-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833934" comment="qt5-linguist-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833935" comment="qt5-qdbusviewer-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833936" comment="qt5-qt3d-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833937" comment="qt5-qt3d-devel-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833938" comment="qt5-qt3d-examples-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833939" comment="qt5-qtbase-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833940" comment="qt5-qtbase-common-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833941" comment="qt5-qtbase-devel-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833942" comment="qt5-qtbase-examples-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833943" comment="qt5-qtbase-gui-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833944" comment="qt5-qtbase-mysql-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833945" comment="qt5-qtbase-odbc-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833946" comment="qt5-qtbase-postgresql-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833947" comment="qt5-qtbase-private-devel-5.12.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833948" comment="qt5-qtcanvas3d-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833949" comment="qt5-qtcanvas3d-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833950" comment="qt5-qtconnectivity-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833951" comment="qt5-qtconnectivity-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833952" comment="qt5-qtconnectivity-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833953" comment="qt5-qtdeclarative-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833954" comment="qt5-qtdeclarative-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833955" comment="qt5-qtdeclarative-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833956" comment="qt5-qtdoc-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833957" comment="qt5-qtgraphicaleffects-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833958" comment="qt5-qtimageformats-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833959" comment="qt5-qtlocation-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833960" comment="qt5-qtlocation-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833961" comment="qt5-qtlocation-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833962" comment="qt5-qtmultimedia-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833963" comment="qt5-qtmultimedia-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833964" comment="qt5-qtmultimedia-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833965" comment="qt5-qtquickcontrols-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833966" comment="qt5-qtquickcontrols-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833967" comment="qt5-qtquickcontrols2-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833968" comment="qt5-qtquickcontrols2-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833969" comment="qt5-qtscript-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833970" comment="qt5-qtscript-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833971" comment="qt5-qtscript-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833972" comment="qt5-qtsensors-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833973" comment="qt5-qtsensors-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833974" comment="qt5-qtsensors-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833975" comment="qt5-qtserialbus-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833976" comment="qt5-qtserialbus-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833977" comment="qt5-qtserialport-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833978" comment="qt5-qtserialport-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833979" comment="qt5-qtserialport-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833980" comment="qt5-qtsvg-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833981" comment="qt5-qtsvg-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833982" comment="qt5-qtsvg-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833983" comment="qt5-qttools-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833984" comment="qt5-qttools-common-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833985" comment="qt5-qttools-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833986" comment="qt5-qttools-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833987" comment="qt5-qttools-libs-designer-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833988" comment="qt5-qttools-libs-designercomponents-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833989" comment="qt5-qttools-libs-help-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833990" comment="qt5-qttranslations-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833991" comment="qt5-qtwayland-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833992" comment="qt5-qtwayland-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833993" comment="qt5-qtwebchannel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833994" comment="qt5-qtwebchannel-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833995" comment="qt5-qtwebchannel-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833996" comment="qt5-qtwebsockets-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833997" comment="qt5-qtwebsockets-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833998" comment="qt5-qtwebsockets-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833999" comment="qt5-qtx11extras-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834000" comment="qt5-qtx11extras-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834001" comment="qt5-qtxmlpatterns-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834002" comment="qt5-qtxmlpatterns-devel-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834003" comment="qt5-qtxmlpatterns-examples-5.12.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834004" comment="qt5-rpm-macros-5.12.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834005" comment="qt5-srpm-macros-5.12.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834006" comment="sip-4.19.19-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1768" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1672.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1672.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834007" comment="freeradius-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834008" comment="freeradius-devel-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834009" comment="freeradius-doc-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834010" comment="freeradius-krb5-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834011" comment="freeradius-ldap-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834012" comment="freeradius-mysql-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834013" comment="freeradius-perl-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834014" comment="freeradius-postgresql-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834015" comment="freeradius-rest-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834016" comment="freeradius-sqlite-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834017" comment="freeradius-unixODBC-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834018" comment="freeradius-utils-3.0.17-7.module+el8.2.0+4847+336970e8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1769" version="1" class="patch">
	<metadata>
		<title>security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1686.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1686.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834019" comment="libmspack-0.7-0.3.alpha.el8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834020" comment="libmspack-devel-0.7-0.3.alpha.el8.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1770" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1688.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1688.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14973">CVE-2019-14973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834021" comment="libtiff-4.0.9-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834022" comment="libtiff-devel-4.0.9-17.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1771" version="1" class="patch">
	<metadata>
		<title>security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041/" source="CVE"/>
		<reference ref_id="CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17041">CVE-2019-17041 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17042">CVE-2019-17042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834023" comment="rsyslog-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834024" comment="rsyslog-crypto-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834025" comment="rsyslog-doc-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834026" comment="rsyslog-elasticsearch-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834027" comment="rsyslog-gnutls-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834028" comment="rsyslog-gssapi-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834029" comment="rsyslog-kafka-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834030" comment="rsyslog-mmaudit-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834031" comment="rsyslog-mmjsonparse-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834032" comment="rsyslog-mmkubernetes-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834033" comment="rsyslog-mmnormalize-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834034" comment="rsyslog-mmsnmptrapd-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834035" comment="rsyslog-mysql-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834036" comment="rsyslog-pgsql-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834037" comment="rsyslog-relp-8.1911.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834038" comment="rsyslog-snmp-8.1911.0-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1772" version="1" class="patch">
	<metadata>
		<title>security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-11577" ref_url="https://www.suse.com/security/cve/CVE-2018-11577/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1708.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1708.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11577/">CVE-2018-11577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11577">CVE-2018-11577 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11684">CVE-2018-11684 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11685">CVE-2018-11685 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12085">CVE-2018-12085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834039" comment="liblouis-2.6.2-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834040" comment="python3-louis-2.6.2-21.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1773" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1712.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1712.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14563">CVE-2019-14563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834041" comment="edk2-ovmf-20190829git37eef91017ad-9.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1774" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1715.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1715.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834042" comment="dnsmasq-2.79-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834043" comment="dnsmasq-utils-2.79-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1775" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18934" ref_url="https://www.suse.com/security/cve/CVE-2019-18934/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1716.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1716.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18934/">CVE-2019-18934 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18934">CVE-2019-18934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834044" comment="python3-unbound-1.7.3-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834045" comment="unbound-1.7.3-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834046" comment="unbound-devel-1.7.3-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834047" comment="unbound-libs-1.7.3-10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1776" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18277" ref_url="https://www.suse.com/security/cve/CVE-2019-18277/" source="CVE"/>
		<reference ref_id="CVE-2019-19330" ref_url="https://www.suse.com/security/cve/CVE-2019-19330/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1725.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1725.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18277/">CVE-2019-18277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18277">CVE-2019-18277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19330/">CVE-2019-19330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19330">CVE-2019-19330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834048" comment="haproxy-1.8.23-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1777" version="1" class="patch">
	<metadata>
		<title>security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1735.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1735.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14818">CVE-2019-14818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834049" comment="dpdk-19.11-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834050" comment="dpdk-devel-19.11-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834051" comment="dpdk-doc-19.11-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834052" comment="dpdk-tools-19.11-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1778" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1764.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1764.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834053" comment="platform-python-3.6.8-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834054" comment="platform-python-debug-3.6.8-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834055" comment="platform-python-devel-3.6.8-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834056" comment="python3-idle-3.6.8-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834057" comment="python3-libs-3.6.8-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834058" comment="python3-test-3.6.8-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834059" comment="python3-tkinter-3.6.8-23.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1779" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1765.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1765.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834060" comment="cups-2.2.6-33.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834061" comment="cups-client-2.2.6-33.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834062" comment="cups-devel-2.2.6-33.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834063" comment="cups-filesystem-2.2.6-33.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834064" comment="cups-ipptool-2.2.6-33.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834065" comment="cups-libs-2.2.6-33.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834066" comment="cups-lpd-2.2.6-33.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1780" version="1" class="patch">
	<metadata>
		<title>security update for LibRaw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20337" ref_url="https://www.suse.com/security/cve/CVE-2018-20337/" source="CVE"/>
		<reference ref_id="CVE-2019-12447" ref_url="https://www.suse.com/security/cve/CVE-2019-12447/" source="CVE"/>
		<reference ref_id="CVE-2019-12448" ref_url="https://www.suse.com/security/cve/CVE-2019-12448/" source="CVE"/>
		<reference ref_id="CVE-2019-12449" ref_url="https://www.suse.com/security/cve/CVE-2019-12449/" source="CVE"/>
		<reference ref_id="CVE-2019-3825" ref_url="https://www.suse.com/security/cve/CVE-2019-3825/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20337/">CVE-2018-20337 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20337">CVE-2018-20337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12447/">CVE-2019-12447 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12447">CVE-2019-12447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12448/">CVE-2019-12448 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12448">CVE-2019-12448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12449/">CVE-2019-12449 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12449">CVE-2019-12449 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3825/">CVE-2019-3825 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3825">CVE-2019-3825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834067" comment="LibRaw-0.19.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834068" comment="LibRaw-devel-0.19.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834069" comment="accountsservice-0.6.50-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834070" comment="accountsservice-devel-0.6.50-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834071" comment="accountsservice-libs-0.6.50-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834072" comment="appstream-data-8-20191129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834073" comment="baobab-3.28.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834074" comment="clutter-1.26.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834075" comment="clutter-devel-1.26.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834076" comment="clutter-doc-1.26.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834077" comment="evince-3.28.4-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834078" comment="evince-browser-plugin-3.28.4-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834079" comment="evince-libs-3.28.4-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834080" comment="evince-nautilus-3.28.4-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834081" comment="gdm-3.28.3-29.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834082" comment="gjs-1.56.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834083" comment="gjs-devel-1.56.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834084" comment="gnome-boxes-3.28.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834085" comment="gnome-control-center-3.28.2-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834086" comment="gnome-control-center-filesystem-3.28.2-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834087" comment="gnome-menus-3.13.3-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834088" comment="gnome-menus-devel-3.13.3-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834089" comment="gnome-online-accounts-3.28.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834090" comment="gnome-online-accounts-devel-3.28.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834091" comment="gnome-remote-desktop-0.1.6-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834092" comment="gnome-session-3.28.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834093" comment="gnome-session-wayland-session-3.28.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834094" comment="gnome-session-xsession-3.28.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834095" comment="gnome-settings-daemon-3.32.0-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834096" comment="gnome-shell-3.32.2-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834097" comment="gnome-software-3.30.6-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834098" comment="gnome-software-editor-3.30.6-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834099" comment="gnome-terminal-3.28.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834100" comment="gnome-terminal-nautilus-3.28.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834101" comment="gnome-tweaks-3.28.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834102" comment="gsettings-desktop-schemas-3.32.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834103" comment="gsettings-desktop-schemas-devel-3.32.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834104" comment="gtk-update-icon-cache-3.22.30-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834105" comment="gtk3-3.22.30-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834106" comment="gtk3-devel-3.22.30-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834107" comment="gtk3-immodule-xim-3.22.30-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834108" comment="gvfs-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834109" comment="gvfs-afc-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834110" comment="gvfs-afp-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834111" comment="gvfs-archive-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834112" comment="gvfs-client-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834113" comment="gvfs-devel-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834114" comment="gvfs-fuse-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834115" comment="gvfs-goa-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834116" comment="gvfs-gphoto2-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834117" comment="gvfs-mtp-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834118" comment="gvfs-smb-1.36.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834119" comment="libvncserver-0.9.11-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834120" comment="libvncserver-devel-0.9.11-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834121" comment="libxslt-1.1.32-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834122" comment="libxslt-devel-1.1.32-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834123" comment="mozjs52-52.9.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834124" comment="mozjs52-devel-52.9.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834125" comment="mozjs60-60.9.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834126" comment="mozjs60-devel-60.9.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834127" comment="mutter-3.32.2-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834128" comment="mutter-devel-3.32.2-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834129" comment="nautilus-3.28.1-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834130" comment="nautilus-devel-3.28.1-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834131" comment="nautilus-extensions-3.28.1-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834132" comment="vala-0.40.19-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834133" comment="vala-devel-0.40.19-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834134" comment="vinagre-3.22.0-21.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1781" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15223" ref_url="https://www.suse.com/security/cve/CVE-2019-15223/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-18282" ref_url="https://www.suse.com/security/cve/CVE-2019-18282/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19059" ref_url="https://www.suse.com/security/cve/CVE-2019-19059/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108/" source="CVE"/>
		<reference ref_id="CVE-2019-8980" ref_url="https://www.suse.com/security/cve/CVE-2019-8980/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-7053" ref_url="https://www.suse.com/security/cve/CVE-2020-7053/" source="CVE"/>
		<reference ref_id="CVE-2021-33630" ref_url="https://www.suse.com/security/cve/CVE-2021-33630/" source="CVE"/>
		<reference ref_id="CVE-2022-50473" ref_url="https://www.suse.com/security/cve/CVE-2022-50473/" source="CVE"/>
		<reference ref_id="CVE-2023-53581" ref_url="https://www.suse.com/security/cve/CVE-2023-53581/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1769.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1769.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16871">CVE-2018-16871 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10639">CVE-2019-10639 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12819">CVE-2019-12819 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15090">CVE-2019-15090 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15099">CVE-2019-15099 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15221">CVE-2019-15221 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15223/">CVE-2019-15223 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15223">CVE-2019-15223 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17053">CVE-2019-17053 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18282/">CVE-2019-18282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18282">CVE-2019-18282 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18805">CVE-2019-18805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19045">CVE-2019-19045 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19047">CVE-2019-19047 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19055">CVE-2019-19055 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19057">CVE-2019-19057 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19058">CVE-2019-19058 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19059/">CVE-2019-19059 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19059">CVE-2019-19059 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19067">CVE-2019-19067 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19077">CVE-2019-19077 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19922">CVE-2019-19922 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5108">CVE-2019-5108 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8980/">CVE-2019-8980 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8980">CVE-2019-8980 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7053/">CVE-2020-7053 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7053">CVE-2020-7053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33630/">CVE-2021-33630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33630">CVE-2021-33630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50473/">CVE-2022-50473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50473">CVE-2022-50473 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53581/">CVE-2023-53581 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53581">CVE-2023-53581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834135" comment="bpftool-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834136" comment="kernel-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834137" comment="kernel-abi-whitelists-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834138" comment="kernel-core-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834139" comment="kernel-cross-headers-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834140" comment="kernel-debug-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834141" comment="kernel-debug-core-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834143" comment="kernel-debug-modules-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834144" comment="kernel-debug-modules-extra-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834146" comment="kernel-doc-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834147" comment="kernel-headers-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834148" comment="kernel-modules-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834149" comment="kernel-modules-extra-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834150" comment="kernel-tools-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834151" comment="kernel-tools-libs-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834153" comment="perf-4.18.0-193.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834154" comment="python3-perf-4.18.0-193.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1782" version="1" class="patch">
	<metadata>
		<title>security update for unzip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13232" ref_url="https://www.suse.com/security/cve/CVE-2019-13232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1787.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1787.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13232/">CVE-2019-13232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13232">CVE-2019-13232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834155" comment="unzip-6.0-43.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1783" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481/" source="CVE"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1792.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1792.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5481">CVE-2019-5481 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834156" comment="curl-7.61.1-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834157" comment="libcurl-7.61.1-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834158" comment="libcurl-devel-7.61.1-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834159" comment="libcurl-minimal-7.61.1-12.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1784" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3843" ref_url="https://www.suse.com/security/cve/CVE-2019-3843/" source="CVE"/>
		<reference ref_id="CVE-2019-3844" ref_url="https://www.suse.com/security/cve/CVE-2019-3844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1794.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1794.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3843/">CVE-2019-3843 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">CVE-2019-3843 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3844/">CVE-2019-3844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">CVE-2019-3844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834160" comment="systemd-239-29.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834161" comment="systemd-container-239-29.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834162" comment="systemd-devel-239-29.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834163" comment="systemd-journal-remote-239-29.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834164" comment="systemd-libs-239-29.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834165" comment="systemd-pam-239-29.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834166" comment="systemd-tests-239-29.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834167" comment="systemd-udev-239-29.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1785" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1010204" ref_url="https://www.suse.com/security/cve/CVE-2019-1010204/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1797.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1797.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010204/">CVE-2019-1010204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010204">CVE-2019-1010204 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17451">CVE-2019-17451 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834168" comment="binutils-2.30-73.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834169" comment="binutils-devel-2.30-73.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1786" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19232" ref_url="https://www.suse.com/security/cve/CVE-2019-19232/" source="CVE"/>
		<reference ref_id="CVE-2019-19234" ref_url="https://www.suse.com/security/cve/CVE-2019-19234/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1804.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1804.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19232/">CVE-2019-19232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19232">CVE-2019-19232 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19234/">CVE-2019-19234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19234">CVE-2019-19234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834170" comment="sudo-1.8.29-5.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1787" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13752" ref_url="https://www.suse.com/security/cve/CVE-2019-13752/" source="CVE"/>
		<reference ref_id="CVE-2019-13753" ref_url="https://www.suse.com/security/cve/CVE-2019-13753/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1810.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1810.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13752/">CVE-2019-13752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13752">CVE-2019-13752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13753/">CVE-2019-13753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13753">CVE-2019-13753 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8457">CVE-2019-8457 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834171" comment="lemon-3.26.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834172" comment="sqlite-3.26.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834173" comment="sqlite-devel-3.26.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834174" comment="sqlite-doc-3.26.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834175" comment="sqlite-libs-3.26.0-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1788" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9251">CVE-2018-9251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834176" comment="libxml2-2.9.7-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834177" comment="libxml2-devel-2.9.7-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834178" comment="python3-libxml2-2.9.7-7.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1789" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1828.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1828.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">CVE-2019-19126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834179" comment="compat-libpthread-nonshared-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834180" comment="glibc-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834181" comment="glibc-all-langpacks-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834182" comment="glibc-benchtests-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834183" comment="glibc-common-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834184" comment="glibc-devel-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834185" comment="glibc-headers-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834186" comment="glibc-langpack-aa-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834187" comment="glibc-langpack-af-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834188" comment="glibc-langpack-agr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834189" comment="glibc-langpack-ak-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834190" comment="glibc-langpack-am-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834191" comment="glibc-langpack-an-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834192" comment="glibc-langpack-anp-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834193" comment="glibc-langpack-ar-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834194" comment="glibc-langpack-as-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834195" comment="glibc-langpack-ast-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834196" comment="glibc-langpack-ayc-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834197" comment="glibc-langpack-az-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834198" comment="glibc-langpack-be-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834199" comment="glibc-langpack-bem-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834200" comment="glibc-langpack-ber-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834201" comment="glibc-langpack-bg-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834202" comment="glibc-langpack-bhb-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834203" comment="glibc-langpack-bho-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834204" comment="glibc-langpack-bi-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834205" comment="glibc-langpack-bn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834206" comment="glibc-langpack-bo-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834207" comment="glibc-langpack-br-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834208" comment="glibc-langpack-brx-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834209" comment="glibc-langpack-bs-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834210" comment="glibc-langpack-byn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834211" comment="glibc-langpack-ca-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834212" comment="glibc-langpack-ce-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834213" comment="glibc-langpack-chr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834214" comment="glibc-langpack-cmn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834215" comment="glibc-langpack-crh-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834216" comment="glibc-langpack-cs-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834217" comment="glibc-langpack-csb-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834218" comment="glibc-langpack-cv-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834219" comment="glibc-langpack-cy-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834220" comment="glibc-langpack-da-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834221" comment="glibc-langpack-de-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834222" comment="glibc-langpack-doi-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834223" comment="glibc-langpack-dsb-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834224" comment="glibc-langpack-dv-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834225" comment="glibc-langpack-dz-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834226" comment="glibc-langpack-el-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834227" comment="glibc-langpack-en-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834228" comment="glibc-langpack-eo-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834229" comment="glibc-langpack-es-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834230" comment="glibc-langpack-et-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834231" comment="glibc-langpack-eu-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834232" comment="glibc-langpack-fa-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834233" comment="glibc-langpack-ff-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834234" comment="glibc-langpack-fi-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834235" comment="glibc-langpack-fil-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834236" comment="glibc-langpack-fo-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834237" comment="glibc-langpack-fr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834238" comment="glibc-langpack-fur-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834239" comment="glibc-langpack-fy-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834240" comment="glibc-langpack-ga-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834241" comment="glibc-langpack-gd-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834242" comment="glibc-langpack-gez-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834243" comment="glibc-langpack-gl-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834244" comment="glibc-langpack-gu-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834245" comment="glibc-langpack-gv-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834246" comment="glibc-langpack-ha-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834247" comment="glibc-langpack-hak-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834248" comment="glibc-langpack-he-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834249" comment="glibc-langpack-hi-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834250" comment="glibc-langpack-hif-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834251" comment="glibc-langpack-hne-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834252" comment="glibc-langpack-hr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834253" comment="glibc-langpack-hsb-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834254" comment="glibc-langpack-ht-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834255" comment="glibc-langpack-hu-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834256" comment="glibc-langpack-hy-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834257" comment="glibc-langpack-ia-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834258" comment="glibc-langpack-id-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834259" comment="glibc-langpack-ig-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834260" comment="glibc-langpack-ik-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834261" comment="glibc-langpack-is-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834262" comment="glibc-langpack-it-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834263" comment="glibc-langpack-iu-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834264" comment="glibc-langpack-ja-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834265" comment="glibc-langpack-ka-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834266" comment="glibc-langpack-kab-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834267" comment="glibc-langpack-kk-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834268" comment="glibc-langpack-kl-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834269" comment="glibc-langpack-km-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834270" comment="glibc-langpack-kn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834271" comment="glibc-langpack-ko-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834272" comment="glibc-langpack-kok-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834273" comment="glibc-langpack-ks-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834274" comment="glibc-langpack-ku-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834275" comment="glibc-langpack-kw-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834276" comment="glibc-langpack-ky-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834277" comment="glibc-langpack-lb-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834278" comment="glibc-langpack-lg-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834279" comment="glibc-langpack-li-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834280" comment="glibc-langpack-lij-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834281" comment="glibc-langpack-ln-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834282" comment="glibc-langpack-lo-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834283" comment="glibc-langpack-lt-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834284" comment="glibc-langpack-lv-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834285" comment="glibc-langpack-lzh-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834286" comment="glibc-langpack-mag-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834287" comment="glibc-langpack-mai-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834288" comment="glibc-langpack-mfe-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834289" comment="glibc-langpack-mg-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834290" comment="glibc-langpack-mhr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834291" comment="glibc-langpack-mi-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834292" comment="glibc-langpack-miq-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834293" comment="glibc-langpack-mjw-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834294" comment="glibc-langpack-mk-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834295" comment="glibc-langpack-ml-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834296" comment="glibc-langpack-mn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834297" comment="glibc-langpack-mni-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834298" comment="glibc-langpack-mr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834299" comment="glibc-langpack-ms-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834300" comment="glibc-langpack-mt-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834301" comment="glibc-langpack-my-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834302" comment="glibc-langpack-nan-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834303" comment="glibc-langpack-nb-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834304" comment="glibc-langpack-nds-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834305" comment="glibc-langpack-ne-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834306" comment="glibc-langpack-nhn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834307" comment="glibc-langpack-niu-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834308" comment="glibc-langpack-nl-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834309" comment="glibc-langpack-nn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834310" comment="glibc-langpack-nr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834311" comment="glibc-langpack-nso-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834312" comment="glibc-langpack-oc-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834313" comment="glibc-langpack-om-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834314" comment="glibc-langpack-or-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834315" comment="glibc-langpack-os-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834316" comment="glibc-langpack-pa-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834317" comment="glibc-langpack-pap-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834318" comment="glibc-langpack-pl-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834319" comment="glibc-langpack-ps-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834320" comment="glibc-langpack-pt-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834321" comment="glibc-langpack-quz-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834322" comment="glibc-langpack-raj-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834323" comment="glibc-langpack-ro-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834324" comment="glibc-langpack-ru-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834325" comment="glibc-langpack-rw-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834326" comment="glibc-langpack-sa-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834327" comment="glibc-langpack-sah-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834328" comment="glibc-langpack-sat-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834329" comment="glibc-langpack-sc-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834330" comment="glibc-langpack-sd-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834331" comment="glibc-langpack-se-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834332" comment="glibc-langpack-sgs-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834333" comment="glibc-langpack-shn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834334" comment="glibc-langpack-shs-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834335" comment="glibc-langpack-si-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834336" comment="glibc-langpack-sid-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834337" comment="glibc-langpack-sk-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834338" comment="glibc-langpack-sl-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834339" comment="glibc-langpack-sm-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834340" comment="glibc-langpack-so-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834341" comment="glibc-langpack-sq-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834342" comment="glibc-langpack-sr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834343" comment="glibc-langpack-ss-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834344" comment="glibc-langpack-st-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834345" comment="glibc-langpack-sv-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834346" comment="glibc-langpack-sw-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834347" comment="glibc-langpack-szl-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834348" comment="glibc-langpack-ta-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834349" comment="glibc-langpack-tcy-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834350" comment="glibc-langpack-te-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834351" comment="glibc-langpack-tg-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834352" comment="glibc-langpack-th-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834353" comment="glibc-langpack-the-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834354" comment="glibc-langpack-ti-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834355" comment="glibc-langpack-tig-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834356" comment="glibc-langpack-tk-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834357" comment="glibc-langpack-tl-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834358" comment="glibc-langpack-tn-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834359" comment="glibc-langpack-to-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834360" comment="glibc-langpack-tpi-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834361" comment="glibc-langpack-tr-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834362" comment="glibc-langpack-ts-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834363" comment="glibc-langpack-tt-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834364" comment="glibc-langpack-ug-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834365" comment="glibc-langpack-uk-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834366" comment="glibc-langpack-unm-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834367" comment="glibc-langpack-ur-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834368" comment="glibc-langpack-uz-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834369" comment="glibc-langpack-ve-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834370" comment="glibc-langpack-vi-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834371" comment="glibc-langpack-wa-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834372" comment="glibc-langpack-wae-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834373" comment="glibc-langpack-wal-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834374" comment="glibc-langpack-wo-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834375" comment="glibc-langpack-xh-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834376" comment="glibc-langpack-yi-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834377" comment="glibc-langpack-yo-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834378" comment="glibc-langpack-yue-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834379" comment="glibc-langpack-yuw-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834380" comment="glibc-langpack-zh-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834381" comment="glibc-langpack-zu-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834382" comment="glibc-locale-source-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834383" comment="glibc-minimal-langpack-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834384" comment="glibc-nss-devel-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834385" comment="glibc-static-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834386" comment="glibc-utils-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834387" comment="libnsl-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834388" comment="nscd-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834389" comment="nss_db-2.28-101.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834390" comment="nss_hesiod-2.28-101.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1790" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1840.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1840.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1549">CVE-2019-1549 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834391" comment="openssl-1.1.1c-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834392" comment="openssl-devel-1.1.1c-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834393" comment="openssl-libs-1.1.1c-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834394" comment="openssl-perl-1.1.1c-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1791" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1845.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1845.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6477">CVE-2019-6477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834395" comment="bind-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834396" comment="bind-chroot-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834397" comment="bind-devel-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834398" comment="bind-export-devel-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834399" comment="bind-export-libs-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834400" comment="bind-libs-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834401" comment="bind-libs-lite-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834402" comment="bind-license-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834403" comment="bind-lite-devel-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834404" comment="bind-pkcs11-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834405" comment="bind-pkcs11-devel-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834406" comment="bind-pkcs11-libs-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834407" comment="bind-pkcs11-utils-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834408" comment="bind-sdb-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834409" comment="bind-sdb-chroot-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834410" comment="bind-utils-9.11.13-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834411" comment="python3-bind-9.11.13-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1792" version="1" class="patch">
	<metadata>
		<title>security update for patch (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13636" ref_url="https://www.suse.com/security/cve/CVE-2019-13636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13636/">CVE-2019-13636 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13636">CVE-2019-13636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834412" comment="patch-2.7.6-11.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1793" version="1" class="patch">
	<metadata>
		<title>security update for gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1864.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1864.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15847">CVE-2019-15847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834413" comment="cpp-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834414" comment="gcc-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834415" comment="gcc-c++-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834416" comment="gcc-gdb-plugin-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834417" comment="gcc-gfortran-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834418" comment="gcc-offload-nvptx-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834419" comment="gcc-plugin-devel-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834420" comment="libasan-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834421" comment="libatomic-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834422" comment="libatomic-static-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834423" comment="libgcc-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834424" comment="libgfortran-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834425" comment="libgomp-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834426" comment="libgomp-offload-nvptx-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834427" comment="libitm-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834428" comment="libitm-devel-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834429" comment="liblsan-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834430" comment="libquadmath-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834431" comment="libquadmath-devel-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834432" comment="libstdc++-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834433" comment="libstdc++-devel-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834434" comment="libstdc++-docs-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834435" comment="libstdc++-static-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834436" comment="libtsan-8.3.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834437" comment="libubsan-8.3.1-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1794" version="1" class="patch">
	<metadata>
		<title>security update for openchange (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197/" source="CVE"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1878.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1878.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10197">CVE-2019-10197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834438" comment="ctdb-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834439" comment="ctdb-tests-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834440" comment="libsmbclient-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834441" comment="libsmbclient-devel-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834442" comment="libwbclient-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834443" comment="libwbclient-devel-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834444" comment="openchange-2.3-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834445" comment="python3-samba-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834446" comment="python3-samba-test-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834447" comment="samba-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834448" comment="samba-client-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834449" comment="samba-client-libs-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834450" comment="samba-common-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834451" comment="samba-common-libs-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834452" comment="samba-common-tools-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834453" comment="samba-krb5-printing-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834454" comment="samba-libs-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834455" comment="samba-pidl-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834456" comment="samba-test-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834457" comment="samba-test-libs-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834458" comment="samba-winbind-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834459" comment="samba-winbind-clients-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834460" comment="samba-winbind-krb5-locator-4.11.2-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834461" comment="samba-winbind-modules-4.11.2-13.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1795" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1880.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1880.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834462" comment="glib2-2.56.4-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834463" comment="glib2-devel-2.56.4-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834464" comment="glib2-fam-2.56.4-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834465" comment="glib2-tests-2.56.4-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1796" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-10910" ref_url="https://www.suse.com/security/cve/CVE-2018-10910/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1912.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1912.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10910/">CVE-2018-10910 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10910">CVE-2018-10910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834466" comment="bluez-5.50-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834467" comment="bluez-cups-5.50-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834468" comment="bluez-hid2hci-5.50-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834469" comment="bluez-libs-5.50-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834470" comment="bluez-libs-devel-5.50-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834471" comment="bluez-obexd-5.50-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1797" version="1" class="patch">
	<metadata>
		<title>security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094/" source="CVE"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5094">CVE-2019-5094 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5188">CVE-2019-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834472" comment="e2fsprogs-1.45.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834473" comment="e2fsprogs-devel-1.45.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834474" comment="e2fsprogs-libs-1.45.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834475" comment="libcom_err-1.45.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834476" comment="libcom_err-devel-1.45.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834477" comment="libss-1.45.4-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1798" version="1" class="patch">
	<metadata>
		<title>security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1916.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1916.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834478" comment="platform-python-pip-9.0.3-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834479" comment="python3-pip-9.0.3-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834480" comment="python3-pip-wheel-9.0.3-16.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1799" version="1" class="patch">
	<metadata>
		<title>security update for fontforge (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-5395" ref_url="https://www.suse.com/security/cve/CVE-2020-5395/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1921.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1921.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5395/">CVE-2020-5395 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5395">CVE-2020-5395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834481" comment="fontforge-20170731-14.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1800" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1926.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1926.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10696">CVE-2020-10696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834482" comment="buildah-1.5-4.gite94b4f9.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834483" comment="container-selinux-2.124.0-1.gitf958d0c.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834484" comment="containernetworking-plugins-0.7.4-3.git9ebe139.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834485" comment="containers-common-0.1.32-4.git1715c90.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834486" comment="crit-3.12-9.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834487" comment="criu-3.12-9.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834488" comment="fuse-overlayfs-0.3-5.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834489" comment="oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834490" comment="oci-umount-2.3.4-2.git87f9237.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834491" comment="podman-1.0.0-4.git921f98f.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834492" comment="podman-docker-1.0.0-4.git921f98f.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834493" comment="python3-criu-3.12-9.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834494" comment="runc-1.0.0-56.rc5.dev.git2abd837.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834495" comment="skopeo-0.1.32-4.git1715c90.module+el8.2.0+6370+6fb6c8ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834496" comment="slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.2.0+6370+6fb6c8ca is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1801" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1931.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1931.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10696">CVE-2020-10696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834497" comment="buildah-1.11.6-7.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834498" comment="buildah-tests-1.11.6-7.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834499" comment="cockpit-podman-11-1.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834500" comment="conmon-2.0.6-1.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834501" comment="container-selinux-2.124.0-1.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834502" comment="containernetworking-plugins-0.8.3-4.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834503" comment="containers-common-0.1.40-9.module+el8.2.0+6373+4950d421 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834504" comment="crit-3.12-9.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834505" comment="criu-3.12-9.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834506" comment="fuse-overlayfs-0.7.2-5.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834507" comment="podman-1.6.4-11.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834508" comment="podman-docker-1.6.4-11.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834509" comment="podman-remote-1.6.4-11.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834510" comment="podman-tests-1.6.4-11.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834511" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834512" comment="python3-criu-3.12-9.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834513" comment="runc-1.0.0-64.rc10.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834514" comment="skopeo-0.1.40-9.module+el8.2.0+6373+4950d421 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834515" comment="skopeo-tests-0.1.40-9.module+el8.2.0+6373+4950d421 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834516" comment="slirp4netns-0.4.2-3.git21fdece.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834517" comment="toolbox-0.0.7-1.module+el8.2.0+6369+1f4293b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834518" comment="udica-0.2.1-2.module+el8.2.0+6369+1f4293b4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1802" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1932.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1932.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10696">CVE-2020-10696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834519" comment="buildah-1.11.6-8.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834520" comment="buildah-tests-1.11.6-8.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834521" comment="cockpit-podman-12-1.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834522" comment="conmon-2.0.6-1.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834523" comment="container-selinux-2.124.0-1.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834524" comment="containernetworking-plugins-0.8.3-5.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834525" comment="containers-common-0.1.40-11.module+el8.2.0+6374+67f43e89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834526" comment="crit-3.12-9.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834527" comment="criu-3.12-9.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834528" comment="fuse-overlayfs-0.7.2-5.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834529" comment="podman-1.6.4-11.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834530" comment="podman-docker-1.6.4-11.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834531" comment="podman-remote-1.6.4-11.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834532" comment="podman-tests-1.6.4-11.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834533" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834534" comment="python3-criu-3.12-9.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834535" comment="runc-1.0.0-65.rc10.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834536" comment="skopeo-0.1.40-11.module+el8.2.0+6374+67f43e89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834537" comment="skopeo-tests-0.1.40-11.module+el8.2.0+6374+67f43e89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834538" comment="slirp4netns-0.4.2-3.git21fdece.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834539" comment="toolbox-0.0.7-1.module+el8.2.0+6368+cf16aa14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834540" comment="udica-0.2.1-2.module+el8.2.0+6368+cf16aa14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1803" version="1" class="patch">
	<metadata>
		<title>security update for targetcli (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10699" ref_url="https://www.suse.com/security/cve/CVE-2020-10699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1933.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1933.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10699/">CVE-2020-10699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10699">CVE-2020-10699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834541" comment="targetcli-2.1.51-4.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1804" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1980.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1980.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834542" comment="git-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834543" comment="git-all-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834544" comment="git-core-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834545" comment="git-core-doc-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834546" comment="git-daemon-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834547" comment="git-email-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834548" comment="git-gui-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834549" comment="git-instaweb-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834550" comment="git-subtree-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834551" comment="git-svn-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834552" comment="gitk-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834553" comment="gitweb-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834554" comment="perl-Git-2.18.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834555" comment="perl-Git-SVN-2.18.4-2.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1805" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11501" ref_url="https://www.suse.com/security/cve/CVE-2020-11501/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1998.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1998.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11501/">CVE-2020-11501 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11501">CVE-2020-11501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834556" comment="gnutls-3.6.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834557" comment="gnutls-c++-3.6.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834558" comment="gnutls-dane-3.6.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834559" comment="gnutls-devel-3.6.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834560" comment="gnutls-utils-3.6.8-10.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1806" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2031.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2031.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834561" comment="firefox-68.8.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1807" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2041.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2041.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832711" comment="libecap-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832712" comment="libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834562" comment="squid-4.4-8.module+el8.2.0+6449+6ba3df3e.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1808" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12397" ref_url="https://www.suse.com/security/cve/CVE-2020-12397/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12397/">CVE-2020-12397 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12397">CVE-2020-12397 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834563" comment="thunderbird-68.8.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1809" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1763" ref_url="https://www.suse.com/security/cve/CVE-2020-1763/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2070.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2070.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1763/">CVE-2020-1763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1763">CVE-2020-1763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834564" comment="libreswan-3.29-7.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1810" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2102.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2102.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11884">CVE-2020-11884 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834565" comment="bpftool-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834566" comment="kernel-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834567" comment="kernel-abi-whitelists-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834568" comment="kernel-core-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834569" comment="kernel-cross-headers-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834570" comment="kernel-debug-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834571" comment="kernel-debug-core-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834573" comment="kernel-debug-modules-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834574" comment="kernel-debug-modules-extra-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834576" comment="kernel-doc-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834577" comment="kernel-headers-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834578" comment="kernel-modules-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834579" comment="kernel-modules-extra-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834580" comment="kernel-tools-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834581" comment="kernel-tools-libs-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834583" comment="perf-4.18.0-193.1.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834584" comment="python3-perf-4.18.0-193.1.2.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1811" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1108" ref_url="https://www.suse.com/security/cve/CVE-2020-1108/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1108/">CVE-2020-1108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1108">CVE-2020-1108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834585" comment="dotnet-host-fxr-2.1-2.1.18-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834586" comment="dotnet-runtime-2.1-2.1.18-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834587" comment="dotnet-sdk-2.1-2.1.514-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834588" comment="dotnet-sdk-2.1.5xx-2.1.514-2.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1812" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1108" ref_url="https://www.suse.com/security/cve/CVE-2020-1108/" source="CVE"/>
		<reference ref_id="CVE-2020-1161" ref_url="https://www.suse.com/security/cve/CVE-2020-1161/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2250.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2250.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1108/">CVE-2020-1108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1108">CVE-2020-1108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1161/">CVE-2020-1161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1161">CVE-2020-1161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834589" comment="aspnetcore-runtime-3.1-3.1.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834590" comment="aspnetcore-targeting-pack-3.1-3.1.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834591" comment="dotnet-3.1.104-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834592" comment="dotnet-apphost-pack-3.1-3.1.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834593" comment="dotnet-host-3.1.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834594" comment="dotnet-hostfxr-3.1-3.1.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834595" comment="dotnet-runtime-3.1-3.1.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834596" comment="dotnet-sdk-3.1-3.1.104-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834597" comment="dotnet-targeting-pack-3.1-3.1.4-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834598" comment="dotnet-templates-3.1-3.1.104-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834599" comment="netstandard-targeting-pack-2.1-3.1.104-2.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1813" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11521" ref_url="https://www.suse.com/security/cve/CVE-2020-11521/" source="CVE"/>
		<reference ref_id="CVE-2020-11523" ref_url="https://www.suse.com/security/cve/CVE-2020-11523/" source="CVE"/>
		<reference ref_id="CVE-2020-11524" ref_url="https://www.suse.com/security/cve/CVE-2020-11524/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11521/">CVE-2020-11521 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11521">CVE-2020-11521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11523/">CVE-2020-11523 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11523">CVE-2020-11523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11524/">CVE-2020-11524 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11524">CVE-2020-11524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834600" comment="freerdp-2.0.0-46.rc4.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834601" comment="freerdp-devel-2.0.0-46.rc4.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834602" comment="freerdp-libs-2.0.0-46.rc4.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834603" comment="libwinpr-2.0.0-46.rc4.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834604" comment="libwinpr-devel-2.0.0-46.rc4.el8_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1814" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834605" comment="bind-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834606" comment="bind-chroot-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834607" comment="bind-devel-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834608" comment="bind-export-devel-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834609" comment="bind-export-libs-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834610" comment="bind-libs-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834611" comment="bind-libs-lite-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834612" comment="bind-license-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834613" comment="bind-lite-devel-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834614" comment="bind-pkcs11-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834615" comment="bind-pkcs11-devel-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834616" comment="bind-pkcs11-libs-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834617" comment="bind-pkcs11-utils-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834618" comment="bind-sdb-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834619" comment="bind-sdb-chroot-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834620" comment="bind-utils-9.11.13-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834621" comment="python3-bind-9.11.13-5.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1815" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2379.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2379.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834622" comment="firefox-68.9.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1816" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13398" ref_url="https://www.suse.com/security/cve/CVE-2020-13398/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2407.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2407.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13398/">CVE-2020-13398 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13398">CVE-2020-13398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834623" comment="freerdp-2.0.0-46.rc4.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834624" comment="freerdp-devel-2.0.0-46.rc4.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834625" comment="freerdp-libs-2.0.0-46.rc4.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834626" comment="libwinpr-2.0.0-46.rc4.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834627" comment="libwinpr-devel-2.0.0-46.rc4.el8_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1817" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12662" ref_url="https://www.suse.com/security/cve/CVE-2020-12662/" source="CVE"/>
		<reference ref_id="CVE-2020-12663" ref_url="https://www.suse.com/security/cve/CVE-2020-12663/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2416.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2416.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12662/">CVE-2020-12662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12662">CVE-2020-12662 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12663/">CVE-2020-12663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12663">CVE-2020-12663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834628" comment="python3-unbound-1.7.3-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834629" comment="unbound-1.7.3-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834630" comment="unbound-devel-1.7.3-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834631" comment="unbound-libs-1.7.3-11.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1818" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2427.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2427.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12657">CVE-2020-12657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834632" comment="bpftool-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834633" comment="kernel-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834634" comment="kernel-abi-whitelists-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834635" comment="kernel-core-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834636" comment="kernel-cross-headers-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834637" comment="kernel-debug-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834638" comment="kernel-debug-core-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834640" comment="kernel-debug-modules-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834641" comment="kernel-debug-modules-extra-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834643" comment="kernel-doc-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834644" comment="kernel-headers-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834645" comment="kernel-modules-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834646" comment="kernel-modules-extra-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834647" comment="kernel-tools-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834648" comment="kernel-tools-libs-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834650" comment="perf-4.18.0-193.6.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834651" comment="python3-perf-4.18.0-193.6.3.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1819" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2431.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2431.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834652" comment="microcode_ctl-20191115-4.20200602.2.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1820" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1108" ref_url="https://www.suse.com/security/cve/CVE-2020-1108/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2450.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2450.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1108/">CVE-2020-1108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1108">CVE-2020-1108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834653" comment="aspnetcore-runtime-3.1-3.1.5-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834654" comment="aspnetcore-targeting-pack-3.1-3.1.5-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834655" comment="dotnet-3.1.105-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834656" comment="dotnet-apphost-pack-3.1-3.1.5-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834657" comment="dotnet-host-3.1.5-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834658" comment="dotnet-hostfxr-3.1-3.1.5-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834659" comment="dotnet-runtime-3.1-3.1.5-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834660" comment="dotnet-sdk-3.1-3.1.105-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834661" comment="dotnet-targeting-pack-3.1-3.1.5-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834662" comment="dotnet-templates-3.1-3.1.105-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834663" comment="netstandard-targeting-pack-2.1-3.1.105-2.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1821" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834664" comment="pcs-0.10.4-6.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834665" comment="pcs-snmp-0.10.4-6.el8_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1822" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1108" ref_url="https://www.suse.com/security/cve/CVE-2020-1108/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2471.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2471.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1108/">CVE-2020-1108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1108">CVE-2020-1108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834666" comment="dotnet-host-fxr-2.1-2.1.19-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834667" comment="dotnet-runtime-2.1-2.1.19-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834668" comment="dotnet-sdk-2.1-2.1.515-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834669" comment="dotnet-sdk-2.1.5xx-2.1.515-1.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1823" version="1" class="patch">
	<metadata>
		<title>security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2550.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2550.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834670" comment="libexif-0.6.21-17.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834671" comment="libexif-devel-0.6.21-17.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1824" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12398" ref_url="https://www.suse.com/security/cve/CVE-2020-12398/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2614.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2614.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12398/">CVE-2020-12398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12398">CVE-2020-12398 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982181" comment="thunderbird-68.9.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1825" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13777" ref_url="https://www.suse.com/security/cve/CVE-2020-13777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2637.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2637.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13777/">CVE-2020-13777 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13777">CVE-2020-13777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834672" comment="gnutls-3.6.8-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834673" comment="gnutls-c++-3.6.8-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834674" comment="gnutls-dane-3.6.8-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834675" comment="gnutls-devel-3.6.8-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834676" comment="gnutls-utils-3.6.8-11.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1826" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2641.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2641.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13379">CVE-2020-13379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834677" comment="grafana-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834678" comment="grafana-azure-monitor-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834679" comment="grafana-cloudwatch-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834680" comment="grafana-elasticsearch-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834681" comment="grafana-graphite-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834682" comment="grafana-influxdb-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834683" comment="grafana-loki-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834684" comment="grafana-mssql-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834685" comment="grafana-mysql-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834686" comment="grafana-opentsdb-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834687" comment="grafana-postgres-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834688" comment="grafana-prometheus-6.3.6-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834689" comment="grafana-stackdriver-6.3.6-2.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1827" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2755.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2755.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834690" comment="libnghttp2-1.33.0-3.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834691" comment="libnghttp2-devel-1.33.0-3.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834692" comment="nghttp2-1.33.0-3.el8_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1828" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20382" ref_url="https://www.suse.com/security/cve/CVE-2019-20382/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2774.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2774.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20382/">CVE-2019-20382 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20382">CVE-2019-20382 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832511" comment="hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832512" comment="hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834693" comment="libguestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834694" comment="libguestfs-bash-completion-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834695" comment="libguestfs-benchmarking-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834696" comment="libguestfs-devel-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834697" comment="libguestfs-gfs2-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834698" comment="libguestfs-gobject-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834699" comment="libguestfs-gobject-devel-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834700" comment="libguestfs-inspect-icons-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834701" comment="libguestfs-java-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834702" comment="libguestfs-java-devel-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834703" comment="libguestfs-javadoc-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834704" comment="libguestfs-man-pages-ja-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834705" comment="libguestfs-man-pages-uk-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834706" comment="libguestfs-rescue-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834707" comment="libguestfs-rsync-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834708" comment="libguestfs-tools-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834709" comment="libguestfs-tools-c-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832530" comment="libguestfs-winsupport-8.0-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834710" comment="libguestfs-xfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832532" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832533" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832534" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834711" comment="libvirt-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834712" comment="libvirt-admin-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834713" comment="libvirt-bash-completion-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834714" comment="libvirt-client-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834715" comment="libvirt-daemon-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834716" comment="libvirt-daemon-config-network-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834717" comment="libvirt-daemon-config-nwfilter-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834718" comment="libvirt-daemon-driver-interface-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834719" comment="libvirt-daemon-driver-network-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834720" comment="libvirt-daemon-driver-nodedev-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834721" comment="libvirt-daemon-driver-nwfilter-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834722" comment="libvirt-daemon-driver-qemu-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834723" comment="libvirt-daemon-driver-secret-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834724" comment="libvirt-daemon-driver-storage-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834725" comment="libvirt-daemon-driver-storage-core-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834726" comment="libvirt-daemon-driver-storage-disk-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834727" comment="libvirt-daemon-driver-storage-gluster-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834728" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834729" comment="libvirt-daemon-driver-storage-logical-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834730" comment="libvirt-daemon-driver-storage-mpath-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834731" comment="libvirt-daemon-driver-storage-rbd-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834732" comment="libvirt-daemon-driver-storage-scsi-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834733" comment="libvirt-daemon-kvm-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832558" comment="libvirt-dbus-1.2.0-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834734" comment="libvirt-devel-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834735" comment="libvirt-docs-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834736" comment="libvirt-libs-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834737" comment="libvirt-lock-sanlock-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834738" comment="libvirt-nss-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834739" comment="lua-guestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832565" comment="nbdkit-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832566" comment="nbdkit-bash-completion-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832567" comment="nbdkit-basic-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832568" comment="nbdkit-devel-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832569" comment="nbdkit-example-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832570" comment="nbdkit-plugin-gzip-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832571" comment="nbdkit-plugin-python-common-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832572" comment="nbdkit-plugin-python3-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832573" comment="nbdkit-plugin-vddk-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832574" comment="nbdkit-plugin-xz-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832575" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832576" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832577" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832578" comment="ocaml-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832579" comment="ocaml-hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834740" comment="ocaml-libguestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834741" comment="ocaml-libguestfs-devel-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834742" comment="perl-Sys-Guestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832583" comment="perl-Sys-Virt-4.5.0-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832584" comment="perl-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832585" comment="python3-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834743" comment="python3-libguestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832587" comment="python3-libvirt-4.5.0-2.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834744" comment="qemu-guest-agent-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834745" comment="qemu-img-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834746" comment="qemu-kvm-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834747" comment="qemu-kvm-block-curl-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834748" comment="qemu-kvm-block-gluster-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834749" comment="qemu-kvm-block-iscsi-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834750" comment="qemu-kvm-block-rbd-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834751" comment="qemu-kvm-block-ssh-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834752" comment="qemu-kvm-common-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834753" comment="qemu-kvm-core-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834754" comment="qemu-kvm-tests-2.12.0-99.module+el8.2.0+6870+55b789b4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832599" comment="ruby-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834755" comment="ruby-libguestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832601" comment="seabios-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832602" comment="seabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832603" comment="seavgabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832604" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832605" comment="supermin-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832606" comment="supermin-devel-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834756" comment="virt-dib-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834757" comment="virt-v2v-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1829" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2828.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2828.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834758" comment="firefox-68.10.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1830" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598/" source="CVE"/>
		<reference ref_id="CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">CVE-2020-7598 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8174">CVE-2020-8174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834759" comment="nodejs-10.21.0-3.module+el8.2.0+7071+d2377ea3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834760" comment="nodejs-devel-10.21.0-3.module+el8.2.0+7071+d2377ea3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834761" comment="nodejs-docs-10.21.0-3.module+el8.2.0+7071+d2377ea3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834762" comment="nodejs-full-i18n-10.21.0-3.module+el8.2.0+7071+d2377ea3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832427" comment="nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832428" comment="nodejs-packaging-17-3.module+el8+2873+aa7dfd9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834763" comment="npm-6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1831" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598/" source="CVE"/>
		<reference ref_id="CVE-2020-8172" ref_url="https://www.suse.com/security/cve/CVE-2020-8172/" source="CVE"/>
		<reference ref_id="CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7598">CVE-2020-7598 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8172/">CVE-2020-8172 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8172">CVE-2020-8172 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8174">CVE-2020-8174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834764" comment="nodejs-12.18.2-1.module+el8.2.0+7233+61d664c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834765" comment="nodejs-devel-12.18.2-1.module+el8.2.0+7233+61d664c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834766" comment="nodejs-docs-12.18.2-1.module+el8.2.0+7233+61d664c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834767" comment="nodejs-full-i18n-12.18.2-1.module+el8.2.0+7233+61d664c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833603" comment="nodejs-nodemon-1.18.3-1.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834768" comment="npm-6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1832" version="1" class="patch">
	<metadata>
		<title>security update for jbig2dec (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2897.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2897.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12268">CVE-2020-12268 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834769" comment="jbig2dec-libs-0.14-4.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1833" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10957" ref_url="https://www.suse.com/security/cve/CVE-2020-10957/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2901.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2901.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10957/">CVE-2020-10957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10957">CVE-2020-10957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834770" comment="dovecot-2.3.8-2.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834771" comment="dovecot-devel-2.3.8-2.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834772" comment="dovecot-mysql-2.3.8-2.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834773" comment="dovecot-pgsql-2.3.8-2.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834774" comment="dovecot-pigeonhole-2.3.8-2.el8_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1834" version="1" class="patch">
	<metadata>
		<title>security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2902.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2902.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12861">CVE-2020-12861 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12865">CVE-2020-12865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834775" comment="sane-backends-1.0.27-19.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834776" comment="sane-backends-daemon-1.0.27-19.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834777" comment="sane-backends-devel-1.0.27-19.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834778" comment="sane-backends-doc-1.0.27-19.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834779" comment="sane-backends-drivers-cameras-1.0.27-19.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834780" comment="sane-backends-drivers-scanners-1.0.27-19.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834781" comment="sane-backends-libs-1.0.27-19.el8_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1835" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1147" ref_url="https://www.suse.com/security/cve/CVE-2020-1147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2938.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2938.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1147/">CVE-2020-1147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1147">CVE-2020-1147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834782" comment="dotnet-host-fxr-2.1-2.1.20-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834783" comment="dotnet-runtime-2.1-2.1.20-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834784" comment="dotnet-sdk-2.1-2.1.516-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834785" comment="dotnet-sdk-2.1.5xx-2.1.516-1.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1836" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1147" ref_url="https://www.suse.com/security/cve/CVE-2020-1147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2954.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2954.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1147/">CVE-2020-1147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1147">CVE-2020-1147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834786" comment="aspnetcore-runtime-3.1-3.1.6-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834787" comment="aspnetcore-targeting-pack-3.1-3.1.6-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834788" comment="dotnet-3.1.106-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834789" comment="dotnet-apphost-pack-3.1-3.1.6-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834790" comment="dotnet-host-3.1.6-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834791" comment="dotnet-hostfxr-3.1-3.1.6-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834792" comment="dotnet-runtime-3.1-3.1.6-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834793" comment="dotnet-sdk-3.1-3.1.106-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834794" comment="dotnet-targeting-pack-3.1-3.1.6-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834795" comment="dotnet-templates-3.1-3.1.106-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834796" comment="netstandard-targeting-pack-2.1-3.1.106-1.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1837" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562/" source="CVE"/>
		<reference ref_id="CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2970.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2970.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14562">CVE-2020-14562 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14573">CVE-2020-14573 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834797" comment="java-11-openjdk-11.0.8.10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834798" comment="java-11-openjdk-demo-11.0.8.10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834799" comment="java-11-openjdk-devel-11.0.8.10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834800" comment="java-11-openjdk-headless-11.0.8.10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834801" comment="java-11-openjdk-javadoc-11.0.8.10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834802" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834803" comment="java-11-openjdk-jmods-11.0.8.10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834804" comment="java-11-openjdk-src-11.0.8.10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834805" comment="java-11-openjdk-static-libs-11.0.8.10-0.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1838" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2972.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2972.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834806" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834807" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834808" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834809" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834810" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834811" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834812" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834813" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1839" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3010.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3010.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19807">CVE-2019-19807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3016">CVE-2019-3016 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12888">CVE-2020-12888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834814" comment="bpftool-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834815" comment="kernel-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834816" comment="kernel-abi-whitelists-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834817" comment="kernel-core-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834818" comment="kernel-cross-headers-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834819" comment="kernel-debug-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834820" comment="kernel-debug-core-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834822" comment="kernel-debug-modules-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834823" comment="kernel-debug-modules-extra-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834825" comment="kernel-doc-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834826" comment="kernel-headers-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834827" comment="kernel-modules-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834828" comment="kernel-modules-extra-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834829" comment="kernel-tools-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834830" comment="kernel-tools-libs-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834832" comment="perf-4.18.0-193.13.2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834833" comment="python3-perf-4.18.0-193.13.2.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1840" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10754" ref_url="https://www.suse.com/security/cve/CVE-2020-10754/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10754/">CVE-2020-10754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10754">CVE-2020-10754 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834834" comment="NetworkManager-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834835" comment="NetworkManager-adsl-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834836" comment="NetworkManager-bluetooth-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834837" comment="NetworkManager-cloud-setup-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834838" comment="NetworkManager-config-server-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834839" comment="NetworkManager-dispatcher-routing-rules-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834840" comment="NetworkManager-libnm-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834841" comment="NetworkManager-libnm-devel-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834842" comment="NetworkManager-ovs-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834843" comment="NetworkManager-ppp-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834844" comment="NetworkManager-team-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834845" comment="NetworkManager-tui-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834846" comment="NetworkManager-wifi-1.22.8-5.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834847" comment="NetworkManager-wwan-1.22.8-5.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1841" version="1" class="patch">
	<metadata>
		<title>security update for dbus (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3014.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3014.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834848" comment="dbus-1.12.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834849" comment="dbus-common-1.12.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834850" comment="dbus-daemon-1.12.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834851" comment="dbus-devel-1.12.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834852" comment="dbus-libs-1.12.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834853" comment="dbus-tools-1.12.8-10.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834854" comment="dbus-x11-1.12.8-10.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1842" version="1" class="patch">
	<metadata>
		<title>security update for cjose (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14857" ref_url="https://www.suse.com/security/cve/CVE-2019-14857/" source="CVE"/>
		<reference ref_id="CVE-2019-20479" ref_url="https://www.suse.com/security/cve/CVE-2019-20479/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3032.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3032.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14857/">CVE-2019-14857 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14857">CVE-2019-14857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20479/">CVE-2019-20479 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20479">CVE-2019-20479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834855" comment="mod_auth_openidc-2.3.7-4.module+el8.2.0+6919+ac02cfd2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1843" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-15646" ref_url="https://www.suse.com/security/cve/CVE-2020-15646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3038.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3038.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15646/">CVE-2020-15646 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15646">CVE-2020-15646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834856" comment="thunderbird-68.10.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1844" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-10896" ref_url="https://www.suse.com/security/cve/CVE-2018-10896/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10896/">CVE-2018-10896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10896">CVE-2018-10896 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834857" comment="cloud-init-19.4-1.el8.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1845" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2021-20188" ref_url="https://www.suse.com/security/cve/CVE-2021-20188/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3053.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3053.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20188/">CVE-2021-20188 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20188">CVE-2021-20188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834858" comment="buildah-1.14.9-1.module+el8.2.1+6689+748e6520 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834859" comment="buildah-tests-1.14.9-1.module+el8.2.1+6689+748e6520 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834860" comment="cockpit-podman-17-1.module+el8.2.1+6636+bf4db4ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834861" comment="conmon-2.0.17-1.module+el8.2.1+6771+3533eb4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834862" comment="container-selinux-2.135.0-1.module+el8.2.1+6849+893e4f4a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834863" comment="containernetworking-plugins-0.8.6-1.module+el8.2.1+6626+598993b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834864" comment="containers-common-1.0.0-1.module+el8.2.1+6676+604e1b26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834865" comment="crit-3.14-2.module+el8.2.1+6750+e53a300c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834866" comment="criu-3.14-2.module+el8.2.1+6750+e53a300c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834867" comment="fuse-overlayfs-1.0.0-2.module+el8.2.1+6465+1a51e8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834868" comment="libslirp-4.3.0-3.module+el8.2.1+6816+bedf4f91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834869" comment="libslirp-devel-4.3.0-3.module+el8.2.1+6816+bedf4f91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834870" comment="podman-1.9.3-2.module+el8.2.1+6867+366c07d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834871" comment="podman-docker-1.9.3-2.module+el8.2.1+6867+366c07d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834872" comment="podman-remote-1.9.3-2.module+el8.2.1+6867+366c07d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834873" comment="podman-tests-1.9.3-2.module+el8.2.1+6867+366c07d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834874" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.2.1+6465+1a51e8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834875" comment="python3-criu-3.14-2.module+el8.2.1+6750+e53a300c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834876" comment="runc-1.0.0-66.rc10.module+el8.2.1+6465+1a51e8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834877" comment="skopeo-1.0.0-1.module+el8.2.1+6676+604e1b26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834878" comment="skopeo-tests-1.0.0-1.module+el8.2.1+6676+604e1b26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834879" comment="slirp4netns-1.0.1-1.module+el8.2.1+6595+03641d72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834880" comment="toolbox-0.0.7-1.module+el8.2.1+6465+1a51e8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834881" comment="udica-0.2.1-2.module+el8.2.1+6465+1a51e8b6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1846" version="1" class="patch">
	<metadata>
		<title>security update for postgresql-jdbc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13692" ref_url="https://www.suse.com/security/cve/CVE-2020-13692/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3176.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3176.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13692/">CVE-2020-13692 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13692">CVE-2020-13692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834882" comment="postgresql-jdbc-42.2.3-3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834883" comment="postgresql-jdbc-javadoc-42.2.3-3.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1847" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11538" ref_url="https://www.suse.com/security/cve/CVE-2020-11538/" source="CVE"/>
		<reference ref_id="CVE-2020-5313" ref_url="https://www.suse.com/security/cve/CVE-2020-5313/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3185.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3185.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11538/">CVE-2020-11538 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11538">CVE-2020-11538 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5313/">CVE-2020-5313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5313">CVE-2020-5313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834884" comment="python3-pillow-5.1.1-12.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1848" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20908" ref_url="https://www.suse.com/security/cve/CVE-2019-20908/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3218.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3218.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20908/">CVE-2019-20908 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20908">CVE-2019-20908 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15780">CVE-2020-15780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834885" comment="bpftool-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834886" comment="kernel-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834887" comment="kernel-abi-whitelists-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834888" comment="kernel-core-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834889" comment="kernel-cross-headers-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834890" comment="kernel-debug-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834891" comment="kernel-debug-core-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834893" comment="kernel-debug-modules-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834894" comment="kernel-debug-modules-extra-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834896" comment="kernel-doc-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834897" comment="kernel-headers-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834898" comment="kernel-modules-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834899" comment="kernel-modules-extra-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834900" comment="kernel-tools-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834901" comment="kernel-tools-libs-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834903" comment="perf-4.18.0-193.14.3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834904" comment="python3-perf-4.18.0-193.14.3.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1849" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3241.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3241.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834905" comment="firefox-68.11.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1850" version="1" class="patch">
	<metadata>
		<title>security update for nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11756" ref_url="https://www.suse.com/security/cve/CVE-2019-11756/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2019-17023" ref_url="https://www.suse.com/security/cve/CVE-2019-17023/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3280.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3280.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11756/">CVE-2019-11756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11756">CVE-2019-11756 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17023/">CVE-2019-17023 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17023">CVE-2019-17023 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834906" comment="nspr-4.25.0-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834907" comment="nspr-devel-4.25.0-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834908" comment="nss-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834909" comment="nss-devel-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834910" comment="nss-softokn-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834911" comment="nss-softokn-devel-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834912" comment="nss-softokn-freebl-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834913" comment="nss-softokn-freebl-devel-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834914" comment="nss-sysinit-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834915" comment="nss-tools-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834916" comment="nss-util-3.53.1-11.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834917" comment="nss-util-devel-3.53.1-11.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1851" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3341.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3341.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834918" comment="thunderbird-68.11.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1852" version="1" class="patch">
	<metadata>
		<title>security update for libvncserver (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3385.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3385.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834919" comment="libvncserver-0.9.11-15.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834920" comment="libvncserver-devel-0.9.11-15.el8_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1853" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1597" ref_url="https://www.suse.com/security/cve/CVE-2020-1597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1597/">CVE-2020-1597 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1597">CVE-2020-1597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834921" comment="aspnetcore-runtime-3.1-3.1.7-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834922" comment="aspnetcore-targeting-pack-3.1-3.1.7-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834923" comment="dotnet-3.1.107-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834924" comment="dotnet-apphost-pack-3.1-3.1.7-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834925" comment="dotnet-host-3.1.7-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834926" comment="dotnet-hostfxr-3.1-3.1.7-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834927" comment="dotnet-runtime-3.1-3.1.7-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834928" comment="dotnet-sdk-3.1-3.1.107-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834929" comment="dotnet-targeting-pack-3.1-3.1.7-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834930" comment="dotnet-templates-3.1-3.1.107-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834931" comment="netstandard-targeting-pack-2.1-3.1.107-1.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1854" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-15648" ref_url="https://www.suse.com/security/cve/CVE-2020-15648/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3557.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3557.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15648/">CVE-2020-15648 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15648">CVE-2020-15648 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15669">CVE-2020-15669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834932" comment="firefox-78.2.0-2.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1855" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3623.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3623.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832293" comment="libecap-1.0.1-2.module+el8.0.0+4045+70edde92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832294" comment="libecap-devel-1.0.1-2.module+el8.0.0+4045+70edde92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834933" comment="squid-4.4-8.module+el8.2.0+7834+b8ecaeef.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1856" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3634.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3634.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15669">CVE-2020-15669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834934" comment="thunderbird-68.12.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1857" version="1" class="patch">
	<metadata>
		<title>security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3654.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3654.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834935" comment="libcroco-0.6.12-4.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834936" comment="libcroco-devel-0.6.12-4.el8_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1858" version="1" class="patch">
	<metadata>
		<title>security update for librepo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14352" ref_url="https://www.suse.com/security/cve/CVE-2020-14352/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3658.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3658.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14352/">CVE-2020-14352 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14352">CVE-2020-14352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834937" comment="librepo-1.11.0-3.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834938" comment="python3-librepo-1.11.0-3.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1859" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11048" ref_url="https://www.suse.com/security/cve/CVE-2019-11048/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-13224" ref_url="https://www.suse.com/security/cve/CVE-2019-13224/" source="CVE"/>
		<reference ref_id="CVE-2019-13225" ref_url="https://www.suse.com/security/cve/CVE-2019-13225/" source="CVE"/>
		<reference ref_id="CVE-2019-16163" ref_url="https://www.suse.com/security/cve/CVE-2019-16163/" source="CVE"/>
		<reference ref_id="CVE-2019-19203" ref_url="https://www.suse.com/security/cve/CVE-2019-19203/" source="CVE"/>
		<reference ref_id="CVE-2019-19204" ref_url="https://www.suse.com/security/cve/CVE-2019-19204/" source="CVE"/>
		<reference ref_id="CVE-2019-19246" ref_url="https://www.suse.com/security/cve/CVE-2019-19246/" source="CVE"/>
		<reference ref_id="CVE-2019-20454" ref_url="https://www.suse.com/security/cve/CVE-2019-20454/" source="CVE"/>
		<reference ref_id="CVE-2020-7059" ref_url="https://www.suse.com/security/cve/CVE-2020-7059/" source="CVE"/>
		<reference ref_id="CVE-2020-7060" ref_url="https://www.suse.com/security/cve/CVE-2020-7060/" source="CVE"/>
		<reference ref_id="CVE-2020-7062" ref_url="https://www.suse.com/security/cve/CVE-2020-7062/" source="CVE"/>
		<reference ref_id="CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063/" source="CVE"/>
		<reference ref_id="CVE-2020-7064" ref_url="https://www.suse.com/security/cve/CVE-2020-7064/" source="CVE"/>
		<reference ref_id="CVE-2020-7065" ref_url="https://www.suse.com/security/cve/CVE-2020-7065/" source="CVE"/>
		<reference ref_id="CVE-2020-7066" ref_url="https://www.suse.com/security/cve/CVE-2020-7066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3662.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3662.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11039">CVE-2019-11039 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11040">CVE-2019-11040 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11041">CVE-2019-11041 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11042">CVE-2019-11042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11045">CVE-2019-11045 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11047">CVE-2019-11047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11048/">CVE-2019-11048 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11048">CVE-2019-11048 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11050">CVE-2019-11050 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13224/">CVE-2019-13224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13224">CVE-2019-13224 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13225/">CVE-2019-13225 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13225">CVE-2019-13225 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16163/">CVE-2019-16163 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16163">CVE-2019-16163 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19203/">CVE-2019-19203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19203">CVE-2019-19203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19204/">CVE-2019-19204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19204">CVE-2019-19204 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19246/">CVE-2019-19246 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19246">CVE-2019-19246 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20454/">CVE-2019-20454 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20454">CVE-2019-20454 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7059/">CVE-2020-7059 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7059">CVE-2020-7059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7060/">CVE-2020-7060 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7060">CVE-2020-7060 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7062/">CVE-2020-7062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7062">CVE-2020-7062 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7063">CVE-2020-7063 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7064/">CVE-2020-7064 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7064">CVE-2020-7064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7065/">CVE-2020-7065 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7065">CVE-2020-7065 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7066/">CVE-2020-7066 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7066">CVE-2020-7066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833307" comment="apcu-panel-5.1.17-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833308" comment="libzip-1.5.2-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833309" comment="libzip-devel-1.5.2-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833310" comment="libzip-tools-1.5.2-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834939" comment="php-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834940" comment="php-bcmath-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834941" comment="php-cli-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834942" comment="php-common-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834943" comment="php-dba-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834944" comment="php-dbg-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834945" comment="php-devel-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834946" comment="php-embedded-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834947" comment="php-enchant-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834948" comment="php-fpm-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834949" comment="php-gd-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834950" comment="php-gmp-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834951" comment="php-intl-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834952" comment="php-json-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834953" comment="php-ldap-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834954" comment="php-mbstring-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834955" comment="php-mysqlnd-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834956" comment="php-odbc-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834957" comment="php-opcache-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834958" comment="php-pdo-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833331" comment="php-pear-1.10.9-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833332" comment="php-pecl-apcu-5.1.17-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833333" comment="php-pecl-apcu-devel-5.1.17-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834959" comment="php-pecl-rrd-2.0.1-1.module+el8.2.0+4968+1d5097db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834960" comment="php-pecl-xdebug-2.8.0-1.module+el8.2.0+4968+1d5097db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833334" comment="php-pecl-zip-1.15.4-1.module+el8.1.0+3189+a1bff096 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834961" comment="php-pgsql-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834962" comment="php-process-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834963" comment="php-recode-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834964" comment="php-snmp-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834965" comment="php-soap-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834966" comment="php-xml-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834967" comment="php-xmlrpc-7.3.20-1.module+el8.2.0+7373+b272fdef is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1860" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14040" ref_url="https://www.suse.com/security/cve/CVE-2020-14040/" source="CVE"/>
		<reference ref_id="CVE-2020-15586" ref_url="https://www.suse.com/security/cve/CVE-2020-15586/" source="CVE"/>
		<reference ref_id="CVE-2020-16845" ref_url="https://www.suse.com/security/cve/CVE-2020-16845/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3665.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3665.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14040/">CVE-2020-14040 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14040">CVE-2020-14040 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15586/">CVE-2020-15586 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15586">CVE-2020-15586 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16845/">CVE-2020-16845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16845">CVE-2020-16845 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834968" comment="delve-1.3.2-3.module+el8.2.0+5581+896cb53e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834969" comment="go-toolset-1.13.15-1.module+el8.2.0+7662+fa98b974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834970" comment="golang-1.13.15-1.module+el8.2.0+7662+fa98b974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834971" comment="golang-bin-1.13.15-1.module+el8.2.0+7662+fa98b974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834972" comment="golang-docs-1.13.15-1.module+el8.2.0+7662+fa98b974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834973" comment="golang-misc-1.13.15-1.module+el8.2.0+7662+fa98b974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834974" comment="golang-race-1.13.15-1.module+el8.2.0+7662+fa98b974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834975" comment="golang-src-1.13.15-1.module+el8.2.0+7662+fa98b974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834976" comment="golang-tests-1.13.15-1.module+el8.2.0+7662+fa98b974 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1861" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3669.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3669.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10164">CVE-2019-10164 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834977" comment="postgresql-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834978" comment="postgresql-contrib-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834979" comment="postgresql-docs-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834980" comment="postgresql-plperl-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834981" comment="postgresql-plpython3-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834982" comment="postgresql-pltcl-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834983" comment="postgresql-server-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834984" comment="postgresql-server-devel-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834985" comment="postgresql-static-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834986" comment="postgresql-test-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834987" comment="postgresql-test-rpm-macros-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834988" comment="postgresql-upgrade-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834989" comment="postgresql-upgrade-devel-10.14-1.module+el8.2.0+7801+be0fed80 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1862" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1045" ref_url="https://www.suse.com/security/cve/CVE-2020-1045/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3699.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3699.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1045/">CVE-2020-1045 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1045">CVE-2020-1045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009834990" comment="aspnetcore-runtime-3.1-3.1.8-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834991" comment="aspnetcore-targeting-pack-3.1-3.1.8-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834992" comment="dotnet-3.1.108-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834993" comment="dotnet-apphost-pack-3.1-3.1.8-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834994" comment="dotnet-host-3.1.8-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834995" comment="dotnet-hostfxr-3.1-3.1.8-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834996" comment="dotnet-runtime-3.1-3.1.8-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834997" comment="dotnet-sdk-3.1-3.1.108-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834998" comment="dotnet-targeting-pack-3.1-3.1.8-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834999" comment="dotnet-templates-3.1-3.1.108-2.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835000" comment="netstandard-targeting-pack-2.1-3.1.108-2.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1863" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100/" source="CVE"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3713.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3713.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12100">CVE-2020-12100 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835001" comment="dovecot-2.3.8-2.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835002" comment="dovecot-devel-2.3.8-2.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835003" comment="dovecot-mysql-2.3.8-2.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835004" comment="dovecot-pgsql-2.3.8-2.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835005" comment="dovecot-pigeonhole-2.3.8-2.el8_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1864" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3714.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3714.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9490">CVE-2020-9490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835006" comment="httpd-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835007" comment="httpd-devel-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835008" comment="httpd-filesystem-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835009" comment="httpd-manual-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835010" comment="httpd-tools-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835011" comment="mod_http2-1.11.3-3.module+el8.2.0+7758+84b4ca3e.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835012" comment="mod_ldap-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835013" comment="mod_md-2.0.8-7.module+el8.2.0+5531+7e4d69a2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835014" comment="mod_proxy_html-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835015" comment="mod_session-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835016" comment="mod_ssl-2.4.37-21.module+el8.2.0+5008+cca404a3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1865" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2911" ref_url="https://www.suse.com/security/cve/CVE-2019-2911/" source="CVE"/>
		<reference ref_id="CVE-2019-2914" ref_url="https://www.suse.com/security/cve/CVE-2019-2914/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2946" ref_url="https://www.suse.com/security/cve/CVE-2019-2946/" source="CVE"/>
		<reference ref_id="CVE-2019-2957" ref_url="https://www.suse.com/security/cve/CVE-2019-2957/" source="CVE"/>
		<reference ref_id="CVE-2019-2960" ref_url="https://www.suse.com/security/cve/CVE-2019-2960/" source="CVE"/>
		<reference ref_id="CVE-2019-2963" ref_url="https://www.suse.com/security/cve/CVE-2019-2963/" source="CVE"/>
		<reference ref_id="CVE-2019-2966" ref_url="https://www.suse.com/security/cve/CVE-2019-2966/" source="CVE"/>
		<reference ref_id="CVE-2019-2967" ref_url="https://www.suse.com/security/cve/CVE-2019-2967/" source="CVE"/>
		<reference ref_id="CVE-2019-2968" ref_url="https://www.suse.com/security/cve/CVE-2019-2968/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2019-2982" ref_url="https://www.suse.com/security/cve/CVE-2019-2982/" source="CVE"/>
		<reference ref_id="CVE-2019-2991" ref_url="https://www.suse.com/security/cve/CVE-2019-2991/" source="CVE"/>
		<reference ref_id="CVE-2019-2993" ref_url="https://www.suse.com/security/cve/CVE-2019-2993/" source="CVE"/>
		<reference ref_id="CVE-2019-2997" ref_url="https://www.suse.com/security/cve/CVE-2019-2997/" source="CVE"/>
		<reference ref_id="CVE-2019-2998" ref_url="https://www.suse.com/security/cve/CVE-2019-2998/" source="CVE"/>
		<reference ref_id="CVE-2019-3004" ref_url="https://www.suse.com/security/cve/CVE-2019-3004/" source="CVE"/>
		<reference ref_id="CVE-2019-3009" ref_url="https://www.suse.com/security/cve/CVE-2019-3009/" source="CVE"/>
		<reference ref_id="CVE-2019-3011" ref_url="https://www.suse.com/security/cve/CVE-2019-3011/" source="CVE"/>
		<reference ref_id="CVE-2019-3018" ref_url="https://www.suse.com/security/cve/CVE-2019-3018/" source="CVE"/>
		<reference ref_id="CVE-2020-14539" ref_url="https://www.suse.com/security/cve/CVE-2020-14539/" source="CVE"/>
		<reference ref_id="CVE-2020-14540" ref_url="https://www.suse.com/security/cve/CVE-2020-14540/" source="CVE"/>
		<reference ref_id="CVE-2020-14547" ref_url="https://www.suse.com/security/cve/CVE-2020-14547/" source="CVE"/>
		<reference ref_id="CVE-2020-14550" ref_url="https://www.suse.com/security/cve/CVE-2020-14550/" source="CVE"/>
		<reference ref_id="CVE-2020-14553" ref_url="https://www.suse.com/security/cve/CVE-2020-14553/" source="CVE"/>
		<reference ref_id="CVE-2020-14559" ref_url="https://www.suse.com/security/cve/CVE-2020-14559/" source="CVE"/>
		<reference ref_id="CVE-2020-14567" ref_url="https://www.suse.com/security/cve/CVE-2020-14567/" source="CVE"/>
		<reference ref_id="CVE-2020-14568" ref_url="https://www.suse.com/security/cve/CVE-2020-14568/" source="CVE"/>
		<reference ref_id="CVE-2020-14575" ref_url="https://www.suse.com/security/cve/CVE-2020-14575/" source="CVE"/>
		<reference ref_id="CVE-2020-14576" ref_url="https://www.suse.com/security/cve/CVE-2020-14576/" source="CVE"/>
		<reference ref_id="CVE-2020-14586" ref_url="https://www.suse.com/security/cve/CVE-2020-14586/" source="CVE"/>
		<reference ref_id="CVE-2020-14597" ref_url="https://www.suse.com/security/cve/CVE-2020-14597/" source="CVE"/>
		<reference ref_id="CVE-2020-14614" ref_url="https://www.suse.com/security/cve/CVE-2020-14614/" source="CVE"/>
		<reference ref_id="CVE-2020-14619" ref_url="https://www.suse.com/security/cve/CVE-2020-14619/" source="CVE"/>
		<reference ref_id="CVE-2020-14620" ref_url="https://www.suse.com/security/cve/CVE-2020-14620/" source="CVE"/>
		<reference ref_id="CVE-2020-14623" ref_url="https://www.suse.com/security/cve/CVE-2020-14623/" source="CVE"/>
		<reference ref_id="CVE-2020-14624" ref_url="https://www.suse.com/security/cve/CVE-2020-14624/" source="CVE"/>
		<reference ref_id="CVE-2020-14631" ref_url="https://www.suse.com/security/cve/CVE-2020-14631/" source="CVE"/>
		<reference ref_id="CVE-2020-14632" ref_url="https://www.suse.com/security/cve/CVE-2020-14632/" source="CVE"/>
		<reference ref_id="CVE-2020-14633" ref_url="https://www.suse.com/security/cve/CVE-2020-14633/" source="CVE"/>
		<reference ref_id="CVE-2020-14634" ref_url="https://www.suse.com/security/cve/CVE-2020-14634/" source="CVE"/>
		<reference ref_id="CVE-2020-14641" ref_url="https://www.suse.com/security/cve/CVE-2020-14641/" source="CVE"/>
		<reference ref_id="CVE-2020-14643" ref_url="https://www.suse.com/security/cve/CVE-2020-14643/" source="CVE"/>
		<reference ref_id="CVE-2020-14651" ref_url="https://www.suse.com/security/cve/CVE-2020-14651/" source="CVE"/>
		<reference ref_id="CVE-2020-14654" ref_url="https://www.suse.com/security/cve/CVE-2020-14654/" source="CVE"/>
		<reference ref_id="CVE-2020-14656" ref_url="https://www.suse.com/security/cve/CVE-2020-14656/" source="CVE"/>
		<reference ref_id="CVE-2020-14663" ref_url="https://www.suse.com/security/cve/CVE-2020-14663/" source="CVE"/>
		<reference ref_id="CVE-2020-14678" ref_url="https://www.suse.com/security/cve/CVE-2020-14678/" source="CVE"/>
		<reference ref_id="CVE-2020-14680" ref_url="https://www.suse.com/security/cve/CVE-2020-14680/" source="CVE"/>
		<reference ref_id="CVE-2020-14697" ref_url="https://www.suse.com/security/cve/CVE-2020-14697/" source="CVE"/>
		<reference ref_id="CVE-2020-14702" ref_url="https://www.suse.com/security/cve/CVE-2020-14702/" source="CVE"/>
		<reference ref_id="CVE-2020-14725" ref_url="https://www.suse.com/security/cve/CVE-2020-14725/" source="CVE"/>
		<reference ref_id="CVE-2020-14799" ref_url="https://www.suse.com/security/cve/CVE-2020-14799/" source="CVE"/>
		<reference ref_id="CVE-2020-2570" ref_url="https://www.suse.com/security/cve/CVE-2020-2570/" source="CVE"/>
		<reference ref_id="CVE-2020-2573" ref_url="https://www.suse.com/security/cve/CVE-2020-2573/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2577" ref_url="https://www.suse.com/security/cve/CVE-2020-2577/" source="CVE"/>
		<reference ref_id="CVE-2020-2579" ref_url="https://www.suse.com/security/cve/CVE-2020-2579/" source="CVE"/>
		<reference ref_id="CVE-2020-2580" ref_url="https://www.suse.com/security/cve/CVE-2020-2580/" source="CVE"/>
		<reference ref_id="CVE-2020-2584" ref_url="https://www.suse.com/security/cve/CVE-2020-2584/" source="CVE"/>
		<reference ref_id="CVE-2020-2588" ref_url="https://www.suse.com/security/cve/CVE-2020-2588/" source="CVE"/>
		<reference ref_id="CVE-2020-2589" ref_url="https://www.suse.com/security/cve/CVE-2020-2589/" source="CVE"/>
		<reference ref_id="CVE-2020-2627" ref_url="https://www.suse.com/security/cve/CVE-2020-2627/" source="CVE"/>
		<reference ref_id="CVE-2020-2660" ref_url="https://www.suse.com/security/cve/CVE-2020-2660/" source="CVE"/>
		<reference ref_id="CVE-2020-2679" ref_url="https://www.suse.com/security/cve/CVE-2020-2679/" source="CVE"/>
		<reference ref_id="CVE-2020-2686" ref_url="https://www.suse.com/security/cve/CVE-2020-2686/" source="CVE"/>
		<reference ref_id="CVE-2020-2694" ref_url="https://www.suse.com/security/cve/CVE-2020-2694/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2759" ref_url="https://www.suse.com/security/cve/CVE-2020-2759/" source="CVE"/>
		<reference ref_id="CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760/" source="CVE"/>
		<reference ref_id="CVE-2020-2761" ref_url="https://www.suse.com/security/cve/CVE-2020-2761/" source="CVE"/>
		<reference ref_id="CVE-2020-2762" ref_url="https://www.suse.com/security/cve/CVE-2020-2762/" source="CVE"/>
		<reference ref_id="CVE-2020-2763" ref_url="https://www.suse.com/security/cve/CVE-2020-2763/" source="CVE"/>
		<reference ref_id="CVE-2020-2765" ref_url="https://www.suse.com/security/cve/CVE-2020-2765/" source="CVE"/>
		<reference ref_id="CVE-2020-2770" ref_url="https://www.suse.com/security/cve/CVE-2020-2770/" source="CVE"/>
		<reference ref_id="CVE-2020-2774" ref_url="https://www.suse.com/security/cve/CVE-2020-2774/" source="CVE"/>
		<reference ref_id="CVE-2020-2779" ref_url="https://www.suse.com/security/cve/CVE-2020-2779/" source="CVE"/>
		<reference ref_id="CVE-2020-2780" ref_url="https://www.suse.com/security/cve/CVE-2020-2780/" source="CVE"/>
		<reference ref_id="CVE-2020-2804" ref_url="https://www.suse.com/security/cve/CVE-2020-2804/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814/" source="CVE"/>
		<reference ref_id="CVE-2020-2853" ref_url="https://www.suse.com/security/cve/CVE-2020-2853/" source="CVE"/>
		<reference ref_id="CVE-2020-2892" ref_url="https://www.suse.com/security/cve/CVE-2020-2892/" source="CVE"/>
		<reference ref_id="CVE-2020-2893" ref_url="https://www.suse.com/security/cve/CVE-2020-2893/" source="CVE"/>
		<reference ref_id="CVE-2020-2895" ref_url="https://www.suse.com/security/cve/CVE-2020-2895/" source="CVE"/>
		<reference ref_id="CVE-2020-2896" ref_url="https://www.suse.com/security/cve/CVE-2020-2896/" source="CVE"/>
		<reference ref_id="CVE-2020-2897" ref_url="https://www.suse.com/security/cve/CVE-2020-2897/" source="CVE"/>
		<reference ref_id="CVE-2020-2898" ref_url="https://www.suse.com/security/cve/CVE-2020-2898/" source="CVE"/>
		<reference ref_id="CVE-2020-2901" ref_url="https://www.suse.com/security/cve/CVE-2020-2901/" source="CVE"/>
		<reference ref_id="CVE-2020-2903" ref_url="https://www.suse.com/security/cve/CVE-2020-2903/" source="CVE"/>
		<reference ref_id="CVE-2020-2904" ref_url="https://www.suse.com/security/cve/CVE-2020-2904/" source="CVE"/>
		<reference ref_id="CVE-2020-2921" ref_url="https://www.suse.com/security/cve/CVE-2020-2921/" source="CVE"/>
		<reference ref_id="CVE-2020-2922" ref_url="https://www.suse.com/security/cve/CVE-2020-2922/" source="CVE"/>
		<reference ref_id="CVE-2020-2923" ref_url="https://www.suse.com/security/cve/CVE-2020-2923/" source="CVE"/>
		<reference ref_id="CVE-2020-2924" ref_url="https://www.suse.com/security/cve/CVE-2020-2924/" source="CVE"/>
		<reference ref_id="CVE-2020-2925" ref_url="https://www.suse.com/security/cve/CVE-2020-2925/" source="CVE"/>
		<reference ref_id="CVE-2020-2926" ref_url="https://www.suse.com/security/cve/CVE-2020-2926/" source="CVE"/>
		<reference ref_id="CVE-2020-2928" ref_url="https://www.suse.com/security/cve/CVE-2020-2928/" source="CVE"/>
		<reference ref_id="CVE-2020-2930" ref_url="https://www.suse.com/security/cve/CVE-2020-2930/" source="CVE"/>
		<reference ref_id="CVE-2021-1998" ref_url="https://www.suse.com/security/cve/CVE-2021-1998/" source="CVE"/>
		<reference ref_id="CVE-2021-2006" ref_url="https://www.suse.com/security/cve/CVE-2021-2006/" source="CVE"/>
		<reference ref_id="CVE-2021-2007" ref_url="https://www.suse.com/security/cve/CVE-2021-2007/" source="CVE"/>
		<reference ref_id="CVE-2021-2009" ref_url="https://www.suse.com/security/cve/CVE-2021-2009/" source="CVE"/>
		<reference ref_id="CVE-2021-2012" ref_url="https://www.suse.com/security/cve/CVE-2021-2012/" source="CVE"/>
		<reference ref_id="CVE-2021-2016" ref_url="https://www.suse.com/security/cve/CVE-2021-2016/" source="CVE"/>
		<reference ref_id="CVE-2021-2019" ref_url="https://www.suse.com/security/cve/CVE-2021-2019/" source="CVE"/>
		<reference ref_id="CVE-2021-2020" ref_url="https://www.suse.com/security/cve/CVE-2021-2020/" source="CVE"/>
		<reference ref_id="CVE-2021-2144" ref_url="https://www.suse.com/security/cve/CVE-2021-2144/" source="CVE"/>
		<reference ref_id="CVE-2021-2160" ref_url="https://www.suse.com/security/cve/CVE-2021-2160/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3732.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3732.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2911/">CVE-2019-2911 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2911">CVE-2019-2911 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2914/">CVE-2019-2914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2914">CVE-2019-2914 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2938">CVE-2019-2938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2946/">CVE-2019-2946 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2946">CVE-2019-2946 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2957/">CVE-2019-2957 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2957">CVE-2019-2957 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2960/">CVE-2019-2960 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2960">CVE-2019-2960 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2963/">CVE-2019-2963 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2963">CVE-2019-2963 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2966/">CVE-2019-2966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2966">CVE-2019-2966 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2967/">CVE-2019-2967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2967">CVE-2019-2967 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2968/">CVE-2019-2968 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2968">CVE-2019-2968 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2982/">CVE-2019-2982 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2982">CVE-2019-2982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-2991/">CVE-2019-2991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2991">CVE-2019-2991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2993/">CVE-2019-2993 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2993">CVE-2019-2993 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2997/">CVE-2019-2997 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2997">CVE-2019-2997 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2998/">CVE-2019-2998 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2998">CVE-2019-2998 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3004/">CVE-2019-3004 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3004">CVE-2019-3004 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3009/">CVE-2019-3009 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3009">CVE-2019-3009 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3011/">CVE-2019-3011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3011">CVE-2019-3011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3018/">CVE-2019-3018 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3018">CVE-2019-3018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14539/">CVE-2020-14539 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14539">CVE-2020-14539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14540/">CVE-2020-14540 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14540">CVE-2020-14540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14547/">CVE-2020-14547 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14547">CVE-2020-14547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14550/">CVE-2020-14550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14550">CVE-2020-14550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14553/">CVE-2020-14553 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14553">CVE-2020-14553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14559/">CVE-2020-14559 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14559">CVE-2020-14559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14567/">CVE-2020-14567 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14567">CVE-2020-14567 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14568/">CVE-2020-14568 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14568">CVE-2020-14568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14575/">CVE-2020-14575 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14575">CVE-2020-14575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14576/">CVE-2020-14576 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14576">CVE-2020-14576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14586/">CVE-2020-14586 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14586">CVE-2020-14586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14597/">CVE-2020-14597 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14597">CVE-2020-14597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14614/">CVE-2020-14614 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14614">CVE-2020-14614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14619/">CVE-2020-14619 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14619">CVE-2020-14619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14620/">CVE-2020-14620 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14620">CVE-2020-14620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14623/">CVE-2020-14623 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14623">CVE-2020-14623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14624/">CVE-2020-14624 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14624">CVE-2020-14624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14631/">CVE-2020-14631 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14631">CVE-2020-14631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14632/">CVE-2020-14632 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14632">CVE-2020-14632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14633/">CVE-2020-14633 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14633">CVE-2020-14633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14634/">CVE-2020-14634 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14634">CVE-2020-14634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14641/">CVE-2020-14641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14641">CVE-2020-14641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14643/">CVE-2020-14643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14643">CVE-2020-14643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14651/">CVE-2020-14651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14651">CVE-2020-14651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14654/">CVE-2020-14654 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14654">CVE-2020-14654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14656/">CVE-2020-14656 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14656">CVE-2020-14656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14663/">CVE-2020-14663 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14663">CVE-2020-14663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14678/">CVE-2020-14678 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14678">CVE-2020-14678 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14680/">CVE-2020-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14680">CVE-2020-14680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14697/">CVE-2020-14697 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14697">CVE-2020-14697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14702/">CVE-2020-14702 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14702">CVE-2020-14702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14725/">CVE-2020-14725 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14725">CVE-2020-14725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14799/">CVE-2020-14799 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14799">CVE-2020-14799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2570/">CVE-2020-2570 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2570">CVE-2020-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2573/">CVE-2020-2573 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2573">CVE-2020-2573 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2577/">CVE-2020-2577 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2577">CVE-2020-2577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2579/">CVE-2020-2579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2579">CVE-2020-2579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2580/">CVE-2020-2580 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2580">CVE-2020-2580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2584/">CVE-2020-2584 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2584">CVE-2020-2584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2588/">CVE-2020-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2588">CVE-2020-2588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2589/">CVE-2020-2589 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2589">CVE-2020-2589 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2627/">CVE-2020-2627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2627">CVE-2020-2627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2660/">CVE-2020-2660 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2660">CVE-2020-2660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2679/">CVE-2020-2679 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2679">CVE-2020-2679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2686/">CVE-2020-2686 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2686">CVE-2020-2686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2694/">CVE-2020-2694 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2694">CVE-2020-2694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2759/">CVE-2020-2759 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2759">CVE-2020-2759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2760">CVE-2020-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2761/">CVE-2020-2761 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2761">CVE-2020-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2762/">CVE-2020-2762 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2762">CVE-2020-2762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2763/">CVE-2020-2763 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2763">CVE-2020-2763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2765/">CVE-2020-2765 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2765">CVE-2020-2765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2770/">CVE-2020-2770 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2770">CVE-2020-2770 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2774/">CVE-2020-2774 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2774">CVE-2020-2774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2779/">CVE-2020-2779 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2779">CVE-2020-2779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2780/">CVE-2020-2780 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2780">CVE-2020-2780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2804/">CVE-2020-2804 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2804">CVE-2020-2804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2812">CVE-2020-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2814">CVE-2020-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2853/">CVE-2020-2853 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2853">CVE-2020-2853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2892/">CVE-2020-2892 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2892">CVE-2020-2892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2893/">CVE-2020-2893 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2893">CVE-2020-2893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2895/">CVE-2020-2895 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2895">CVE-2020-2895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2896/">CVE-2020-2896 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2896">CVE-2020-2896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2897/">CVE-2020-2897 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2897">CVE-2020-2897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2898/">CVE-2020-2898 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2898">CVE-2020-2898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2901/">CVE-2020-2901 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2901">CVE-2020-2901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2903/">CVE-2020-2903 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2903">CVE-2020-2903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2904/">CVE-2020-2904 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2904">CVE-2020-2904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2921/">CVE-2020-2921 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2921">CVE-2020-2921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2922/">CVE-2020-2922 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2922">CVE-2020-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2923/">CVE-2020-2923 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2923">CVE-2020-2923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2924/">CVE-2020-2924 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2924">CVE-2020-2924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2925/">CVE-2020-2925 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2925">CVE-2020-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2926/">CVE-2020-2926 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2926">CVE-2020-2926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2928/">CVE-2020-2928 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2928">CVE-2020-2928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2930/">CVE-2020-2930 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2930">CVE-2020-2930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1998/">CVE-2021-1998 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1998">CVE-2021-1998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2006/">CVE-2021-2006 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2006">CVE-2021-2006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2007/">CVE-2021-2007 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2007">CVE-2021-2007 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2009/">CVE-2021-2009 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2009">CVE-2021-2009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2012/">CVE-2021-2012 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2012">CVE-2021-2012 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2016/">CVE-2021-2016 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2016">CVE-2021-2016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2019/">CVE-2021-2019 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2019">CVE-2021-2019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2020/">CVE-2021-2020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2020">CVE-2021-2020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2144/">CVE-2021-2144 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2144">CVE-2021-2144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2160/">CVE-2021-2160 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2160">CVE-2021-2160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832263" comment="mecab-0.996-1.module+el8.0.0+3898+e09bb8de.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832264" comment="mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832265" comment="mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835017" comment="mysql-8.0.21-1.module+el8.2.0+7855+47abd494 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835018" comment="mysql-common-8.0.21-1.module+el8.2.0+7855+47abd494 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835019" comment="mysql-devel-8.0.21-1.module+el8.2.0+7855+47abd494 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835020" comment="mysql-errmsg-8.0.21-1.module+el8.2.0+7855+47abd494 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835021" comment="mysql-libs-8.0.21-1.module+el8.2.0+7855+47abd494 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835022" comment="mysql-server-8.0.21-1.module+el8.2.0+7855+47abd494 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835023" comment="mysql-test-8.0.21-1.module+el8.2.0+7855+47abd494 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1866" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3832.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3832.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835024" comment="firefox-78.3.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1867" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832511" comment="hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832512" comment="hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834693" comment="libguestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834694" comment="libguestfs-bash-completion-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834695" comment="libguestfs-benchmarking-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834696" comment="libguestfs-devel-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834697" comment="libguestfs-gfs2-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834698" comment="libguestfs-gobject-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834699" comment="libguestfs-gobject-devel-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834700" comment="libguestfs-inspect-icons-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834701" comment="libguestfs-java-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834702" comment="libguestfs-java-devel-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834703" comment="libguestfs-javadoc-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834704" comment="libguestfs-man-pages-ja-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834705" comment="libguestfs-man-pages-uk-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834706" comment="libguestfs-rescue-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834707" comment="libguestfs-rsync-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834708" comment="libguestfs-tools-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834709" comment="libguestfs-tools-c-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832530" comment="libguestfs-winsupport-8.0-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834710" comment="libguestfs-xfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832532" comment="libiscsi-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832533" comment="libiscsi-devel-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832534" comment="libiscsi-utils-1.18.0-8.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834711" comment="libvirt-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834712" comment="libvirt-admin-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834713" comment="libvirt-bash-completion-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834714" comment="libvirt-client-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834715" comment="libvirt-daemon-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834716" comment="libvirt-daemon-config-network-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834717" comment="libvirt-daemon-config-nwfilter-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834718" comment="libvirt-daemon-driver-interface-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834719" comment="libvirt-daemon-driver-network-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834720" comment="libvirt-daemon-driver-nodedev-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834721" comment="libvirt-daemon-driver-nwfilter-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834722" comment="libvirt-daemon-driver-qemu-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834723" comment="libvirt-daemon-driver-secret-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834724" comment="libvirt-daemon-driver-storage-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834725" comment="libvirt-daemon-driver-storage-core-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834726" comment="libvirt-daemon-driver-storage-disk-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834727" comment="libvirt-daemon-driver-storage-gluster-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834728" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834729" comment="libvirt-daemon-driver-storage-logical-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834730" comment="libvirt-daemon-driver-storage-mpath-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834731" comment="libvirt-daemon-driver-storage-rbd-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834732" comment="libvirt-daemon-driver-storage-scsi-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834733" comment="libvirt-daemon-kvm-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832558" comment="libvirt-dbus-1.2.0-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834734" comment="libvirt-devel-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834735" comment="libvirt-docs-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834736" comment="libvirt-libs-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834737" comment="libvirt-lock-sanlock-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834738" comment="libvirt-nss-4.5.0-42.module+el8.2.0+6024+15a2423f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834739" comment="lua-guestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832565" comment="nbdkit-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832566" comment="nbdkit-bash-completion-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832567" comment="nbdkit-basic-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832568" comment="nbdkit-devel-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832569" comment="nbdkit-example-plugins-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832570" comment="nbdkit-plugin-gzip-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832571" comment="nbdkit-plugin-python-common-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832572" comment="nbdkit-plugin-python3-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832573" comment="nbdkit-plugin-vddk-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832574" comment="nbdkit-plugin-xz-1.4.2-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832575" comment="netcf-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832576" comment="netcf-devel-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832577" comment="netcf-libs-0.2.8-12.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832578" comment="ocaml-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832579" comment="ocaml-hivex-devel-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834740" comment="ocaml-libguestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834741" comment="ocaml-libguestfs-devel-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834742" comment="perl-Sys-Guestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832583" comment="perl-Sys-Virt-4.5.0-5.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832584" comment="perl-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832585" comment="python3-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834743" comment="python3-libguestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832587" comment="python3-libvirt-4.5.0-2.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835025" comment="qemu-guest-agent-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835026" comment="qemu-img-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835027" comment="qemu-kvm-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835028" comment="qemu-kvm-block-curl-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835029" comment="qemu-kvm-block-gluster-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835030" comment="qemu-kvm-block-iscsi-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835031" comment="qemu-kvm-block-rbd-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835032" comment="qemu-kvm-block-ssh-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835033" comment="qemu-kvm-common-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835034" comment="qemu-kvm-core-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835035" comment="qemu-kvm-tests-2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832599" comment="ruby-hivex-1.3.15-7.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834755" comment="ruby-libguestfs-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832601" comment="seabios-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832602" comment="seabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832603" comment="seavgabios-bin-1.11.1-4.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832604" comment="sgabios-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830829" comment="sgabios-bin-0.20170427git-3.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832605" comment="supermin-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832606" comment="supermin-devel-5.1.19-9.module+el8.1.0+4066+0f1aadab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834756" comment="virt-dib-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009834757" comment="virt-v2v-1.38.4-15.module+el8.2.0+5297+222a20af is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1868" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4155.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4155.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835036" comment="thunderbird-78.3.1-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1869" version="1" class="patch">
	<metadata>
		<title>security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4186.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4186.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835037" comment="spice-glib-0.37-1.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835038" comment="spice-glib-devel-0.37-1.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835039" comment="spice-gtk-0.37-1.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835040" comment="spice-gtk-tools-0.37-1.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835041" comment="spice-gtk3-0.37-1.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835042" comment="spice-gtk3-devel-0.37-1.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835043" comment="spice-gtk3-vala-0.37-1.el8_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835044" comment="spice-server-0.14.2-1.el8_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835045" comment="spice-server-devel-0.14.2-1.el8_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1870" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095/" source="CVE"/>
		<reference ref_id="CVE-2020-8116" ref_url="https://www.suse.com/security/cve/CVE-2020-8116/" source="CVE"/>
		<reference ref_id="CVE-2020-8201" ref_url="https://www.suse.com/security/cve/CVE-2020-8201/" source="CVE"/>
		<reference ref_id="CVE-2020-8252" ref_url="https://www.suse.com/security/cve/CVE-2020-8252/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4272.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4272.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15095">CVE-2020-15095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8116/">CVE-2020-8116 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8116">CVE-2020-8116 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8201/">CVE-2020-8201 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8201">CVE-2020-8201 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8252/">CVE-2020-8252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8252">CVE-2020-8252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835046" comment="nodejs-12.18.4-2.module+el8.2.0+8361+192e434e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835047" comment="nodejs-devel-12.18.4-2.module+el8.2.0+8361+192e434e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835048" comment="nodejs-docs-12.18.4-2.module+el8.2.0+8361+192e434e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835049" comment="nodejs-full-i18n-12.18.4-2.module+el8.2.0+8361+192e434e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833603" comment="nodejs-nodemon-1.18.3-1.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835050" comment="npm-6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1871" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4286.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4286.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14385">CVE-2020-14385 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835051" comment="bpftool-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835052" comment="kernel-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835053" comment="kernel-abi-whitelists-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835054" comment="kernel-core-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835055" comment="kernel-cross-headers-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835056" comment="kernel-debug-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835057" comment="kernel-debug-core-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835059" comment="kernel-debug-modules-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835060" comment="kernel-debug-modules-extra-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835062" comment="kernel-doc-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835063" comment="kernel-headers-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835064" comment="kernel-modules-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835065" comment="kernel-modules-extra-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835066" comment="kernel-tools-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835067" comment="kernel-tools-libs-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835069" comment="perf-4.18.0-193.28.1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835070" comment="python3-perf-4.18.0-193.28.1.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1872" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4305.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4305.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835071" comment="java-11-openjdk-11.0.9.11-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835072" comment="java-11-openjdk-demo-11.0.9.11-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835073" comment="java-11-openjdk-devel-11.0.9.11-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835074" comment="java-11-openjdk-headless-11.0.9.11-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835075" comment="java-11-openjdk-javadoc-11.0.9.11-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835076" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835077" comment="java-11-openjdk-jmods-11.0.9.11-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835078" comment="java-11-openjdk-src-11.0.9.11-0.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835079" comment="java-11-openjdk-static-libs-11.0.9.11-0.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1873" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4317.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4317.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835080" comment="firefox-78.4.0-1.el8_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1874" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4347.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4347.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835081" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835082" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835083" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835084" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835085" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835086" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835087" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el8_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835088" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el8_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1875" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917/" source="CVE"/>
		<reference ref_id="CVE-2019-15925" ref_url="https://www.suse.com/security/cve/CVE-2019-15925/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19543" ref_url="https://www.suse.com/security/cve/CVE-2019-19543/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20636" ref_url="https://www.suse.com/security/cve/CVE-2019-20636/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10774" ref_url="https://www.suse.com/security/cve/CVE-2020-10774/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11565" ref_url="https://www.suse.com/security/cve/CVE-2020-11565/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2020-12826" ref_url="https://www.suse.com/security/cve/CVE-2020-12826/" source="CVE"/>
		<reference ref_id="CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2022-50219" ref_url="https://www.suse.com/security/cve/CVE-2022-50219/" source="CVE"/>
		<reference ref_id="CVE-2023-53585" ref_url="https://www.suse.com/security/cve/CVE-2023-53585/" source="CVE"/>
		<reference ref_id="CVE-2025-21727" ref_url="https://www.suse.com/security/cve/CVE-2025-21727/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4431.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4431.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12614">CVE-2019-12614 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15917">CVE-2019-15917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15925/">CVE-2019-15925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15925">CVE-2019-15925 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18808">CVE-2019-18808 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18809">CVE-2019-18809 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19046">CVE-2019-19046 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19056">CVE-2019-19056 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19068">CVE-2019-19068 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19072">CVE-2019-19072 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19319">CVE-2019-19319 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19543/">CVE-2019-19543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19543">CVE-2019-19543 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19602">CVE-2019-19602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19770">CVE-2019-19770 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20054">CVE-2019-20054 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20636/">CVE-2019-20636 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20636">CVE-2019-20636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9455">CVE-2019-9455 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10774/">CVE-2020-10774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10774">CVE-2020-10774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-11565/">CVE-2020-11565 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11565">CVE-2020-11565 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12465">CVE-2020-12465 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12659">CVE-2020-12659 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12770">CVE-2020-12770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12826/">CVE-2020-12826 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12826">CVE-2020-12826 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14381">CVE-2020-14381 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50219/">CVE-2022-50219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50219">CVE-2022-50219 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53585/">CVE-2023-53585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53585">CVE-2023-53585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21727/">CVE-2025-21727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21727">CVE-2025-21727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835089" comment="bpftool-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835090" comment="kernel-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835091" comment="kernel-abi-whitelists-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835092" comment="kernel-core-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835093" comment="kernel-cross-headers-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835094" comment="kernel-debug-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835095" comment="kernel-debug-core-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835097" comment="kernel-debug-modules-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835098" comment="kernel-debug-modules-extra-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835100" comment="kernel-doc-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835101" comment="kernel-headers-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835102" comment="kernel-modules-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835103" comment="kernel-modules-extra-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835104" comment="kernel-tools-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835105" comment="kernel-tools-libs-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835107" comment="perf-4.18.0-240.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835108" comment="python3-perf-4.18.0-240.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1876" version="1" class="patch">
	<metadata>
		<title>security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4432.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4432.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835109" comment="platform-python-pip-9.0.3-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835110" comment="python3-pip-9.0.3-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835111" comment="python3-pip-wheel-9.0.3-18.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1877" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4433.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4433.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835112" comment="platform-python-3.6.8-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835113" comment="platform-python-debug-3.6.8-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835114" comment="platform-python-devel-3.6.8-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835115" comment="python3-idle-3.6.8-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835116" comment="python3-libs-3.6.8-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835117" comment="python3-test-3.6.8-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835118" comment="python3-tkinter-3.6.8-31.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1878" version="1" class="patch">
	<metadata>
		<title>Low: gnome-software and fwupd security, bug fix, and enhancement update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4436. The original RedHat(R) advisory is available from the RedHat web site at http://access.redhat.com/errata/RHSA:2020-4436		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10759">CVE-2020-10759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830594" comment="appstream-data-8-20200724.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835119" comment="fwupd-1.4.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835120" comment="gnome-software-3.36.1-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835121" comment="libxmlb-0.1.15-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1879" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2019-5018" ref_url="https://www.suse.com/security/cve/CVE-2019-5018/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-6405" ref_url="https://www.suse.com/security/cve/CVE-2020-6405/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4442.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4442.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5018/">CVE-2019-5018 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5018">CVE-2019-5018 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6405/">CVE-2020-6405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6405">CVE-2020-6405 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835122" comment="lemon-3.26.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835123" comment="sqlite-3.26.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835124" comment="sqlite-devel-3.26.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835125" comment="sqlite-doc-3.26.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835126" comment="sqlite-libs-3.26.0-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1880" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19221" ref_url="https://www.suse.com/security/cve/CVE-2019-19221/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4443.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4443.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19221/">CVE-2019-19221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19221">CVE-2019-19221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835127" comment="bsdtar-3.3.2-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835128" comment="libarchive-3.3.2-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835129" comment="libarchive-devel-3.3.2-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1881" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="CVE-2020-1751" ref_url="https://www.suse.com/security/cve/CVE-2020-1751/" source="CVE"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4444.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4444.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1751/">CVE-2020-1751 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">CVE-2020-1751 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835130" comment="compat-libpthread-nonshared-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835131" comment="glibc-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835132" comment="glibc-all-langpacks-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835133" comment="glibc-benchtests-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835134" comment="glibc-common-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835135" comment="glibc-devel-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835136" comment="glibc-headers-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835137" comment="glibc-langpack-aa-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835138" comment="glibc-langpack-af-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835139" comment="glibc-langpack-agr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835140" comment="glibc-langpack-ak-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835141" comment="glibc-langpack-am-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835142" comment="glibc-langpack-an-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835143" comment="glibc-langpack-anp-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835144" comment="glibc-langpack-ar-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835145" comment="glibc-langpack-as-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835146" comment="glibc-langpack-ast-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835147" comment="glibc-langpack-ayc-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835148" comment="glibc-langpack-az-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835149" comment="glibc-langpack-be-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835150" comment="glibc-langpack-bem-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835151" comment="glibc-langpack-ber-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835152" comment="glibc-langpack-bg-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835153" comment="glibc-langpack-bhb-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835154" comment="glibc-langpack-bho-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835155" comment="glibc-langpack-bi-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835156" comment="glibc-langpack-bn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835157" comment="glibc-langpack-bo-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835158" comment="glibc-langpack-br-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835159" comment="glibc-langpack-brx-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835160" comment="glibc-langpack-bs-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835161" comment="glibc-langpack-byn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835162" comment="glibc-langpack-ca-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835163" comment="glibc-langpack-ce-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835164" comment="glibc-langpack-chr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835165" comment="glibc-langpack-cmn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835166" comment="glibc-langpack-crh-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835167" comment="glibc-langpack-cs-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835168" comment="glibc-langpack-csb-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835169" comment="glibc-langpack-cv-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835170" comment="glibc-langpack-cy-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835171" comment="glibc-langpack-da-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835172" comment="glibc-langpack-de-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835173" comment="glibc-langpack-doi-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835174" comment="glibc-langpack-dsb-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835175" comment="glibc-langpack-dv-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835176" comment="glibc-langpack-dz-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835177" comment="glibc-langpack-el-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835178" comment="glibc-langpack-en-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835179" comment="glibc-langpack-eo-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835180" comment="glibc-langpack-es-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835181" comment="glibc-langpack-et-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835182" comment="glibc-langpack-eu-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835183" comment="glibc-langpack-fa-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835184" comment="glibc-langpack-ff-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835185" comment="glibc-langpack-fi-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835186" comment="glibc-langpack-fil-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835187" comment="glibc-langpack-fo-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835188" comment="glibc-langpack-fr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835189" comment="glibc-langpack-fur-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835190" comment="glibc-langpack-fy-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835191" comment="glibc-langpack-ga-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835192" comment="glibc-langpack-gd-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835193" comment="glibc-langpack-gez-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835194" comment="glibc-langpack-gl-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835195" comment="glibc-langpack-gu-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835196" comment="glibc-langpack-gv-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835197" comment="glibc-langpack-ha-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835198" comment="glibc-langpack-hak-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835199" comment="glibc-langpack-he-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835200" comment="glibc-langpack-hi-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835201" comment="glibc-langpack-hif-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835202" comment="glibc-langpack-hne-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835203" comment="glibc-langpack-hr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835204" comment="glibc-langpack-hsb-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835205" comment="glibc-langpack-ht-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835206" comment="glibc-langpack-hu-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835207" comment="glibc-langpack-hy-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835208" comment="glibc-langpack-ia-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835209" comment="glibc-langpack-id-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835210" comment="glibc-langpack-ig-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835211" comment="glibc-langpack-ik-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835212" comment="glibc-langpack-is-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835213" comment="glibc-langpack-it-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835214" comment="glibc-langpack-iu-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835215" comment="glibc-langpack-ja-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835216" comment="glibc-langpack-ka-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835217" comment="glibc-langpack-kab-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835218" comment="glibc-langpack-kk-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835219" comment="glibc-langpack-kl-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835220" comment="glibc-langpack-km-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835221" comment="glibc-langpack-kn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835222" comment="glibc-langpack-ko-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835223" comment="glibc-langpack-kok-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835224" comment="glibc-langpack-ks-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835225" comment="glibc-langpack-ku-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835226" comment="glibc-langpack-kw-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835227" comment="glibc-langpack-ky-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835228" comment="glibc-langpack-lb-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835229" comment="glibc-langpack-lg-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835230" comment="glibc-langpack-li-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835231" comment="glibc-langpack-lij-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835232" comment="glibc-langpack-ln-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835233" comment="glibc-langpack-lo-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835234" comment="glibc-langpack-lt-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835235" comment="glibc-langpack-lv-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835236" comment="glibc-langpack-lzh-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835237" comment="glibc-langpack-mag-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835238" comment="glibc-langpack-mai-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835239" comment="glibc-langpack-mfe-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835240" comment="glibc-langpack-mg-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835241" comment="glibc-langpack-mhr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835242" comment="glibc-langpack-mi-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835243" comment="glibc-langpack-miq-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835244" comment="glibc-langpack-mjw-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835245" comment="glibc-langpack-mk-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835246" comment="glibc-langpack-ml-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835247" comment="glibc-langpack-mn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835248" comment="glibc-langpack-mni-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835249" comment="glibc-langpack-mr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835250" comment="glibc-langpack-ms-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835251" comment="glibc-langpack-mt-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835252" comment="glibc-langpack-my-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835253" comment="glibc-langpack-nan-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835254" comment="glibc-langpack-nb-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835255" comment="glibc-langpack-nds-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835256" comment="glibc-langpack-ne-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835257" comment="glibc-langpack-nhn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835258" comment="glibc-langpack-niu-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835259" comment="glibc-langpack-nl-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835260" comment="glibc-langpack-nn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835261" comment="glibc-langpack-nr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835262" comment="glibc-langpack-nso-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835263" comment="glibc-langpack-oc-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835264" comment="glibc-langpack-om-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835265" comment="glibc-langpack-or-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835266" comment="glibc-langpack-os-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835267" comment="glibc-langpack-pa-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835268" comment="glibc-langpack-pap-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835269" comment="glibc-langpack-pl-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835270" comment="glibc-langpack-ps-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835271" comment="glibc-langpack-pt-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835272" comment="glibc-langpack-quz-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835273" comment="glibc-langpack-raj-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835274" comment="glibc-langpack-ro-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835275" comment="glibc-langpack-ru-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835276" comment="glibc-langpack-rw-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835277" comment="glibc-langpack-sa-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835278" comment="glibc-langpack-sah-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835279" comment="glibc-langpack-sat-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835280" comment="glibc-langpack-sc-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835281" comment="glibc-langpack-sd-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835282" comment="glibc-langpack-se-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835283" comment="glibc-langpack-sgs-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835284" comment="glibc-langpack-shn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835285" comment="glibc-langpack-shs-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835286" comment="glibc-langpack-si-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835287" comment="glibc-langpack-sid-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835288" comment="glibc-langpack-sk-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835289" comment="glibc-langpack-sl-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835290" comment="glibc-langpack-sm-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835291" comment="glibc-langpack-so-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835292" comment="glibc-langpack-sq-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835293" comment="glibc-langpack-sr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835294" comment="glibc-langpack-ss-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835295" comment="glibc-langpack-st-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835296" comment="glibc-langpack-sv-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835297" comment="glibc-langpack-sw-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835298" comment="glibc-langpack-szl-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835299" comment="glibc-langpack-ta-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835300" comment="glibc-langpack-tcy-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835301" comment="glibc-langpack-te-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835302" comment="glibc-langpack-tg-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835303" comment="glibc-langpack-th-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835304" comment="glibc-langpack-the-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835305" comment="glibc-langpack-ti-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835306" comment="glibc-langpack-tig-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835307" comment="glibc-langpack-tk-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835308" comment="glibc-langpack-tl-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835309" comment="glibc-langpack-tn-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835310" comment="glibc-langpack-to-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835311" comment="glibc-langpack-tpi-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835312" comment="glibc-langpack-tr-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835313" comment="glibc-langpack-ts-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835314" comment="glibc-langpack-tt-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835315" comment="glibc-langpack-ug-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835316" comment="glibc-langpack-uk-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835317" comment="glibc-langpack-unm-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835318" comment="glibc-langpack-ur-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835319" comment="glibc-langpack-uz-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835320" comment="glibc-langpack-ve-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835321" comment="glibc-langpack-vi-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835322" comment="glibc-langpack-wa-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835323" comment="glibc-langpack-wae-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835324" comment="glibc-langpack-wal-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835325" comment="glibc-langpack-wo-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835326" comment="glibc-langpack-xh-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835327" comment="glibc-langpack-yi-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835328" comment="glibc-langpack-yo-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835329" comment="glibc-langpack-yue-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835330" comment="glibc-langpack-yuw-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835331" comment="glibc-langpack-zh-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835332" comment="glibc-langpack-zu-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835333" comment="glibc-locale-source-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835334" comment="glibc-minimal-langpack-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835335" comment="glibc-nss-devel-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835336" comment="glibc-static-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835337" comment="glibc-utils-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835338" comment="libnsl-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835339" comment="nscd-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835340" comment="nss_db-2.28-127.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835341" comment="nss_hesiod-2.28-127.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1882" version="1" class="patch">
	<metadata>
		<title>security update for librabbitmq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18609" ref_url="https://www.suse.com/security/cve/CVE-2019-18609/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4445.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4445.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18609/">CVE-2019-18609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18609">CVE-2019-18609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835342" comment="librabbitmq-0.9.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835343" comment="librabbitmq-devel-0.9.0-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1883" version="1" class="patch">
	<metadata>
		<title>Moderate: GNOME security, bug fix, and enhancement update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-14391" ref_url="https://www.suse.com/security/cve/CVE-2020-14391/" source="CVE"/>
		<reference ref_id="CVE-2020-15503" ref_url="https://www.suse.com/security/cve/CVE-2020-15503/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4451. The original RedHat(R) advisory is available from the RedHat web site at http://rhn.redhat.com/errata/RHSA-2020-4451.html		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14391/">CVE-2020-14391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14391">CVE-2020-14391 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15503/">CVE-2020-15503 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15503">CVE-2020-15503 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9802">CVE-2020-9802 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9803">CVE-2020-9803 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9805">CVE-2020-9805 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9806">CVE-2020-9806 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9807">CVE-2020-9807 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9843">CVE-2020-9843 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9850">CVE-2020-9850 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9862">CVE-2020-9862 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9893">CVE-2020-9893 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9894">CVE-2020-9894 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9895">CVE-2020-9895 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9915">CVE-2020-9915 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9925">CVE-2020-9925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830614" comment="LibRaw-0.19.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051511" comment="PackageKit-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051512" comment="PackageKit-command-not-found-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051513" comment="PackageKit-cron-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830620" comment="PackageKit-glib-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051514" comment="PackageKit-gstreamer-plugin-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830622" comment="PackageKit-gtk3-module-1.1.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051515" comment="dleyna-renderer-0.6.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051516" comment="frei0r-plugins-1.6.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051517" comment="frei0r-plugins-opencv-1.6.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830627" comment="gdm-3.28.3-34.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830630" comment="gnome-classic-session-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051518" comment="gnome-control-center-3.28.2-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830632" comment="gnome-control-center-filesystem-3.28.2-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051519" comment="gnome-photos-3.28.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051520" comment="gnome-photos-tests-3.28.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051521" comment="gnome-remote-desktop-0.1.8-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051522" comment="gnome-session-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051523" comment="gnome-session-wayland-session-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051524" comment="gnome-session-xsession-3.28.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051525" comment="gnome-settings-daemon-3.32.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051526" comment="gnome-shell-3.32.2-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830643" comment="gnome-shell-extension-apps-menu-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830644" comment="gnome-shell-extension-auto-move-windows-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830645" comment="gnome-shell-extension-common-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830646" comment="gnome-shell-extension-dash-to-dock-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830647" comment="gnome-shell-extension-desktop-icons-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830648" comment="gnome-shell-extension-disable-screenshield-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830649" comment="gnome-shell-extension-drive-menu-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830650" comment="gnome-shell-extension-horizontal-workspaces-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830651" comment="gnome-shell-extension-launch-new-instance-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830652" comment="gnome-shell-extension-native-window-placement-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830653" comment="gnome-shell-extension-no-hot-corner-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830654" comment="gnome-shell-extension-panel-favorites-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830655" comment="gnome-shell-extension-places-menu-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830656" comment="gnome-shell-extension-screenshot-window-sizer-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830657" comment="gnome-shell-extension-systemMonitor-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830658" comment="gnome-shell-extension-top-icons-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830659" comment="gnome-shell-extension-updates-dialog-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830660" comment="gnome-shell-extension-user-theme-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830661" comment="gnome-shell-extension-window-grouper-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830662" comment="gnome-shell-extension-window-list-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830663" comment="gnome-shell-extension-windowsNavigator-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830664" comment="gnome-shell-extension-workspace-indicator-3.32.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051527" comment="gnome-terminal-3.28.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051528" comment="gnome-terminal-nautilus-3.28.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830667" comment="gsettings-desktop-schemas-3.32.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830668" comment="gsettings-desktop-schemas-devel-3.32.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051529" comment="gtk-update-icon-cache-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830670" comment="gtk3-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830671" comment="gtk3-devel-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051530" comment="gtk3-immodule-xim-3.22.30-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051531" comment="gvfs-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051532" comment="gvfs-afc-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051533" comment="gvfs-afp-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051534" comment="gvfs-archive-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830680" comment="gvfs-client-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830681" comment="gvfs-devel-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051535" comment="gvfs-fuse-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051536" comment="gvfs-goa-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051537" comment="gvfs-gphoto2-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051538" comment="gvfs-mtp-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051539" comment="gvfs-smb-1.36.2-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830727" comment="libsoup-2.62.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830728" comment="libsoup-devel-2.62.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830688" comment="mutter-3.32.2-48.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051540" comment="nautilus-3.28.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830691" comment="nautilus-extensions-3.28.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830692" comment="pipewire-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830694" comment="pipewire-devel-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051541" comment="pipewire-doc-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830697" comment="pipewire-libs-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051542" comment="pipewire-utils-0.3.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830699" comment="pipewire0.2-devel-0.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830700" comment="pipewire0.2-libs-0.2.7-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830701" comment="potrace-1.15-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830729" comment="python3-gobject-3.28.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830730" comment="python3-gobject-base-3.28.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830704" comment="tracker-2.1.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051543" comment="vte-profile-0.52.4-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830708" comment="vte291-0.52.4-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830709" comment="webkit2gtk3-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830710" comment="webkit2gtk3-devel-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830712" comment="webkit2gtk3-jsc-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830713" comment="webkit2gtk3-jsc-devel-2.28.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830714" comment="webrtc-audio-processing-0.3-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051544" comment="xdg-desktop-portal-1.6.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051545" comment="xdg-desktop-portal-gtk-1.6.0-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1884" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4453.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4453.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835344" comment="vim-X11-8.0.1763-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835345" comment="vim-common-8.0.1763-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835346" comment="vim-enhanced-8.0.1763-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835347" comment="vim-filesystem-8.0.1763-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835348" comment="vim-minimal-8.0.1763-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1885" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835349" comment="libxslt-1.1.32-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835350" comment="libxslt-devel-1.1.32-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1886" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4465.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4465.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17450">CVE-2019-17450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835351" comment="binutils-2.30-79.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835352" comment="binutils-devel-2.30-79.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1887" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4469.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4469.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3898">CVE-2020-3898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835353" comment="cups-2.2.6-38.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835354" comment="cups-client-2.2.6-38.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835355" comment="cups-devel-2.2.6-38.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835356" comment="cups-filesystem-2.2.6-38.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835357" comment="cups-ipptool-2.2.6-38.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835358" comment="cups-libs-2.2.6-38.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835359" comment="cups-lpd-2.2.6-38.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1888" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4479.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4479.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835360" comment="libxml2-2.9.7-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835361" comment="libxml2-devel-2.9.7-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835362" comment="python3-libxml2-2.9.7-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1889" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4481.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4481.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835363" comment="bluez-5.50-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835364" comment="bluez-cups-5.50-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835365" comment="bluez-hid2hci-5.50-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835366" comment="bluez-libs-5.50-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835367" comment="bluez-libs-devel-5.50-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835368" comment="bluez-obexd-5.50-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1890" version="1" class="patch">
	<metadata>
		<title>security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4482.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4482.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835369" comment="libgcrypt-1.8.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835370" comment="libgcrypt-devel-1.8.5-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1891" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2019-19481" ref_url="https://www.suse.com/security/cve/CVE-2019-19481/" source="CVE"/>
		<reference ref_id="CVE-2019-20792" ref_url="https://www.suse.com/security/cve/CVE-2019-20792/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4483.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4483.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15945">CVE-2019-15945 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15946">CVE-2019-15946 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19479">CVE-2019-19479 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19481/">CVE-2019-19481 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19481">CVE-2019-19481 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20792/">CVE-2019-20792 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20792">CVE-2019-20792 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835371" comment="opensc-0.20.0-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1892" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4484.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4484.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835372" comment="expat-2.2.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835373" comment="expat-devel-2.2.5-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1893" version="1" class="patch">
	<metadata>
		<title>security update for gnupg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-1000858" ref_url="https://www.suse.com/security/cve/CVE-2018-1000858/" source="CVE"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4490.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4490.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000858/">CVE-2018-1000858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000858">CVE-2018-1000858 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13050">CVE-2019-13050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835374" comment="gnupg2-2.2.20-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835375" comment="gnupg2-smime-2.2.20-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1894" version="1" class="patch">
	<metadata>
		<title>security update for cyrus-sasl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4497.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4497.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19906">CVE-2019-19906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835376" comment="cyrus-sasl-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835377" comment="cyrus-sasl-devel-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835378" comment="cyrus-sasl-gs2-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835379" comment="cyrus-sasl-gssapi-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835380" comment="cyrus-sasl-ldap-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835381" comment="cyrus-sasl-lib-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835382" comment="cyrus-sasl-md5-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835383" comment="cyrus-sasl-ntlm-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835384" comment="cyrus-sasl-plain-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835385" comment="cyrus-sasl-scram-2.1.27-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835386" comment="cyrus-sasl-sql-2.1.27-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1895" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619/" source="CVE"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623/" source="CVE"/>
		<reference ref_id="CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4500.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4500.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8619">CVE-2020-8619 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8623">CVE-2020-8623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8624">CVE-2020-8624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835387" comment="bind-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835388" comment="bind-chroot-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835389" comment="bind-devel-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835390" comment="bind-export-devel-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835391" comment="bind-export-libs-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835392" comment="bind-libs-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835393" comment="bind-libs-lite-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835394" comment="bind-license-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835395" comment="bind-lite-devel-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835396" comment="bind-pkcs11-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835397" comment="bind-pkcs11-devel-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835398" comment="bind-pkcs11-libs-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835399" comment="bind-pkcs11-utils-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835400" comment="bind-sdb-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835401" comment="bind-sdb-chroot-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835402" comment="bind-utils-9.11.20-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835403" comment="python3-bind-9.11.20-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1896" version="1" class="patch">
	<metadata>
		<title>security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4508.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4508.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20387">CVE-2019-20387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835404" comment="libsolv-0.7.11-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835405" comment="python3-solv-0.7.11-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1897" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4514.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4514.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835406" comment="openssl-1.1.1g-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835407" comment="openssl-devel-1.1.1g-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835408" comment="openssl-libs-1.1.1g-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835409" comment="openssl-perl-1.1.1g-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1898" version="1" class="patch">
	<metadata>
		<title>security update for pcre2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20454" ref_url="https://www.suse.com/security/cve/CVE-2019-20454/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4539.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4539.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20454/">CVE-2019-20454 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20454">CVE-2019-20454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835410" comment="pcre2-10.32-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835411" comment="pcre2-devel-10.32-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835412" comment="pcre2-tools-10.32-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835413" comment="pcre2-utf16-10.32-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835414" comment="pcre2-utf32-10.32-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1899" version="1" class="patch">
	<metadata>
		<title>security update for cryptsetup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14382" ref_url="https://www.suse.com/security/cve/CVE-2020-14382/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4542.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4542.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14382/">CVE-2020-14382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14382">CVE-2020-14382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835415" comment="cryptsetup-2.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835416" comment="cryptsetup-devel-2.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835417" comment="cryptsetup-libs-2.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835418" comment="cryptsetup-reencrypt-2.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835419" comment="integritysetup-2.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835420" comment="veritysetup-2.3.3-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1900" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889/" source="CVE"/>
		<reference ref_id="CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4545.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4545.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14889">CVE-2019-14889 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1730">CVE-2020-1730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835421" comment="libssh-0.9.4-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835422" comment="libssh-config-0.9.4-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835423" comment="libssh-devel-0.9.4-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1901" version="1" class="patch">
	<metadata>
		<title>security update for libpcap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4547.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4547.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15165">CVE-2019-15165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835424" comment="libpcap-1.9.1-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835425" comment="libpcap-devel-1.9.1-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1902" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4553.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4553.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">CVE-2019-20386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835426" comment="systemd-239-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835427" comment="systemd-container-239-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835428" comment="systemd-devel-239-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835429" comment="systemd-journal-remote-239-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835430" comment="systemd-libs-239-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835431" comment="systemd-pam-239-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835432" comment="systemd-tests-239-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835433" comment="systemd-udev-239-40.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1903" version="1" class="patch">
	<metadata>
		<title>security update for libldb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4568.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4568.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10730">CVE-2020-10730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835434" comment="ldb-tools-2.1.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835435" comment="libldb-2.1.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835436" comment="libldb-devel-2.1.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835437" comment="python3-ldb-2.1.3-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1904" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4599.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4599.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835438" comment="curl-7.61.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835439" comment="libcurl-7.61.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835440" comment="libcurl-devel-7.61.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835441" comment="libcurl-minimal-7.61.1-14.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1905" version="1" class="patch">
	<metadata>
		<title>security update for resource-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4605.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4605.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835442" comment="resource-agents-4.1.1-68.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835443" comment="resource-agents-aliyun-4.1.1-68.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1906" version="1" class="patch">
	<metadata>
		<title>security update for frr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12831" ref_url="https://www.suse.com/security/cve/CVE-2020-12831/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4619.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4619.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12831/">CVE-2020-12831 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12831">CVE-2020-12831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835444" comment="frr-7.0-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835445" comment="frr-contrib-7.0-10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1907" version="1" class="patch">
	<metadata>
		<title>security update for spamassassin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4625.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4625.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11805">CVE-2018-11805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1930">CVE-2020-1930 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1931">CVE-2020-1931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835446" comment="spamassassin-3.4.2-10.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1908" version="1" class="patch">
	<metadata>
		<title>security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4627.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4627.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835447" comment="SDL-1.2.15-38.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835448" comment="SDL-devel-1.2.15-38.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1909" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2126" ref_url="https://www.suse.com/security/cve/CVE-2019-2126/" source="CVE"/>
		<reference ref_id="CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232/" source="CVE"/>
		<reference ref_id="CVE-2019-9371" ref_url="https://www.suse.com/security/cve/CVE-2019-9371/" source="CVE"/>
		<reference ref_id="CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4629.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4629.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2126/">CVE-2019-2126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2126">CVE-2019-2126 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9232">CVE-2019-9232 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9371/">CVE-2019-9371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9371">CVE-2019-9371 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9433">CVE-2019-9433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835449" comment="libvpx-1.7.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835450" comment="libvpx-devel-1.7.0-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1910" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4634.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4634.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835451" comment="libtiff-4.0.9-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835452" comment="libtiff-devel-4.0.9-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835453" comment="libtiff-tools-4.0.9-18.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1911" version="1" class="patch">
	<metadata>
		<title>security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4638.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4638.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16167">CVE-2019-16167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835454" comment="sysstat-11.7.3-5.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1912" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20477" ref_url="https://www.suse.com/security/cve/CVE-2019-20477/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4641.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4641.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20477/">CVE-2019-20477 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20477">CVE-2019-20477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835455" comment="python38-3.8.3-3.module+el8.3.0+7680+79e7e61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835456" comment="python38-Cython-0.29.14-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835457" comment="python38-PyMySQL-0.9.3-3.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835458" comment="python38-asn1crypto-1.2.0-3.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835459" comment="python38-babel-2.7.0-10.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835460" comment="python38-cffi-1.13.2-3.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835461" comment="python38-chardet-3.0.4-19.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835462" comment="python38-cryptography-2.8-3.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835463" comment="python38-debug-3.8.3-3.module+el8.3.0+7680+79e7e61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835464" comment="python38-devel-3.8.3-3.module+el8.3.0+7680+79e7e61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835465" comment="python38-idle-3.8.3-3.module+el8.3.0+7680+79e7e61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835466" comment="python38-idna-2.8-6.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835467" comment="python38-jinja2-2.10.3-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835468" comment="python38-libs-3.8.3-3.module+el8.3.0+7680+79e7e61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835469" comment="python38-lxml-4.4.1-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835470" comment="python38-markupsafe-1.1.1-6.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835471" comment="python38-mod_wsgi-4.6.8-3.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835472" comment="python38-numpy-1.17.3-5.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835473" comment="python38-numpy-doc-1.17.3-5.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835474" comment="python38-numpy-f2py-1.17.3-5.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835475" comment="python38-pip-19.3.1-1.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835476" comment="python38-pip-wheel-19.3.1-1.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835477" comment="python38-ply-3.11-8.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835478" comment="python38-psutil-5.6.4-3.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835479" comment="python38-psycopg2-2.8.4-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835480" comment="python38-psycopg2-doc-2.8.4-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835481" comment="python38-psycopg2-tests-2.8.4-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835482" comment="python38-pycparser-2.19-3.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835483" comment="python38-pysocks-1.7.1-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835484" comment="python38-pytz-2019.3-3.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835485" comment="python38-pyyaml-5.3.1-1.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835486" comment="python38-requests-2.22.0-9.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835487" comment="python38-rpm-macros-3.8.3-3.module+el8.3.0+7680+79e7e61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835488" comment="python38-scipy-1.3.1-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835489" comment="python38-setuptools-41.6.0-4.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835490" comment="python38-setuptools-wheel-41.6.0-4.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835491" comment="python38-six-1.12.0-9.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835492" comment="python38-test-3.8.3-3.module+el8.3.0+7680+79e7e61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835493" comment="python38-tkinter-3.8.3-3.module+el8.3.0+7680+79e7e61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835494" comment="python38-urllib3-1.25.7-4.module+el8.2.0+5234+f98739b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835495" comment="python38-wheel-0.33.6-5.module+el8.3.0+7187+a27ec44b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835496" comment="python38-wheel-wheel-0.33.6-5.module+el8.3.0+7187+a27ec44b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1913" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14494" ref_url="https://www.suse.com/security/cve/CVE-2019-14494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14494/">CVE-2019-14494 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14494">CVE-2019-14494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835497" comment="poppler-0.66.0-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835498" comment="poppler-cpp-0.66.0-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835499" comment="poppler-cpp-devel-0.66.0-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835500" comment="poppler-devel-0.66.0-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835501" comment="poppler-glib-0.66.0-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835502" comment="poppler-glib-devel-0.66.0-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835503" comment="poppler-qt5-0.66.0-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835504" comment="poppler-qt5-devel-0.66.0-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835505" comment="poppler-utils-0.66.0-27.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1914" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11018" ref_url="https://www.suse.com/security/cve/CVE-2020-11018/" source="CVE"/>
		<reference ref_id="CVE-2020-11019" ref_url="https://www.suse.com/security/cve/CVE-2020-11019/" source="CVE"/>
		<reference ref_id="CVE-2020-11038" ref_url="https://www.suse.com/security/cve/CVE-2020-11038/" source="CVE"/>
		<reference ref_id="CVE-2020-11039" ref_url="https://www.suse.com/security/cve/CVE-2020-11039/" source="CVE"/>
		<reference ref_id="CVE-2020-11040" ref_url="https://www.suse.com/security/cve/CVE-2020-11040/" source="CVE"/>
		<reference ref_id="CVE-2020-11041" ref_url="https://www.suse.com/security/cve/CVE-2020-11041/" source="CVE"/>
		<reference ref_id="CVE-2020-11042" ref_url="https://www.suse.com/security/cve/CVE-2020-11042/" source="CVE"/>
		<reference ref_id="CVE-2020-11043" ref_url="https://www.suse.com/security/cve/CVE-2020-11043/" source="CVE"/>
		<reference ref_id="CVE-2020-11044" ref_url="https://www.suse.com/security/cve/CVE-2020-11044/" source="CVE"/>
		<reference ref_id="CVE-2020-11045" ref_url="https://www.suse.com/security/cve/CVE-2020-11045/" source="CVE"/>
		<reference ref_id="CVE-2020-11046" ref_url="https://www.suse.com/security/cve/CVE-2020-11046/" source="CVE"/>
		<reference ref_id="CVE-2020-11047" ref_url="https://www.suse.com/security/cve/CVE-2020-11047/" source="CVE"/>
		<reference ref_id="CVE-2020-11048" ref_url="https://www.suse.com/security/cve/CVE-2020-11048/" source="CVE"/>
		<reference ref_id="CVE-2020-11049" ref_url="https://www.suse.com/security/cve/CVE-2020-11049/" source="CVE"/>
		<reference ref_id="CVE-2020-11058" ref_url="https://www.suse.com/security/cve/CVE-2020-11058/" source="CVE"/>
		<reference ref_id="CVE-2020-11085" ref_url="https://www.suse.com/security/cve/CVE-2020-11085/" source="CVE"/>
		<reference ref_id="CVE-2020-11086" ref_url="https://www.suse.com/security/cve/CVE-2020-11086/" source="CVE"/>
		<reference ref_id="CVE-2020-11087" ref_url="https://www.suse.com/security/cve/CVE-2020-11087/" source="CVE"/>
		<reference ref_id="CVE-2020-11088" ref_url="https://www.suse.com/security/cve/CVE-2020-11088/" source="CVE"/>
		<reference ref_id="CVE-2020-11089" ref_url="https://www.suse.com/security/cve/CVE-2020-11089/" source="CVE"/>
		<reference ref_id="CVE-2020-11522" ref_url="https://www.suse.com/security/cve/CVE-2020-11522/" source="CVE"/>
		<reference ref_id="CVE-2020-11525" ref_url="https://www.suse.com/security/cve/CVE-2020-11525/" source="CVE"/>
		<reference ref_id="CVE-2020-11526" ref_url="https://www.suse.com/security/cve/CVE-2020-11526/" source="CVE"/>
		<reference ref_id="CVE-2020-13396" ref_url="https://www.suse.com/security/cve/CVE-2020-13396/" source="CVE"/>
		<reference ref_id="CVE-2020-13397" ref_url="https://www.suse.com/security/cve/CVE-2020-13397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4647.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4647.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11018/">CVE-2020-11018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11018">CVE-2020-11018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11019/">CVE-2020-11019 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11019">CVE-2020-11019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11038/">CVE-2020-11038 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11038">CVE-2020-11038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11039/">CVE-2020-11039 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11039">CVE-2020-11039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11040/">CVE-2020-11040 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11040">CVE-2020-11040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11041/">CVE-2020-11041 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11041">CVE-2020-11041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11042/">CVE-2020-11042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11042">CVE-2020-11042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11043/">CVE-2020-11043 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11043">CVE-2020-11043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11044/">CVE-2020-11044 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11044">CVE-2020-11044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11045/">CVE-2020-11045 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11045">CVE-2020-11045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11046/">CVE-2020-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11046">CVE-2020-11046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11047/">CVE-2020-11047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11047">CVE-2020-11047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11048/">CVE-2020-11048 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11048">CVE-2020-11048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11049/">CVE-2020-11049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11049">CVE-2020-11049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11058/">CVE-2020-11058 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11058">CVE-2020-11058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11085/">CVE-2020-11085 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11085">CVE-2020-11085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11086/">CVE-2020-11086 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11086">CVE-2020-11086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11087/">CVE-2020-11087 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11087">CVE-2020-11087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11088/">CVE-2020-11088 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11088">CVE-2020-11088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11089/">CVE-2020-11089 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11089">CVE-2020-11089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11522/">CVE-2020-11522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11522">CVE-2020-11522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11525/">CVE-2020-11525 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11525">CVE-2020-11525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11526/">CVE-2020-11526 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11526">CVE-2020-11526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13396/">CVE-2020-13396 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13396">CVE-2020-13396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13397/">CVE-2020-13397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13397">CVE-2020-13397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835506" comment="freerdp-2.1.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835507" comment="freerdp-devel-2.1.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835508" comment="freerdp-libs-2.1.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835509" comment="libwinpr-2.1.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835510" comment="libwinpr-devel-2.1.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835511" comment="vinagre-3.22.0-23.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1915" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631/" source="CVE"/>
		<reference ref_id="CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4650.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4650.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8631">CVE-2020-8631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8632">CVE-2020-8632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835512" comment="cloud-init-19.4-11.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1916" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4654.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4654.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832448" comment="babel-2.5.1-9.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832449" comment="python-nose-docs-1.3.7-30.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835513" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835514" comment="python2-2.7.17-2.module+el8.3.0+7681+f1f02ded is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832456" comment="python2-babel-2.5.1-9.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832457" comment="python2-backports-1.0-15.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832458" comment="python2-backports-ssl_match_hostname-3.5.0.1-11.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832459" comment="python2-bson-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835515" comment="python2-debug-2.7.17-2.module+el8.3.0+7681+f1f02ded is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835516" comment="python2-devel-2.7.17-2.module+el8.3.0+7681+f1f02ded is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832471" comment="python2-jinja2-2.10-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835517" comment="python2-libs-2.7.17-2.module+el8.3.0+7681+f1f02ded is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832473" comment="python2-lxml-4.2.3-3.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832476" comment="python2-nose-1.3.7-30.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832477" comment="python2-numpy-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832478" comment="python2-numpy-doc-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832479" comment="python2-numpy-f2py-1.14.2-13.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835518" comment="python2-pip-9.0.3-18.module+el8.3.0+7707+eb4bba01 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835519" comment="python2-pip-wheel-9.0.3-18.module+el8.3.0+7707+eb4bba01 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832487" comment="python2-pygments-2.2.0-20.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832488" comment="python2-pymongo-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832489" comment="python2-pymongo-gridfs-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832497" comment="python2-scipy-1.0.0-20.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835520" comment="python2-setuptools-39.0.1-12.module+el8.3.0+7075+8484f0d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835521" comment="python2-setuptools-wheel-39.0.1-12.module+el8.3.0+7075+8484f0d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832501" comment="python2-six-1.11.0-5.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835522" comment="python2-sqlalchemy-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835523" comment="python2-test-2.7.17-2.module+el8.3.0+7681+f1f02ded is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835524" comment="python2-tkinter-2.7.17-2.module+el8.3.0+7681+f1f02ded is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835525" comment="python2-tools-2.7.17-2.module+el8.3.0+7681+f1f02ded is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832506" comment="python2-urllib3-1.24.2-1.module+el8.1.0+3280+19512f10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832507" comment="python2-virtualenv-15.1.0-19.module+el8.1.0+3507+d69c168d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832508" comment="python2-wheel-0.31.1-2.module+el8.1.0+3725+aac5cd17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832509" comment="python2-wheel-wheel-0.31.1-2.module+el8.1.0+3725+aac5cd17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1917" version="1" class="patch">
	<metadata>
		<title>security update for cyrus-imapd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18928" ref_url="https://www.suse.com/security/cve/CVE-2019-18928/" source="CVE"/>
		<reference ref_id="CVE-2019-19783" ref_url="https://www.suse.com/security/cve/CVE-2019-19783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4655.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4655.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18928/">CVE-2019-18928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18928">CVE-2019-18928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19783/">CVE-2019-19783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19783">CVE-2019-19783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835526" comment="cyrus-imapd-3.0.7-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835527" comment="cyrus-imapd-utils-3.0.7-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835528" comment="cyrus-imapd-vzic-3.0.7-19.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1918" version="1" class="patch">
	<metadata>
		<title>security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4659.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4659.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14553">CVE-2018-14553 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6977">CVE-2019-6977 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835529" comment="gd-2.2.5-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835530" comment="gd-devel-2.2.5-7.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1919" version="1" class="patch">
	<metadata>
		<title>security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12137">CVE-2020-12137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835531" comment="mailman-2.1.29-10.module+el8.3.0+6860+8e47d84b is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1920" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-18624" ref_url="https://www.suse.com/security/cve/CVE-2018-18624/" source="CVE"/>
		<reference ref_id="CVE-2019-19499" ref_url="https://www.suse.com/security/cve/CVE-2019-19499/" source="CVE"/>
		<reference ref_id="CVE-2020-11110" ref_url="https://www.suse.com/security/cve/CVE-2020-11110/" source="CVE"/>
		<reference ref_id="CVE-2020-12052" ref_url="https://www.suse.com/security/cve/CVE-2020-12052/" source="CVE"/>
		<reference ref_id="CVE-2020-12245" ref_url="https://www.suse.com/security/cve/CVE-2020-12245/" source="CVE"/>
		<reference ref_id="CVE-2020-12458" ref_url="https://www.suse.com/security/cve/CVE-2020-12458/" source="CVE"/>
		<reference ref_id="CVE-2020-12459" ref_url="https://www.suse.com/security/cve/CVE-2020-12459/" source="CVE"/>
		<reference ref_id="CVE-2020-13430" ref_url="https://www.suse.com/security/cve/CVE-2020-13430/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4682.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4682.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18624/">CVE-2018-18624 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18624">CVE-2018-18624 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19499/">CVE-2019-19499 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19499">CVE-2019-19499 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11110/">CVE-2020-11110 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11110">CVE-2020-11110 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12052/">CVE-2020-12052 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12052">CVE-2020-12052 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12245/">CVE-2020-12245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12245">CVE-2020-12245 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12458/">CVE-2020-12458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12458">CVE-2020-12458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12459/">CVE-2020-12459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12459">CVE-2020-12459 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13430/">CVE-2020-13430 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13430">CVE-2020-13430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835532" comment="grafana-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835533" comment="grafana-azure-monitor-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835534" comment="grafana-cloudwatch-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835535" comment="grafana-elasticsearch-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835536" comment="grafana-graphite-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835537" comment="grafana-influxdb-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835538" comment="grafana-loki-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835539" comment="grafana-mssql-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835540" comment="grafana-mysql-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835541" comment="grafana-opentsdb-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835542" comment="grafana-postgres-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835543" comment="grafana-prometheus-6.7.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835544" comment="grafana-stackdriver-6.7.4-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1921" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25661" ref_url="https://www.suse.com/security/cve/CVE-2020-25661/" source="CVE"/>
		<reference ref_id="CVE-2020-25662" ref_url="https://www.suse.com/security/cve/CVE-2020-25662/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4685.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4685.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24490">CVE-2020-24490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25661/">CVE-2020-25661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25661">CVE-2020-25661 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25662/">CVE-2020-25662 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25662">CVE-2020-25662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835545" comment="bpftool-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835546" comment="kernel-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835547" comment="kernel-abi-whitelists-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835548" comment="kernel-core-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835549" comment="kernel-cross-headers-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835550" comment="kernel-debug-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835551" comment="kernel-debug-core-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835553" comment="kernel-debug-modules-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835554" comment="kernel-debug-modules-extra-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835556" comment="kernel-doc-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835557" comment="kernel-headers-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835558" comment="kernel-modules-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835559" comment="kernel-modules-extra-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835560" comment="kernel-tools-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835561" comment="kernel-tools-libs-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835563" comment="perf-4.18.0-240.1.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835564" comment="python3-perf-4.18.0-240.1.1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1922" version="1" class="patch">
	<metadata>
		<title>security update for oddjob (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10737" ref_url="https://www.suse.com/security/cve/CVE-2020-10737/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4687.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4687.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10737/">CVE-2020-10737 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10737">CVE-2020-10737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835565" comment="oddjob-0.34.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835566" comment="oddjob-mkhomedir-0.34.5-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1923" version="1" class="patch">
	<metadata>
		<title>security update for openwsman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4689.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4689.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3833">CVE-2019-3833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835567" comment="libwsman-devel-2.6.5-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835568" comment="libwsman1-2.6.5-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835569" comment="openwsman-client-2.6.5-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835570" comment="openwsman-python3-2.6.5-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835571" comment="openwsman-server-2.6.5-7.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1924" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2015-9541" ref_url="https://www.suse.com/security/cve/CVE-2015-9541/" source="CVE"/>
		<reference ref_id="CVE-2018-21035" ref_url="https://www.suse.com/security/cve/CVE-2018-21035/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="CVE-2020-0570" ref_url="https://www.suse.com/security/cve/CVE-2020-0570/" source="CVE"/>
		<reference ref_id="CVE-2020-13962" ref_url="https://www.suse.com/security/cve/CVE-2020-13962/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4690.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4690.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9541/">CVE-2015-9541 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9541">CVE-2015-9541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-21035/">CVE-2018-21035 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21035">CVE-2018-21035 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0569">CVE-2020-0569 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0570/">CVE-2020-0570 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0570">CVE-2020-0570 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13962/">CVE-2020-13962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13962">CVE-2020-13962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835572" comment="qt5-assistant-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835573" comment="qt5-designer-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835574" comment="qt5-doctools-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835575" comment="qt5-linguist-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835576" comment="qt5-qdbusviewer-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835577" comment="qt5-qtbase-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835578" comment="qt5-qtbase-common-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835579" comment="qt5-qtbase-devel-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835580" comment="qt5-qtbase-examples-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835581" comment="qt5-qtbase-gui-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835582" comment="qt5-qtbase-mysql-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835583" comment="qt5-qtbase-odbc-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835584" comment="qt5-qtbase-postgresql-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835585" comment="qt5-qtbase-private-devel-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835586" comment="qt5-qtbase-static-5.12.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835587" comment="qt5-qttools-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835588" comment="qt5-qttools-common-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835589" comment="qt5-qttools-devel-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835590" comment="qt5-qttools-examples-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835591" comment="qt5-qttools-libs-designer-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835592" comment="qt5-qttools-libs-designercomponents-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835593" comment="qt5-qttools-libs-help-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835594" comment="qt5-qttools-static-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835595" comment="qt5-qtwebsockets-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835596" comment="qt5-qtwebsockets-devel-5.12.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835597" comment="qt5-qtwebsockets-examples-5.12.5-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1925" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10749" ref_url="https://www.suse.com/security/cve/CVE-2020-10749/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-14040" ref_url="https://www.suse.com/security/cve/CVE-2020-14040/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4694.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4694.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10749/">CVE-2020-10749 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10749">CVE-2020-10749 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14040/">CVE-2020-14040 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14040">CVE-2020-14040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835598" comment="buildah-1.15.1-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835599" comment="buildah-tests-1.15.1-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835600" comment="cockpit-podman-18.1-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835601" comment="conmon-2.0.20-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835602" comment="container-selinux-2.144.0-1.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835603" comment="containernetworking-plugins-0.8.6-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835604" comment="containers-common-1.1.1-3.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835605" comment="crit-3.14-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835606" comment="criu-3.14-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835607" comment="crun-0.14.1-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835608" comment="fuse-overlayfs-1.1.2-3.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835609" comment="libslirp-4.3.1-1.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835610" comment="libslirp-devel-4.3.1-1.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835611" comment="oci-seccomp-bpf-hook-1.1.2-3.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835612" comment="podman-2.0.5-5.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835613" comment="podman-catatonit-2.0.5-5.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835614" comment="podman-docker-2.0.5-5.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835615" comment="podman-remote-2.0.5-5.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835616" comment="podman-tests-2.0.5-5.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835617" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835618" comment="python3-criu-3.14-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835619" comment="runc-1.0.0-68.rc92.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835620" comment="skopeo-1.1.1-3.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835621" comment="skopeo-tests-1.1.1-3.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835622" comment="slirp4netns-1.1.4-2.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835623" comment="toolbox-0.0.8-1.module+el8.3.0+8221+97165c3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835624" comment="udica-0.2.2-1.module+el8.3.0+8221+97165c3f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1926" version="1" class="patch">
	<metadata>
		<title>security update for targetcli (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4697.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4697.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13867">CVE-2020-13867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835625" comment="targetcli-2.1.53-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1927" version="1" class="patch">
	<metadata>
		<title>security update for librsvg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4709.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4709.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20446">CVE-2019-20446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835626" comment="librsvg2-2.42.7-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835627" comment="librsvg2-devel-2.42.7-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835628" comment="librsvg2-tools-2.42.7-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1928" version="1" class="patch">
	<metadata>
		<title>security update for libserf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-11782" ref_url="https://www.suse.com/security/cve/CVE-2018-11782/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4712.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4712.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11782/">CVE-2018-11782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11782">CVE-2018-11782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835629" comment="libserf-1.3.9-9.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835630" comment="mod_dav_svn-1.10.2-3.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835631" comment="subversion-1.10.2-3.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835632" comment="subversion-devel-1.10.2-3.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835633" comment="subversion-gnome-1.10.2-3.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835634" comment="subversion-javahl-1.10.2-3.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835635" comment="subversion-libs-1.10.2-3.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835636" comment="subversion-perl-1.10.2-3.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835637" comment="subversion-tools-1.10.2-3.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835638" comment="utf8proc-2.1.1-5.module+el8.3.0+6671+2675c974 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1929" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-12854" ref_url="https://www.suse.com/security/cve/CVE-2019-12854/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-14058" ref_url="https://www.suse.com/security/cve/CVE-2020-14058/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4743.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4743.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12520">CVE-2019-12520 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12521">CVE-2019-12521 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12523">CVE-2019-12523 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12524">CVE-2019-12524 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12526">CVE-2019-12526 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12529">CVE-2019-12529 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12854/">CVE-2019-12854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12854">CVE-2019-12854 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18676">CVE-2019-18676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18677">CVE-2019-18677 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18678">CVE-2019-18678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18679">CVE-2019-18679 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18860">CVE-2019-18860 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14058/">CVE-2020-14058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14058">CVE-2020-14058 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832711" comment="libecap-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832712" comment="libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835639" comment="squid-4.11-3.module+el8.3.0+7851+7808b5f9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1930" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-17189" ref_url="https://www.suse.com/security/cve/CVE-2018-17189/" source="CVE"/>
		<reference ref_id="CVE-2019-0196" ref_url="https://www.suse.com/security/cve/CVE-2019-0196/" source="CVE"/>
		<reference ref_id="CVE-2019-0197" ref_url="https://www.suse.com/security/cve/CVE-2019-0197/" source="CVE"/>
		<reference ref_id="CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081/" source="CVE"/>
		<reference ref_id="CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082/" source="CVE"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10097" ref_url="https://www.suse.com/security/cve/CVE-2019-10097/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4751.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4751.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17189/">CVE-2018-17189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17189">CVE-2018-17189 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0196/">CVE-2019-0196 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0196">CVE-2019-0196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0197/">CVE-2019-0197 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0197">CVE-2019-0197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10081">CVE-2019-10081 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10082">CVE-2019-10082 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10092">CVE-2019-10092 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10097/">CVE-2019-10097 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10097">CVE-2019-10097 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10098">CVE-2019-10098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835640" comment="httpd-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835641" comment="httpd-devel-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835642" comment="httpd-filesystem-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835643" comment="httpd-manual-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835644" comment="httpd-tools-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835645" comment="mod_http2-1.15.7-2.module+el8.3.0+7670+8bf57d29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835646" comment="mod_ldap-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835647" comment="mod_proxy_html-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835648" comment="mod_session-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835649" comment="mod_ssl-2.4.37-30.module+el8.3.0+7001+0766b9e7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1931" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15892" ref_url="https://www.suse.com/security/cve/CVE-2019-15892/" source="CVE"/>
		<reference ref_id="CVE-2019-20637" ref_url="https://www.suse.com/security/cve/CVE-2019-20637/" source="CVE"/>
		<reference ref_id="CVE-2020-11653" ref_url="https://www.suse.com/security/cve/CVE-2020-11653/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4756.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4756.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15892/">CVE-2019-15892 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15892">CVE-2019-15892 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20637/">CVE-2019-20637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20637">CVE-2019-20637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11653/">CVE-2020-11653 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11653">CVE-2020-11653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835650" comment="varnish-6.0.6-2.module+el8.3.0+6843+b3b42fcc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835651" comment="varnish-devel-6.0.6-2.module+el8.3.0+6843+b3b42fcc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835652" comment="varnish-docs-6.0.6-2.module+el8.3.0+6843+b3b42fcc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835653" comment="varnish-modules-0.15.0-5.module+el8.3.0+6843+b3b42fcc is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1932" version="1" class="patch">
	<metadata>
		<title>security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14470" ref_url="https://www.suse.com/security/cve/CVE-2018-14470/" source="CVE"/>
		<reference ref_id="CVE-2018-14879" ref_url="https://www.suse.com/security/cve/CVE-2018-14879/" source="CVE"/>
		<reference ref_id="CVE-2018-14880" ref_url="https://www.suse.com/security/cve/CVE-2018-14880/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16227" ref_url="https://www.suse.com/security/cve/CVE-2018-16227/" source="CVE"/>
		<reference ref_id="CVE-2018-16228" ref_url="https://www.suse.com/security/cve/CVE-2018-16228/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4760.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4760.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10103">CVE-2018-10103 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10105">CVE-2018-10105 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14461">CVE-2018-14461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14462">CVE-2018-14462 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14463">CVE-2018-14463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14464">CVE-2018-14464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14465">CVE-2018-14465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14466">CVE-2018-14466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14467">CVE-2018-14467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14468">CVE-2018-14468 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14469">CVE-2018-14469 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14470/">CVE-2018-14470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14470">CVE-2018-14470 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14879/">CVE-2018-14879 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14879">CVE-2018-14879 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14880/">CVE-2018-14880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14880">CVE-2018-14880 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14881">CVE-2018-14881 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14882">CVE-2018-14882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16227/">CVE-2018-16227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16227">CVE-2018-16227 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16228/">CVE-2018-16228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16228">CVE-2018-16228 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16229">CVE-2018-16229 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16230">CVE-2018-16230 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16300">CVE-2018-16300 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16451">CVE-2018-16451 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16452">CVE-2018-16452 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15166">CVE-2019-15166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835654" comment="tcpdump-4.9.3-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1933" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10958" ref_url="https://www.suse.com/security/cve/CVE-2020-10958/" source="CVE"/>
		<reference ref_id="CVE-2020-10967" ref_url="https://www.suse.com/security/cve/CVE-2020-10967/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4763.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4763.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10958/">CVE-2020-10958 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10958">CVE-2020-10958 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10967/">CVE-2020-10967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10967">CVE-2020-10967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835655" comment="dovecot-2.3.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835656" comment="dovecot-devel-2.3.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835657" comment="dovecot-mysql-2.3.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835658" comment="dovecot-pgsql-2.3.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835659" comment="dovecot-pigeonhole-2.3.8-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1934" version="1" class="patch">
	<metadata>
		<title>security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0182" ref_url="https://www.suse.com/security/cve/CVE-2020-0182/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0181">CVE-2020-0181 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0182/">CVE-2020-0182 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0182">CVE-2020-0182 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0198">CVE-2020-0198 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835660" comment="libexif-0.6.22-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835661" comment="libexif-devel-0.6.22-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1935" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4799.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4799.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835662" comment="freeradius-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835663" comment="freeradius-devel-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835664" comment="freeradius-doc-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835665" comment="freeradius-krb5-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835666" comment="freeradius-ldap-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835667" comment="freeradius-mysql-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835668" comment="freeradius-perl-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835669" comment="freeradius-postgresql-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835670" comment="freeradius-rest-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835671" comment="freeradius-sqlite-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835672" comment="freeradius-unixODBC-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835673" comment="freeradius-utils-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835674" comment="python3-freeradius-3.0.20-3.module+el8.3.0+7597+67902674 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1936" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4805.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4805.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14559">CVE-2019-14559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835675" comment="edk2-ovmf-20200602gitca407c7246bf-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1937" version="1" class="patch">
	<metadata>
		<title>security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<reference ref_id="CVE-2020-10723" ref_url="https://www.suse.com/security/cve/CVE-2020-10723/" source="CVE"/>
		<reference ref_id="CVE-2020-10725" ref_url="https://www.suse.com/security/cve/CVE-2020-10725/" source="CVE"/>
		<reference ref_id="CVE-2020-10726" ref_url="https://www.suse.com/security/cve/CVE-2020-10726/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4806.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4806.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10722">CVE-2020-10722 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10723/">CVE-2020-10723 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10723">CVE-2020-10723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10725/">CVE-2020-10725 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10725">CVE-2020-10725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10726/">CVE-2020-10726 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10726">CVE-2020-10726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835676" comment="dpdk-19.11.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835677" comment="dpdk-devel-19.11.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835678" comment="dpdk-doc-19.11.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835679" comment="dpdk-tools-19.11.3-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1938" version="1" class="patch">
	<metadata>
		<title>security update for prometheus-jmx-exporter (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2017-18640" ref_url="https://www.suse.com/security/cve/CVE-2017-18640/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4807.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4807.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18640/">CVE-2017-18640 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18640">CVE-2017-18640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835680" comment="prometheus-jmx-exporter-0.12.0-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1939" version="1" class="patch">
	<metadata>
		<title>security update for file-roller (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-16680" ref_url="https://www.suse.com/security/cve/CVE-2019-16680/" source="CVE"/>
		<reference ref_id="CVE-2020-11736" ref_url="https://www.suse.com/security/cve/CVE-2020-11736/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4820.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4820.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16680/">CVE-2019-16680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-16680">CVE-2019-16680 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11736/">CVE-2020-11736 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11736">CVE-2020-11736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835681" comment="file-roller-3.28.1-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1940" version="1" class="patch">
	<metadata>
		<title>security update for oniguruma (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13225" ref_url="https://www.suse.com/security/cve/CVE-2019-13225/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13225/">CVE-2019-13225 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13225">CVE-2019-13225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835682" comment="oniguruma-6.8.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835683" comment="oniguruma-devel-6.8.2-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1941" version="1" class="patch">
	<metadata>
		<title>security update for fontforge (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25690" ref_url="https://www.suse.com/security/cve/CVE-2020-25690/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4844.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4844.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25690/">CVE-2020-25690 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25690">CVE-2020-25690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835684" comment="fontforge-20170731-15.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1942" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835685" comment="thunderbird-78.4.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1943" version="1" class="patch">
	<metadata>
		<title>security update for freetype (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4952.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4952.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835686" comment="freetype-2.9.1-4.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835687" comment="freetype-devel-2.9.1-4.el8_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1944" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5085.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5085.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835688" comment="microcode_ctl-20200609-2.20201027.1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1945" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5100.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5100.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835689" comment="firefox-78.4.1-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1946" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5146.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5146.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835690" comment="thunderbird-78.4.3-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1947" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5236.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5236.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835691" comment="thunderbird-78.5.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1948" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5237.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5237.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835692" comment="firefox-78.5.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1949" version="1" class="patch">
	<metadata>
		<title>security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5393.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5393.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835693" comment="libexif-0.6.22-5.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835694" comment="libexif-devel-0.6.22-5.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1950" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26970" ref_url="https://www.suse.com/security/cve/CVE-2020-26970/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5398.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5398.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26970/">CVE-2020-26970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26970">CVE-2020-26970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835695" comment="thunderbird-78.5.1-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1951" version="1" class="patch">
	<metadata>
		<title>security update for libpq (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5401.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5401.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835696" comment="libpq-12.5-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835697" comment="libpq-devel-12.5-1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1952" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835698" comment="bpftool-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835699" comment="kernel-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835700" comment="kernel-abi-whitelists-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835701" comment="kernel-core-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835702" comment="kernel-cross-headers-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835703" comment="kernel-debug-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835704" comment="kernel-debug-core-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835706" comment="kernel-debug-modules-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835707" comment="kernel-debug-modules-extra-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835709" comment="kernel-doc-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835710" comment="kernel-headers-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835711" comment="kernel-modules-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835712" comment="kernel-modules-extra-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835713" comment="kernel-tools-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835714" comment="kernel-tools-libs-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835716" comment="perf-4.18.0-240.8.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835717" comment="python3-perf-4.18.0-240.8.1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1953" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5476.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5476.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835718" comment="openssl-1.1.1g-12.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835719" comment="openssl-devel-1.1.1g-12.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835720" comment="openssl-libs-1.1.1g-12.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835721" comment="openssl-perl-1.1.1g-12.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1954" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5479.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5479.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835722" comment="iwl100-firmware-39.31.5.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835723" comment="iwl1000-firmware-39.31.5.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835724" comment="iwl105-firmware-18.168.6.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835725" comment="iwl135-firmware-18.168.6.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835726" comment="iwl2000-firmware-18.168.6.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835727" comment="iwl2030-firmware-18.168.6.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835728" comment="iwl3160-firmware-25.30.13.0-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835729" comment="iwl3945-firmware-15.32.2.9-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835730" comment="iwl4965-firmware-228.61.2.24-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835731" comment="iwl5000-firmware-8.83.5.1_1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835732" comment="iwl5150-firmware-8.24.2.2-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835733" comment="iwl6000-firmware-9.221.4.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835734" comment="iwl6000g2a-firmware-18.168.6.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835735" comment="iwl6000g2b-firmware-18.168.6.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835736" comment="iwl6050-firmware-41.28.5.1-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835737" comment="iwl7260-firmware-25.30.13.0-101.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835738" comment="libertas-sd8686-firmware-20200619-101.git3890db36.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835739" comment="libertas-sd8787-firmware-20200619-101.git3890db36.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835740" comment="libertas-usb8388-firmware-20200619-101.git3890db36.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835741" comment="libertas-usb8388-olpc-firmware-20200619-101.git3890db36.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835742" comment="linux-firmware-20200619-101.git3890db36.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1955" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5480.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5480.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835743" comment="net-snmp-5.8-18.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835744" comment="net-snmp-agent-libs-5.8-18.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835745" comment="net-snmp-devel-5.8-18.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835746" comment="net-snmp-libs-5.8-18.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835747" comment="net-snmp-perl-5.8-18.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835748" comment="net-snmp-utils-5.8-18.el8_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1956" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24659" ref_url="https://www.suse.com/security/cve/CVE-2020-24659/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5483.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5483.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24659/">CVE-2020-24659 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24659">CVE-2020-24659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835749" comment="gnutls-3.6.14-7.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835750" comment="gnutls-c++-3.6.14-7.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835751" comment="gnutls-dane-3.6.14-7.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835752" comment="gnutls-devel-3.6.14-7.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835753" comment="gnutls-utils-3.6.14-7.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1957" version="1" class="patch">
	<metadata>
		<title>security update for pacemaker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25654" ref_url="https://www.suse.com/security/cve/CVE-2020-25654/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5487.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5487.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25654/">CVE-2020-25654 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25654">CVE-2020-25654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835754" comment="pacemaker-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835755" comment="pacemaker-cli-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835756" comment="pacemaker-cluster-libs-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835757" comment="pacemaker-cts-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835758" comment="pacemaker-doc-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835759" comment="pacemaker-libs-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835760" comment="pacemaker-libs-devel-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835761" comment="pacemaker-nagios-plugins-metadata-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835762" comment="pacemaker-remote-2.0.4-6.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835763" comment="pacemaker-schemas-2.0.4-6.el8_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1958" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24553" ref_url="https://www.suse.com/security/cve/CVE-2020-24553/" source="CVE"/>
		<reference ref_id="CVE-2020-28362" ref_url="https://www.suse.com/security/cve/CVE-2020-28362/" source="CVE"/>
		<reference ref_id="CVE-2020-28366" ref_url="https://www.suse.com/security/cve/CVE-2020-28366/" source="CVE"/>
		<reference ref_id="CVE-2020-28367" ref_url="https://www.suse.com/security/cve/CVE-2020-28367/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5493.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5493.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24553/">CVE-2020-24553 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24553">CVE-2020-24553 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28362/">CVE-2020-28362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28362">CVE-2020-28362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28366/">CVE-2020-28366 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28367/">CVE-2020-28367 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835764" comment="delve-1.4.1-1.module+el8.3.0+7840+63dfb1ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835765" comment="go-toolset-1.14.12-1.module+el8.3.0+8784+380394dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835766" comment="golang-1.14.12-1.module+el8.3.0+8784+380394dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835767" comment="golang-bin-1.14.12-1.module+el8.3.0+8784+380394dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835768" comment="golang-docs-1.14.12-1.module+el8.3.0+8784+380394dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835769" comment="golang-misc-1.14.12-1.module+el8.3.0+8784+380394dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835770" comment="golang-race-1.14.12-1.module+el8.3.0+8784+380394dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835771" comment="golang-src-1.14.12-1.module+el8.3.0+8784+380394dc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835772" comment="golang-tests-1.14.12-1.module+el8.3.0+8784+380394dc is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1959" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20372" ref_url="https://www.suse.com/security/cve/CVE-2019-20372/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5495.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5495.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20372/">CVE-2019-20372 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20372">CVE-2019-20372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835773" comment="nginx-1.16.1-1.module+el8.3.0+8844+e5e7039f.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835774" comment="nginx-all-modules-1.16.1-1.module+el8.3.0+8844+e5e7039f.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835775" comment="nginx-filesystem-1.16.1-1.module+el8.3.0+8844+e5e7039f.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835776" comment="nginx-mod-http-image-filter-1.16.1-1.module+el8.3.0+8844+e5e7039f.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835777" comment="nginx-mod-http-perl-1.16.1-1.module+el8.3.0+8844+e5e7039f.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835778" comment="nginx-mod-http-xslt-filter-1.16.1-1.module+el8.3.0+8844+e5e7039f.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835779" comment="nginx-mod-mail-1.16.1-1.module+el8.3.0+8844+e5e7039f.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835780" comment="nginx-mod-stream-1.16.1-1.module+el8.3.0+8844+e5e7039f.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1960" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15366" ref_url="https://www.suse.com/security/cve/CVE-2020-15366/" source="CVE"/>
		<reference ref_id="CVE-2020-7608" ref_url="https://www.suse.com/security/cve/CVE-2020-7608/" source="CVE"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5499.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5499.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15366/">CVE-2020-15366 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15366">CVE-2020-15366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7608/">CVE-2020-7608 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7608">CVE-2020-7608 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7774">CVE-2020-7774 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8277">CVE-2020-8277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835781" comment="nodejs-12.19.1-1.module+el8.3.0+8851+b7b41ca0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835782" comment="nodejs-devel-12.19.1-1.module+el8.3.0+8851+b7b41ca0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835783" comment="nodejs-docs-12.19.1-1.module+el8.3.0+8851+b7b41ca0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835784" comment="nodejs-full-i18n-12.19.1-1.module+el8.3.0+8851+b7b41ca0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835786" comment="npm-6.14.8-1.12.19.1.1.module+el8.3.0+8851+b7b41ca0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1961" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760/" source="CVE"/>
		<reference ref_id="CVE-2020-2780" ref_url="https://www.suse.com/security/cve/CVE-2020-2780/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814/" source="CVE"/>
		<reference ref_id="CVE-2021-2022" ref_url="https://www.suse.com/security/cve/CVE-2021-2022/" source="CVE"/>
		<reference ref_id="CVE-2021-2144" ref_url="https://www.suse.com/security/cve/CVE-2021-2144/" source="CVE"/>
		<reference ref_id="CVE-2021-2194" ref_url="https://www.suse.com/security/cve/CVE-2021-2194/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5500.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5500.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2938">CVE-2019-2938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13249">CVE-2020-13249 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14765">CVE-2020-14765 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14776">CVE-2020-14776 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14789">CVE-2020-14789 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14812">CVE-2020-14812 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15180">CVE-2020-15180 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2760">CVE-2020-2760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2780/">CVE-2020-2780 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2780">CVE-2020-2780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2812">CVE-2020-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2814">CVE-2020-2814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2022/">CVE-2021-2022 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2022">CVE-2021-2022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2144/">CVE-2021-2144 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2144">CVE-2021-2144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2194/">CVE-2021-2194 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2194">CVE-2021-2194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830834" comment="Judy-1.0.5-18.module+el8+2765+cfa4f87b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835787" comment="galera-25.3.31-1.module+el8.3.0+8843+3f4e42f6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835788" comment="mariadb-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835789" comment="mariadb-backup-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835790" comment="mariadb-common-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835791" comment="mariadb-devel-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835792" comment="mariadb-embedded-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835793" comment="mariadb-embedded-devel-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835794" comment="mariadb-errmsg-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835795" comment="mariadb-gssapi-server-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835796" comment="mariadb-oqgraph-engine-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835797" comment="mariadb-server-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835798" comment="mariadb-server-galera-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835799" comment="mariadb-server-utils-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835800" comment="mariadb-test-10.3.27-3.module+el8.3.0+8972+5e3224e9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1962" version="1" class="patch">
	<metadata>
		<title>security update for mariadb-connector-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2922" ref_url="https://www.suse.com/security/cve/CVE-2020-2922/" source="CVE"/>
		<reference ref_id="CVE-2021-2007" ref_url="https://www.suse.com/security/cve/CVE-2021-2007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5503.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5503.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13249">CVE-2020-13249 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2922/">CVE-2020-2922 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2922">CVE-2020-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2007/">CVE-2021-2007 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2007">CVE-2021-2007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835801" comment="mariadb-connector-c-3.1.11-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835802" comment="mariadb-connector-c-config-3.1.11-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835803" comment="mariadb-connector-c-devel-3.1.11-2.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1963" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5562.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5562.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835804" comment="firefox-78.6.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1964" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5567.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5567.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835805" comment="postgresql-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835806" comment="postgresql-contrib-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835807" comment="postgresql-docs-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835808" comment="postgresql-plperl-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835809" comment="postgresql-plpython3-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835810" comment="postgresql-pltcl-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835811" comment="postgresql-server-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835812" comment="postgresql-server-devel-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835813" comment="postgresql-static-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835814" comment="postgresql-test-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835815" comment="postgresql-test-rpm-macros-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835816" comment="postgresql-upgrade-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835817" comment="postgresql-upgrade-devel-10.15-1.module+el8.3.0+8944+1ca16b1f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1965" version="1" class="patch">
	<metadata>
		<title>security update for fapolicyd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2020:5607.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5607.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835818" comment="fapolicyd-1.0-3.el8_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835819" comment="fapolicyd-selinux-1.0-3.el8_3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1966" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5619.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5619.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10130">CVE-2019-10130 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835820" comment="postgresql-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835821" comment="postgresql-contrib-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835822" comment="postgresql-docs-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835823" comment="postgresql-plperl-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835824" comment="postgresql-plpython3-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835825" comment="postgresql-pltcl-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835826" comment="postgresql-server-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835827" comment="postgresql-server-devel-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835828" comment="postgresql-static-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835829" comment="postgresql-test-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835830" comment="postgresql-test-rpm-macros-9.6.20-1.module+el8.3.0+8938+7f0e88b6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1967" version="1" class="patch">
	<metadata>
		<title>security update for pgaudit (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5620.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5620.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14349">CVE-2020-14349 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14350">CVE-2020-14350 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1720">CVE-2020-1720 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25696">CVE-2020-25696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835831" comment="pgaudit-1.4.0-4.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835832" comment="postgres-decoderbufs-0.10.0-2.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835833" comment="postgresql-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835834" comment="postgresql-contrib-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835835" comment="postgresql-docs-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835836" comment="postgresql-plperl-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835837" comment="postgresql-plpython3-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835838" comment="postgresql-pltcl-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835839" comment="postgresql-server-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835840" comment="postgresql-server-devel-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835841" comment="postgresql-static-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835842" comment="postgresql-test-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835843" comment="postgresql-test-rpm-macros-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835844" comment="postgresql-upgrade-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835845" comment="postgresql-upgrade-devel-12.5-1.module+el8.3.0+9042+664538f4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1968" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5624.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5624.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835846" comment="thunderbird-78.6.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1969" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835847" comment="bpftool-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835848" comment="kernel-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835849" comment="kernel-abi-whitelists-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835850" comment="kernel-core-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835851" comment="kernel-cross-headers-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835852" comment="kernel-debug-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835853" comment="kernel-debug-core-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835855" comment="kernel-debug-modules-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835856" comment="kernel-debug-modules-extra-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835858" comment="kernel-doc-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835859" comment="kernel-headers-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835860" comment="kernel-modules-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835861" comment="kernel-modules-extra-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835862" comment="kernel-tools-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835863" comment="kernel-tools-libs-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835865" comment="perf-4.18.0-240.10.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835866" comment="python3-perf-4.18.0-240.10.1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1970" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0052.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0052.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835867" comment="firefox-78.6.1-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1971" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0089.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0089.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835868" comment="thunderbird-78.6.1-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1972" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-1723" ref_url="https://www.suse.com/security/cve/CVE-2021-1723/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0094.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0094.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1723/">CVE-2021-1723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1723">CVE-2021-1723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835869" comment="aspnetcore-runtime-5.0-5.0.2-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835870" comment="aspnetcore-targeting-pack-5.0-5.0.2-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835871" comment="dotnet-5.0.102-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835872" comment="dotnet-apphost-pack-5.0-5.0.2-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835873" comment="dotnet-host-5.0.2-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835874" comment="dotnet-hostfxr-5.0-5.0.2-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835875" comment="dotnet-runtime-5.0-5.0.2-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835876" comment="dotnet-sdk-5.0-5.0.102-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835877" comment="dotnet-targeting-pack-5.0-5.0.2-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835878" comment="dotnet-templates-5.0-5.0.102-2.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835879" comment="netstandard-targeting-pack-2.1-5.0.102-2.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1973" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-1723" ref_url="https://www.suse.com/security/cve/CVE-2021-1723/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0095.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0095.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1723/">CVE-2021-1723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1723">CVE-2021-1723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835880" comment="aspnetcore-runtime-3.1-3.1.11-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835881" comment="aspnetcore-targeting-pack-3.1-3.1.11-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835882" comment="dotnet-apphost-pack-3.1-3.1.11-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835883" comment="dotnet-hostfxr-3.1-3.1.11-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835884" comment="dotnet-runtime-3.1-3.1.11-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835885" comment="dotnet-sdk-3.1-3.1.111-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835886" comment="dotnet-targeting-pack-3.1-3.1.11-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835887" comment="dotnet-templates-3.1-3.1.111-1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1974" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25681">CVE-2020-25681 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25682">CVE-2020-25682 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25683">CVE-2020-25683 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25687">CVE-2020-25687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835888" comment="dnsmasq-2.79-13.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835889" comment="dnsmasq-utils-2.79-13.el8_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1975" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0218.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0218.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835890" comment="sudo-1.8.29-6.el8_3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1976" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0288.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0288.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835891" comment="firefox-78.7.0-2.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1977" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15685" ref_url="https://www.suse.com/security/cve/CVE-2020-15685/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0298.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0298.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15685/">CVE-2020-15685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15685">CVE-2020-15685 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835892" comment="thunderbird-78.7.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1978" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0304.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0304.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21261">CVE-2021-21261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835893" comment="flatpak-1.6.2-5.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835894" comment="flatpak-libs-1.6.2-5.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835895" comment="flatpak-selinux-1.6.2-5.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835896" comment="flatpak-session-helper-1.6.2-5.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1979" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-1721" ref_url="https://www.suse.com/security/cve/CVE-2021-1721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0471.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0471.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1721/">CVE-2021-1721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1721">CVE-2021-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835897" comment="aspnetcore-runtime-3.1-3.1.12-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835898" comment="aspnetcore-targeting-pack-3.1-3.1.12-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835899" comment="dotnet-apphost-pack-3.1-3.1.12-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835900" comment="dotnet-hostfxr-3.1-3.1.12-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835901" comment="dotnet-runtime-3.1-3.1.12-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835902" comment="dotnet-sdk-3.1-3.1.112-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835903" comment="dotnet-targeting-pack-3.1-3.1.12-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835904" comment="dotnet-templates-3.1-3.1.112-1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1980" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-1721" ref_url="https://www.suse.com/security/cve/CVE-2021-1721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0474.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0474.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1721/">CVE-2021-1721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1721">CVE-2021-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835905" comment="dotnet-host-fxr-2.1-2.1.25-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835906" comment="dotnet-runtime-2.1-2.1.25-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835907" comment="dotnet-sdk-2.1-2.1.521-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835908" comment="dotnet-sdk-2.1.5xx-2.1.521-1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1981" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-1721" ref_url="https://www.suse.com/security/cve/CVE-2021-1721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0476.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0476.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1721/">CVE-2021-1721 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1721">CVE-2021-1721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835909" comment="aspnetcore-runtime-5.0-5.0.3-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835910" comment="aspnetcore-targeting-pack-5.0-5.0.3-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835911" comment="dotnet-5.0.103-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835912" comment="dotnet-apphost-pack-5.0-5.0.3-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835913" comment="dotnet-host-5.0.3-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835914" comment="dotnet-hostfxr-5.0-5.0.3-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835915" comment="dotnet-runtime-5.0-5.0.3-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835916" comment="dotnet-sdk-5.0-5.0.103-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835917" comment="dotnet-targeting-pack-5.0-5.0.3-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835918" comment="dotnet-templates-5.0-5.0.103-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835919" comment="netstandard-targeting-pack-2.1-5.0.103-1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1982" version="1" class="patch">
	<metadata>
		<title>security update for libserf (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-17525" ref_url="https://www.suse.com/security/cve/CVE-2020-17525/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0507.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0507.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17525/">CVE-2020-17525 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17525">CVE-2020-17525 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835629" comment="libserf-1.3.9-9.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835920" comment="mod_dav_svn-1.10.2-4.module+el8.3.0+9886+ac338b6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835921" comment="subversion-1.10.2-4.module+el8.3.0+9886+ac338b6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835922" comment="subversion-devel-1.10.2-4.module+el8.3.0+9886+ac338b6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835923" comment="subversion-gnome-1.10.2-4.module+el8.3.0+9886+ac338b6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835924" comment="subversion-javahl-1.10.2-4.module+el8.3.0+9886+ac338b6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835925" comment="subversion-libs-1.10.2-4.module+el8.3.0+9886+ac338b6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835926" comment="subversion-perl-1.10.2-4.module+el8.3.0+9886+ac338b6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835927" comment="subversion-tools-1.10.2-4.module+el8.3.0+9886+ac338b6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835638" comment="utf8proc-2.1.1-5.module+el8.3.0+6671+2675c974 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1983" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0531.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0531.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14370">CVE-2020-14370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835928" comment="buildah-1.16.7-4.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835929" comment="buildah-tests-1.16.7-4.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835930" comment="cockpit-podman-27.1-3.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835931" comment="conmon-2.0.22-3.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835932" comment="container-selinux-2.155.0-1.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835933" comment="containernetworking-plugins-0.9.0-1.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835934" comment="containers-common-1.2.0-9.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835935" comment="crit-3.15-1.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835936" comment="criu-3.15-1.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835937" comment="crun-0.16-2.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835938" comment="fuse-overlayfs-1.3.0-2.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835939" comment="libslirp-4.3.1-1.module+el8.3.1+9803+64eb0fd6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835940" comment="libslirp-devel-4.3.1-1.module+el8.3.1+9803+64eb0fd6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835941" comment="oci-seccomp-bpf-hook-1.2.0-1.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835942" comment="podman-2.2.1-7.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835943" comment="podman-catatonit-2.2.1-7.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835944" comment="podman-docker-2.2.1-7.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835945" comment="podman-plugins-2.2.1-7.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835946" comment="podman-remote-2.2.1-7.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835947" comment="podman-tests-2.2.1-7.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835948" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835949" comment="python3-criu-3.15-1.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835950" comment="runc-1.0.0-70.rc92.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835951" comment="skopeo-1.2.0-9.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835952" comment="skopeo-tests-1.2.0-9.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835953" comment="slirp4netns-1.1.8-1.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835954" comment="toolbox-0.0.8-1.module+el8.3.1+9857+68fb1526 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835955" comment="udica-0.2.4-1.module+el8.3.1+9857+68fb1526 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1984" version="1" class="patch">
	<metadata>
		<title>security update for nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0538.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0538.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835956" comment="nss-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835957" comment="nss-devel-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835958" comment="nss-softokn-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835959" comment="nss-softokn-devel-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835960" comment="nss-softokn-freebl-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835961" comment="nss-softokn-freebl-devel-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835962" comment="nss-sysinit-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835963" comment="nss-tools-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835964" comment="nss-util-3.53.1-17.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835965" comment="nss-util-devel-3.53.1-17.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1985" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095/" source="CVE"/>
		<reference ref_id="CVE-2020-15366" ref_url="https://www.suse.com/security/cve/CVE-2020-15366/" source="CVE"/>
		<reference ref_id="CVE-2020-7608" ref_url="https://www.suse.com/security/cve/CVE-2020-7608/" source="CVE"/>
		<reference ref_id="CVE-2020-7754" ref_url="https://www.suse.com/security/cve/CVE-2020-7754/" source="CVE"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2020-7788" ref_url="https://www.suse.com/security/cve/CVE-2020-7788/" source="CVE"/>
		<reference ref_id="CVE-2020-8116" ref_url="https://www.suse.com/security/cve/CVE-2020-8116/" source="CVE"/>
		<reference ref_id="CVE-2020-8252" ref_url="https://www.suse.com/security/cve/CVE-2020-8252/" source="CVE"/>
		<reference ref_id="CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265/" source="CVE"/>
		<reference ref_id="CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0548.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0548.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15095">CVE-2020-15095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15366/">CVE-2020-15366 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15366">CVE-2020-15366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7608/">CVE-2020-7608 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7608">CVE-2020-7608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7754/">CVE-2020-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7754">CVE-2020-7754 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7774">CVE-2020-7774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7788/">CVE-2020-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7788">CVE-2020-7788 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8116/">CVE-2020-8116 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8116">CVE-2020-8116 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8252/">CVE-2020-8252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8252">CVE-2020-8252 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8265">CVE-2020-8265 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8287">CVE-2020-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835966" comment="nodejs-10.23.1-1.module+el8.3.0+9502+012d8a97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835967" comment="nodejs-devel-10.23.1-1.module+el8.3.0+9502+012d8a97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835968" comment="nodejs-docs-10.23.1-1.module+el8.3.0+9502+012d8a97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835969" comment="nodejs-full-i18n-10.23.1-1.module+el8.3.0+9502+012d8a97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832427" comment="nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832428" comment="nodejs-packaging-17-3.module+el8+2873+aa7dfd9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835970" comment="npm-6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1986" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-3750" ref_url="https://www.suse.com/security/cve/CVE-2018-3750/" source="CVE"/>
		<reference ref_id="CVE-2019-10746" ref_url="https://www.suse.com/security/cve/CVE-2019-10746/" source="CVE"/>
		<reference ref_id="CVE-2019-10747" ref_url="https://www.suse.com/security/cve/CVE-2019-10747/" source="CVE"/>
		<reference ref_id="CVE-2020-7754" ref_url="https://www.suse.com/security/cve/CVE-2020-7754/" source="CVE"/>
		<reference ref_id="CVE-2020-7788" ref_url="https://www.suse.com/security/cve/CVE-2020-7788/" source="CVE"/>
		<reference ref_id="CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265/" source="CVE"/>
		<reference ref_id="CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0549.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0549.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3750/">CVE-2018-3750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3750">CVE-2018-3750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10746/">CVE-2019-10746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10746">CVE-2019-10746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10747/">CVE-2019-10747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10747">CVE-2019-10747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7754/">CVE-2020-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7754">CVE-2020-7754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7788/">CVE-2020-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7788">CVE-2020-7788 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8265">CVE-2020-8265 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8287">CVE-2020-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835971" comment="nodejs-12.20.1-1.module+el8.3.0+9503+19cb079c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835972" comment="nodejs-devel-12.20.1-1.module+el8.3.0+9503+19cb079c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835973" comment="nodejs-docs-12.20.1-1.module+el8.3.0+9503+19cb079c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835974" comment="nodejs-full-i18n-12.20.1-1.module+el8.3.0+9503+19cb079c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835975" comment="nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835976" comment="npm-6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1987" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15366" ref_url="https://www.suse.com/security/cve/CVE-2020-15366/" source="CVE"/>
		<reference ref_id="CVE-2020-7754" ref_url="https://www.suse.com/security/cve/CVE-2020-7754/" source="CVE"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2020-7788" ref_url="https://www.suse.com/security/cve/CVE-2020-7788/" source="CVE"/>
		<reference ref_id="CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<reference ref_id="CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0551.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0551.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15366/">CVE-2020-15366 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15366">CVE-2020-15366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7754/">CVE-2020-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7754">CVE-2020-7754 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7774">CVE-2020-7774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7788/">CVE-2020-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7788">CVE-2020-7788 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8265">CVE-2020-8265 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8277">CVE-2020-8277 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8287">CVE-2020-8287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835977" comment="nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835978" comment="nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835979" comment="nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835980" comment="nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835981" comment="nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835983" comment="npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1988" version="1" class="patch">
	<metadata>
		<title>security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0557.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0557.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835984" comment="perl-5.26.3-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835985" comment="perl-Attribute-Handlers-0.99-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835986" comment="perl-Devel-Peek-1.26-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835987" comment="perl-Devel-SelfStubber-1.06-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835988" comment="perl-Errno-1.28-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835989" comment="perl-ExtUtils-Embed-1.34-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835990" comment="perl-ExtUtils-Miniperl-1.06-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835991" comment="perl-IO-1.38-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835992" comment="perl-IO-Zlib-1.10-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835993" comment="perl-Locale-Maketext-Simple-0.21-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835994" comment="perl-Math-Complex-1.59-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835995" comment="perl-Memoize-1.03-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835996" comment="perl-Module-Loaded-0.08-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835997" comment="perl-Net-Ping-2.55-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835998" comment="perl-Pod-Html-1.22.02-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835999" comment="perl-SelfLoader-1.23-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836000" comment="perl-Test-1.30-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836001" comment="perl-Time-Piece-1.31-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836002" comment="perl-devel-5.26.3-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836003" comment="perl-interpreter-5.26.3-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836004" comment="perl-libnetcfg-5.26.3-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836005" comment="perl-libs-5.26.3-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836006" comment="perl-macros-5.26.3-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836007" comment="perl-open-1.11-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836008" comment="perl-tests-5.26.3-417.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836009" comment="perl-utils-5.26.3-417.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1989" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0558.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0558.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836010" comment="bpftool-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836011" comment="kernel-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836012" comment="kernel-abi-whitelists-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836013" comment="kernel-core-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836014" comment="kernel-cross-headers-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836015" comment="kernel-debug-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836016" comment="kernel-debug-core-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836018" comment="kernel-debug-modules-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836019" comment="kernel-debug-modules-extra-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836021" comment="kernel-doc-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836022" comment="kernel-headers-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836023" comment="kernel-modules-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836024" comment="kernel-modules-extra-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836025" comment="kernel-tools-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836026" comment="kernel-tools-libs-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836028" comment="perf-4.18.0-240.15.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836029" comment="python3-perf-4.18.0-240.15.1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1990" version="1" class="patch">
	<metadata>
		<title>security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0611.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0611.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836030" comment="xterm-331-1.el8_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836031" comment="xterm-resize-331-1.el8_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1991" version="1" class="patch">
	<metadata>
		<title>security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20230" ref_url="https://www.suse.com/security/cve/CVE-2021-20230/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0618.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0618.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20230/">CVE-2021-20230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20230">CVE-2021-20230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836032" comment="stunnel-5.56-5.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1992" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0655.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0655.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836033" comment="firefox-78.8.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1993" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0657.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0657.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836034" comment="thunderbird-78.8.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1994" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0670.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0670.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836035" comment="bind-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836036" comment="bind-chroot-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836037" comment="bind-devel-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836038" comment="bind-export-devel-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836039" comment="bind-export-libs-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836040" comment="bind-libs-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836041" comment="bind-libs-lite-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836042" comment="bind-license-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836043" comment="bind-lite-devel-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836044" comment="bind-pkcs11-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836045" comment="bind-pkcs11-devel-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836046" comment="bind-pkcs11-libs-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836047" comment="bind-pkcs11-utils-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836048" comment="bind-sdb-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836049" comment="bind-sdb-chroot-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836050" comment="bind-utils-9.11.20-5.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836051" comment="python3-bind-9.11.20-5.el8_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1995" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0696.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0696.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836052" comment="grub2-common-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836053" comment="grub2-efi-ia32-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836054" comment="grub2-efi-ia32-cdboot-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836055" comment="grub2-efi-ia32-modules-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836056" comment="grub2-efi-x64-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836057" comment="grub2-efi-x64-cdboot-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836058" comment="grub2-efi-x64-modules-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836059" comment="grub2-pc-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836060" comment="grub2-pc-modules-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836061" comment="grub2-tools-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836062" comment="grub2-tools-efi-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836063" comment="grub2-tools-extra-2.02-90.el8_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836064" comment="grub2-tools-minimal-2.02-90.el8_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1996" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20188" ref_url="https://www.suse.com/security/cve/CVE-2021-20188/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0705.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0705.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20188/">CVE-2021-20188 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20188">CVE-2021-20188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836065" comment="buildah-1.5-8.gite94b4f9.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836066" comment="container-selinux-2.124.0-1.gitf958d0c.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836067" comment="containernetworking-plugins-0.7.4-4.git9ebe139.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836068" comment="containers-common-0.1.32-6.git1715c90.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836069" comment="crit-3.12-9.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836070" comment="criu-3.12-9.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836071" comment="fuse-overlayfs-0.3-5.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836072" comment="oci-systemd-hook-0.1.15-2.git2d0b8a3.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836073" comment="oci-umount-2.3.4-2.git87f9237.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836074" comment="podman-1.0.0-8.git921f98f.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836075" comment="podman-docker-1.0.0-8.git921f98f.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836076" comment="python3-criu-3.12-9.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836077" comment="runc-1.0.0-56.rc5.dev.git2abd837.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836078" comment="skopeo-0.1.32-6.git1715c90.module+el8.3.0+10171+12421f43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836079" comment="slirp4netns-0.1-5.dev.gitc4e1bc5.module+el8.3.0+10171+12421f43 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1997" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883/" source="CVE"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0734.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0734.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22883">CVE-2021-22883 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22884">CVE-2021-22884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836080" comment="nodejs-12.21.0-1.module+el8.3.0+10191+34fb5a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836081" comment="nodejs-devel-12.21.0-1.module+el8.3.0+10191+34fb5a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836082" comment="nodejs-docs-12.21.0-1.module+el8.3.0+10191+34fb5a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836083" comment="nodejs-full-i18n-12.21.0-1.module+el8.3.0+10191+34fb5a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835975" comment="nodejs-nodemon-2.0.3-1.module+el8.3.0+9715+1718613f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836084" comment="npm-6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1998" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883/" source="CVE"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0735.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0735.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22883">CVE-2021-22883 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22884">CVE-2021-22884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836085" comment="nodejs-10.24.0-1.module+el8.3.0+10166+b07ac28e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836086" comment="nodejs-devel-10.24.0-1.module+el8.3.0+10166+b07ac28e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836087" comment="nodejs-docs-10.24.0-1.module+el8.3.0+10166+b07ac28e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836088" comment="nodejs-full-i18n-10.24.0-1.module+el8.3.0+10166+b07ac28e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832427" comment="nodejs-nodemon-1.18.3-1.module+el8+2632+6c5111ed is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832428" comment="nodejs-packaging-17-3.module+el8+2873+aa7dfd9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836089" comment="npm-6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1999" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883/" source="CVE"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0744.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0744.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22883">CVE-2021-22883 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22884">CVE-2021-22884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836090" comment="nodejs-14.16.0-2.module+el8.3.0+10180+b92e1eb6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836091" comment="nodejs-devel-14.16.0-2.module+el8.3.0+10180+b92e1eb6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836092" comment="nodejs-docs-14.16.0-2.module+el8.3.0+10180+b92e1eb6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836093" comment="nodejs-full-i18n-14.16.0-2.module+el8.3.0+10180+b92e1eb6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835981" comment="nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836094" comment="npm-6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2000" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-26701" ref_url="https://www.suse.com/security/cve/CVE-2021-26701/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0788.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0788.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26701/">CVE-2021-26701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26701">CVE-2021-26701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836095" comment="dotnet-host-fxr-2.1-2.1.26-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836096" comment="dotnet-runtime-2.1-2.1.26-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836097" comment="dotnet-sdk-2.1-2.1.522-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836098" comment="dotnet-sdk-2.1.5xx-2.1.522-1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2001" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-26701" ref_url="https://www.suse.com/security/cve/CVE-2021-26701/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0790.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0790.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26701/">CVE-2021-26701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26701">CVE-2021-26701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836099" comment="aspnetcore-runtime-3.1-3.1.13-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836100" comment="aspnetcore-targeting-pack-3.1-3.1.13-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836101" comment="dotnet-apphost-pack-3.1-3.1.13-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836102" comment="dotnet-hostfxr-3.1-3.1.13-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836103" comment="dotnet-runtime-3.1-3.1.13-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836104" comment="dotnet-sdk-3.1-3.1.113-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836105" comment="dotnet-targeting-pack-3.1-3.1.13-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836106" comment="dotnet-templates-3.1-3.1.113-1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2002" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-26701" ref_url="https://www.suse.com/security/cve/CVE-2021-26701/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0793.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0793.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26701/">CVE-2021-26701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26701">CVE-2021-26701 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836107" comment="aspnetcore-runtime-5.0-5.0.4-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836108" comment="aspnetcore-targeting-pack-5.0-5.0.4-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836109" comment="dotnet-5.0.104-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836110" comment="dotnet-apphost-pack-5.0-5.0.4-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836111" comment="dotnet-host-5.0.4-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836112" comment="dotnet-hostfxr-5.0-5.0.4-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836113" comment="dotnet-runtime-5.0-5.0.4-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836114" comment="dotnet-sdk-5.0-5.0.104-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836115" comment="dotnet-targeting-pack-5.0-5.0.4-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836116" comment="dotnet-templates-5.0-5.0.104-1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836117" comment="netstandard-targeting-pack-2.1-5.0.104-1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2003" version="1" class="patch">
	<metadata>
		<title>security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836118" comment="wpa_supplicant-2.9-2.el8_3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2004" version="1" class="patch">
	<metadata>
		<title>security update for jss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20179" ref_url="https://www.suse.com/security/cve/CVE-2021-20179/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0966.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0966.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20179/">CVE-2021-20179 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20179">CVE-2021-20179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836119" comment="jss-4.7.3-1.module+el8.3.0+8058+d5cd4219 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836120" comment="jss-javadoc-4.7.3-1.module+el8.3.0+8058+d5cd4219 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836121" comment="ldapjdk-4.22.0-1.module+el8.3.0+6784+6e1e4c62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836122" comment="ldapjdk-javadoc-4.22.0-1.module+el8.3.0+6784+6e1e4c62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836123" comment="pki-base-10.9.4-3.module+el8.3.0+10353+73f6df5b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836124" comment="pki-base-java-10.9.4-3.module+el8.3.0+10353+73f6df5b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836125" comment="pki-ca-10.9.4-3.module+el8.3.0+10353+73f6df5b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836126" comment="pki-kra-10.9.4-3.module+el8.3.0+10353+73f6df5b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836127" comment="pki-server-10.9.4-3.module+el8.3.0+10353+73f6df5b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836128" comment="pki-symkey-10.9.4-3.module+el8.3.0+10353+73f6df5b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836129" comment="pki-tools-10.9.4-3.module+el8.3.0+10353+73f6df5b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836130" comment="python3-pki-10.9.4-3.module+el8.3.0+10353+73f6df5b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836131" comment="tomcatjss-7.5.0-1.module+el8.3.0+7355+c59bcbd9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2005" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-4127" ref_url="https://www.suse.com/security/cve/CVE-2021-4127/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0990.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0990.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4127/">CVE-2021-4127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4127">CVE-2021-4127 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836132" comment="firefox-78.9.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2006" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-4127" ref_url="https://www.suse.com/security/cve/CVE-2021-4127/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0993.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0993.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4127/">CVE-2021-4127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4127">CVE-2021-4127 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836133" comment="thunderbird-78.9.0-3.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2007" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3450">CVE-2021-3450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836134" comment="openssl-1.1.1g-15.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836135" comment="openssl-devel-1.1.1g-15.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836136" comment="openssl-libs-1.1.1g-15.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836137" comment="openssl-perl-1.1.1g-15.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2008" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-21381" ref_url="https://www.suse.com/security/cve/CVE-2021-21381/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1068.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1068.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21381/">CVE-2021-21381 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21381">CVE-2021-21381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836138" comment="flatpak-1.6.2-6.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836139" comment="flatpak-libs-1.6.2-6.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836140" comment="flatpak-selinux-1.6.2-6.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836141" comment="flatpak-session-helper-1.6.2-6.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2009" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-35518" ref_url="https://www.suse.com/security/cve/CVE-2020-35518/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1086.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1086.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35518/">CVE-2020-35518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35518">CVE-2020-35518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836142" comment="389-ds-base-1.4.3.8-7.module+el8.3.0+10310+6e88d919 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836143" comment="389-ds-base-devel-1.4.3.8-7.module+el8.3.0+10310+6e88d919 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836144" comment="389-ds-base-legacy-tools-1.4.3.8-7.module+el8.3.0+10310+6e88d919 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836145" comment="389-ds-base-libs-1.4.3.8-7.module+el8.3.0+10310+6e88d919 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836146" comment="389-ds-base-snmp-1.4.3.8-7.module+el8.3.0+10310+6e88d919 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836147" comment="python3-lib389-1.4.3.8-7.module+el8.3.0+10310+6e88d919 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2010" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-27152" ref_url="https://www.suse.com/security/cve/CVE-2020-27152/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2021-26708" ref_url="https://www.suse.com/security/cve/CVE-2021-26708/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1093.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1093.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27152/">CVE-2020-27152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27152">CVE-2020-27152 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26708/">CVE-2021-26708 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26708">CVE-2021-26708 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836148" comment="bpftool-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836149" comment="kernel-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836150" comment="kernel-abi-whitelists-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836151" comment="kernel-core-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836152" comment="kernel-cross-headers-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836153" comment="kernel-debug-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836154" comment="kernel-debug-core-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836156" comment="kernel-debug-modules-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836157" comment="kernel-debug-modules-extra-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836159" comment="kernel-doc-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836160" comment="kernel-headers-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836161" comment="kernel-modules-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836162" comment="kernel-modules-extra-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836163" comment="kernel-tools-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836164" comment="kernel-tools-libs-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836166" comment="perf-4.18.0-240.22.1.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836167" comment="python3-perf-4.18.0-240.22.1.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2011" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23991" ref_url="https://www.suse.com/security/cve/CVE-2021-23991/" source="CVE"/>
		<reference ref_id="CVE-2021-23992" ref_url="https://www.suse.com/security/cve/CVE-2021-23992/" source="CVE"/>
		<reference ref_id="CVE-2021-23993" ref_url="https://www.suse.com/security/cve/CVE-2021-23993/" source="CVE"/>
		<reference ref_id="CVE-2021-29949" ref_url="https://www.suse.com/security/cve/CVE-2021-29949/" source="CVE"/>
		<reference ref_id="CVE-2021-29950" ref_url="https://www.suse.com/security/cve/CVE-2021-29950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23991/">CVE-2021-23991 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23991">CVE-2021-23991 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23992/">CVE-2021-23992 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23992">CVE-2021-23992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23993/">CVE-2021-23993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23993">CVE-2021-23993 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29949/">CVE-2021-29949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29949">CVE-2021-29949 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29950/">CVE-2021-29950 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29950">CVE-2021-29950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836168" comment="thunderbird-78.9.1-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2012" version="1" class="patch">
	<metadata>
		<title>security update for libldb (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20277">CVE-2021-20277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836169" comment="ldb-tools-2.1.3-3.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836170" comment="libldb-2.1.3-3.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836171" comment="libldb-devel-2.1.3-3.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836172" comment="python3-ldb-2.1.3-3.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2013" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1206.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1206.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836173" comment="gnutls-3.6.14-8.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836174" comment="gnutls-c++-3.6.14-8.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836175" comment="gnutls-dane-3.6.14-8.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836176" comment="gnutls-devel-3.6.14-8.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836177" comment="gnutls-utils-3.6.14-8.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836178" comment="nettle-3.4.1-4.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836179" comment="nettle-devel-3.4.1-4.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2014" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1301.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1301.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836180" comment="java-1.8.0-openjdk-1.8.0.292.b10-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836181" comment="java-1.8.0-openjdk-accessibility-1.8.0.292.b10-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836182" comment="java-1.8.0-openjdk-demo-1.8.0.292.b10-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836183" comment="java-1.8.0-openjdk-devel-1.8.0.292.b10-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836184" comment="java-1.8.0-openjdk-headless-1.8.0.292.b10-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836185" comment="java-1.8.0-openjdk-javadoc-1.8.0.292.b10-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836186" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.292.b10-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836187" comment="java-1.8.0-openjdk-src-1.8.0.292.b10-0.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2015" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1307.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1307.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836188" comment="java-11-openjdk-11.0.11.0.9-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836189" comment="java-11-openjdk-demo-11.0.11.0.9-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836190" comment="java-11-openjdk-devel-11.0.11.0.9-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836191" comment="java-11-openjdk-headless-11.0.11.0.9-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836192" comment="java-11-openjdk-javadoc-11.0.11.0.9-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836193" comment="java-11-openjdk-javadoc-zip-11.0.11.0.9-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836194" comment="java-11-openjdk-jmods-11.0.11.0.9-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836195" comment="java-11-openjdk-src-11.0.11.0.9-0.el8_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836196" comment="java-11-openjdk-static-libs-11.0.11.0.9-0.el8_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2016" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="CVE-2021-29948" ref_url="https://www.suse.com/security/cve/CVE-2021-29948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1353.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1353.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29948/">CVE-2021-29948 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29948">CVE-2021-29948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836197" comment="thunderbird-78.10.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2017" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1360.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1360.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836198" comment="firefox-78.10.0-1.el8_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2018" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20297" ref_url="https://www.suse.com/security/cve/CVE-2021-20297/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1574.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1574.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20297/">CVE-2021-20297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20297">CVE-2021-20297 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836199" comment="NetworkManager-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836200" comment="NetworkManager-adsl-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836201" comment="NetworkManager-bluetooth-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836202" comment="NetworkManager-cloud-setup-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836203" comment="NetworkManager-config-connectivity-suse-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836204" comment="NetworkManager-config-server-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836205" comment="NetworkManager-dispatcher-routing-rules-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836206" comment="NetworkManager-libnm-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836207" comment="NetworkManager-libnm-devel-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836208" comment="NetworkManager-ovs-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836209" comment="NetworkManager-ppp-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836210" comment="NetworkManager-team-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836211" comment="NetworkManager-tui-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836212" comment="NetworkManager-wifi-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836213" comment="NetworkManager-wwan-1.30.0-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836214" comment="libnma-1.8.30-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836215" comment="libnma-devel-1.8.30-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2019" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114/" source="CVE"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-24394" ref_url="https://www.suse.com/security/cve/CVE-2020-24394/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-35508" ref_url="https://www.suse.com/security/cve/CVE-2020-35508/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2020-36557" ref_url="https://www.suse.com/security/cve/CVE-2020-36557/" source="CVE"/>
		<reference ref_id="CVE-2020-36694" ref_url="https://www.suse.com/security/cve/CVE-2020-36694/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2023-1390" ref_url="https://www.suse.com/security/cve/CVE-2023-1390/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1578.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1578.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18811">CVE-2019-18811 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19528">CVE-2019-19528 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12114">CVE-2020-12114 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12362">CVE-2020-12362 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12363">CVE-2020-12363 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12364">CVE-2020-12364 at NVD</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12464">CVE-2020-12464 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14356">CVE-2020-14356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24394/">CVE-2020-24394 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24394">CVE-2020-24394 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25704">CVE-2020-25704 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-35508/">CVE-2020-35508 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35508">CVE-2020-35508 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36557/">CVE-2020-36557 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36557">CVE-2020-36557 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36694/">CVE-2020-36694 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36694">CVE-2020-36694 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0342">CVE-2021-0342 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3428">CVE-2021-3428 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1390/">CVE-2023-1390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1390">CVE-2023-1390 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836216" comment="bpftool-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836217" comment="kernel-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836218" comment="kernel-abi-stablelists-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836219" comment="kernel-core-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836220" comment="kernel-cross-headers-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836221" comment="kernel-debug-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836222" comment="kernel-debug-core-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836224" comment="kernel-debug-modules-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836225" comment="kernel-debug-modules-extra-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836227" comment="kernel-doc-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836228" comment="kernel-headers-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836229" comment="kernel-modules-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836230" comment="kernel-modules-extra-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836231" comment="kernel-tools-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836232" comment="kernel-tools-libs-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836234" comment="perf-4.18.0-305.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836235" comment="python3-perf-4.18.0-305.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2020" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1581.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1581.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836236" comment="lemon-3.26.0-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836237" comment="sqlite-3.26.0-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836238" comment="sqlite-devel-3.26.0-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836239" comment="sqlite-doc-3.26.0-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836240" comment="sqlite-libs-3.26.0-13.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2021" version="1" class="patch">
	<metadata>
		<title>security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836241" comment="cpio-2.12-10.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2022" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10228">CVE-2016-10228 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27618">CVE-2020-27618 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3326">CVE-2021-3326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836242" comment="compat-libpthread-nonshared-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836243" comment="glibc-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836244" comment="glibc-all-langpacks-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836245" comment="glibc-benchtests-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836246" comment="glibc-common-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836247" comment="glibc-devel-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836248" comment="glibc-headers-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836249" comment="glibc-langpack-aa-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836250" comment="glibc-langpack-af-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836251" comment="glibc-langpack-agr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836252" comment="glibc-langpack-ak-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836253" comment="glibc-langpack-am-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836254" comment="glibc-langpack-an-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836255" comment="glibc-langpack-anp-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836256" comment="glibc-langpack-ar-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836257" comment="glibc-langpack-as-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836258" comment="glibc-langpack-ast-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836259" comment="glibc-langpack-ayc-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836260" comment="glibc-langpack-az-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836261" comment="glibc-langpack-be-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836262" comment="glibc-langpack-bem-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836263" comment="glibc-langpack-ber-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836264" comment="glibc-langpack-bg-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836265" comment="glibc-langpack-bhb-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836266" comment="glibc-langpack-bho-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836267" comment="glibc-langpack-bi-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836268" comment="glibc-langpack-bn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836269" comment="glibc-langpack-bo-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836270" comment="glibc-langpack-br-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836271" comment="glibc-langpack-brx-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836272" comment="glibc-langpack-bs-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836273" comment="glibc-langpack-byn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836274" comment="glibc-langpack-ca-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836275" comment="glibc-langpack-ce-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836276" comment="glibc-langpack-chr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836277" comment="glibc-langpack-cmn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836278" comment="glibc-langpack-crh-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836279" comment="glibc-langpack-cs-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836280" comment="glibc-langpack-csb-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836281" comment="glibc-langpack-cv-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836282" comment="glibc-langpack-cy-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836283" comment="glibc-langpack-da-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836284" comment="glibc-langpack-de-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836285" comment="glibc-langpack-doi-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836286" comment="glibc-langpack-dsb-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836287" comment="glibc-langpack-dv-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836288" comment="glibc-langpack-dz-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836289" comment="glibc-langpack-el-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836290" comment="glibc-langpack-en-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836291" comment="glibc-langpack-eo-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836292" comment="glibc-langpack-es-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836293" comment="glibc-langpack-et-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836294" comment="glibc-langpack-eu-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836295" comment="glibc-langpack-fa-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836296" comment="glibc-langpack-ff-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836297" comment="glibc-langpack-fi-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836298" comment="glibc-langpack-fil-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836299" comment="glibc-langpack-fo-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836300" comment="glibc-langpack-fr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836301" comment="glibc-langpack-fur-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836302" comment="glibc-langpack-fy-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836303" comment="glibc-langpack-ga-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836304" comment="glibc-langpack-gd-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836305" comment="glibc-langpack-gez-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836306" comment="glibc-langpack-gl-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836307" comment="glibc-langpack-gu-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836308" comment="glibc-langpack-gv-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836309" comment="glibc-langpack-ha-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836310" comment="glibc-langpack-hak-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836311" comment="glibc-langpack-he-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836312" comment="glibc-langpack-hi-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836313" comment="glibc-langpack-hif-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836314" comment="glibc-langpack-hne-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836315" comment="glibc-langpack-hr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836316" comment="glibc-langpack-hsb-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836317" comment="glibc-langpack-ht-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836318" comment="glibc-langpack-hu-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836319" comment="glibc-langpack-hy-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836320" comment="glibc-langpack-ia-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836321" comment="glibc-langpack-id-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836322" comment="glibc-langpack-ig-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836323" comment="glibc-langpack-ik-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836324" comment="glibc-langpack-is-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836325" comment="glibc-langpack-it-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836326" comment="glibc-langpack-iu-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836327" comment="glibc-langpack-ja-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836328" comment="glibc-langpack-ka-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836329" comment="glibc-langpack-kab-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836330" comment="glibc-langpack-kk-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836331" comment="glibc-langpack-kl-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836332" comment="glibc-langpack-km-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836333" comment="glibc-langpack-kn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836334" comment="glibc-langpack-ko-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836335" comment="glibc-langpack-kok-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836336" comment="glibc-langpack-ks-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836337" comment="glibc-langpack-ku-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836338" comment="glibc-langpack-kw-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836339" comment="glibc-langpack-ky-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836340" comment="glibc-langpack-lb-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836341" comment="glibc-langpack-lg-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836342" comment="glibc-langpack-li-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836343" comment="glibc-langpack-lij-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836344" comment="glibc-langpack-ln-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836345" comment="glibc-langpack-lo-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836346" comment="glibc-langpack-lt-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836347" comment="glibc-langpack-lv-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836348" comment="glibc-langpack-lzh-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836349" comment="glibc-langpack-mag-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836350" comment="glibc-langpack-mai-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836351" comment="glibc-langpack-mfe-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836352" comment="glibc-langpack-mg-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836353" comment="glibc-langpack-mhr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836354" comment="glibc-langpack-mi-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836355" comment="glibc-langpack-miq-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836356" comment="glibc-langpack-mjw-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836357" comment="glibc-langpack-mk-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836358" comment="glibc-langpack-ml-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836359" comment="glibc-langpack-mn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836360" comment="glibc-langpack-mni-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836361" comment="glibc-langpack-mr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836362" comment="glibc-langpack-ms-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836363" comment="glibc-langpack-mt-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836364" comment="glibc-langpack-my-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836365" comment="glibc-langpack-nan-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836366" comment="glibc-langpack-nb-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836367" comment="glibc-langpack-nds-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836368" comment="glibc-langpack-ne-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836369" comment="glibc-langpack-nhn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836370" comment="glibc-langpack-niu-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836371" comment="glibc-langpack-nl-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836372" comment="glibc-langpack-nn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836373" comment="glibc-langpack-nr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836374" comment="glibc-langpack-nso-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836375" comment="glibc-langpack-oc-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836376" comment="glibc-langpack-om-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836377" comment="glibc-langpack-or-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836378" comment="glibc-langpack-os-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836379" comment="glibc-langpack-pa-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836380" comment="glibc-langpack-pap-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836381" comment="glibc-langpack-pl-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836382" comment="glibc-langpack-ps-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836383" comment="glibc-langpack-pt-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836384" comment="glibc-langpack-quz-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836385" comment="glibc-langpack-raj-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836386" comment="glibc-langpack-ro-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836387" comment="glibc-langpack-ru-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836388" comment="glibc-langpack-rw-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836389" comment="glibc-langpack-sa-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836390" comment="glibc-langpack-sah-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836391" comment="glibc-langpack-sat-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836392" comment="glibc-langpack-sc-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836393" comment="glibc-langpack-sd-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836394" comment="glibc-langpack-se-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836395" comment="glibc-langpack-sgs-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836396" comment="glibc-langpack-shn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836397" comment="glibc-langpack-shs-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836398" comment="glibc-langpack-si-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836399" comment="glibc-langpack-sid-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836400" comment="glibc-langpack-sk-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836401" comment="glibc-langpack-sl-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836402" comment="glibc-langpack-sm-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836403" comment="glibc-langpack-so-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836404" comment="glibc-langpack-sq-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836405" comment="glibc-langpack-sr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836406" comment="glibc-langpack-ss-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836407" comment="glibc-langpack-st-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836408" comment="glibc-langpack-sv-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836409" comment="glibc-langpack-sw-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836410" comment="glibc-langpack-szl-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836411" comment="glibc-langpack-ta-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836412" comment="glibc-langpack-tcy-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836413" comment="glibc-langpack-te-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836414" comment="glibc-langpack-tg-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836415" comment="glibc-langpack-th-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836416" comment="glibc-langpack-the-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836417" comment="glibc-langpack-ti-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836418" comment="glibc-langpack-tig-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836419" comment="glibc-langpack-tk-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836420" comment="glibc-langpack-tl-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836421" comment="glibc-langpack-tn-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836422" comment="glibc-langpack-to-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836423" comment="glibc-langpack-tpi-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836424" comment="glibc-langpack-tr-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836425" comment="glibc-langpack-ts-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836426" comment="glibc-langpack-tt-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836427" comment="glibc-langpack-ug-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836428" comment="glibc-langpack-uk-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836429" comment="glibc-langpack-unm-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836430" comment="glibc-langpack-ur-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836431" comment="glibc-langpack-uz-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836432" comment="glibc-langpack-ve-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836433" comment="glibc-langpack-vi-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836434" comment="glibc-langpack-wa-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836435" comment="glibc-langpack-wae-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836436" comment="glibc-langpack-wal-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836437" comment="glibc-langpack-wo-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836438" comment="glibc-langpack-xh-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836439" comment="glibc-langpack-yi-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836440" comment="glibc-langpack-yo-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836441" comment="glibc-langpack-yue-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836442" comment="glibc-langpack-yuw-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836443" comment="glibc-langpack-zh-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836444" comment="glibc-langpack-zu-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836445" comment="glibc-locale-source-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836446" comment="glibc-minimal-langpack-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836447" comment="glibc-nss-devel-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836448" comment="glibc-static-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836449" comment="glibc-utils-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836450" comment="libnsl-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836451" comment="nscd-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836452" comment="nss_db-2.28-151.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836453" comment="nss_hesiod-2.28-151.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2023" version="1" class="patch">
	<metadata>
		<title>Moderate: GNOME security, bug fix, and enhancement update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2021:1586. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2021:1586		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836454" comment="OpenEXR-devel-2.2.0-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836455" comment="OpenEXR-libs-2.2.0-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836456" comment="accountsservice-0.6.55-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836457" comment="accountsservice-devel-0.6.55-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836458" comment="accountsservice-libs-0.6.55-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836459" comment="atkmm-2.24.2-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836460" comment="atkmm-devel-2.24.2-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836461" comment="atkmm-doc-2.24.2-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836462" comment="cairomm-1.12.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836463" comment="cairomm-devel-1.12.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836464" comment="cairomm-doc-1.12.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836465" comment="chrome-gnome-shell-10.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836466" comment="dleyna-core-0.6.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836467" comment="dleyna-server-0.6.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836468" comment="enchant2-2.2.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836469" comment="enchant2-devel-2.2.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836470" comment="gamin-0.1.10-32.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836471" comment="gamin-devel-0.1.10-32.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836472" comment="gdm-3.28.3-39.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836473" comment="geoclue2-2.5.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836474" comment="geoclue2-demos-2.5.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836475" comment="geoclue2-devel-2.5.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836476" comment="geoclue2-libs-2.5.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836477" comment="geocode-glib-3.26.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836478" comment="geocode-glib-devel-3.26.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836479" comment="gjs-1.56.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836480" comment="gjs-devel-1.56.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836481" comment="glib2-2.56.4-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836482" comment="glib2-devel-2.56.4-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836483" comment="glib2-doc-2.56.4-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836484" comment="glib2-fam-2.56.4-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836485" comment="glib2-static-2.56.4-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836486" comment="glib2-tests-2.56.4-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836487" comment="glibmm24-2.56.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836488" comment="glibmm24-devel-2.56.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836489" comment="glibmm24-doc-2.56.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836490" comment="gnome-boxes-3.36.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836491" comment="gnome-classic-session-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836492" comment="gnome-control-center-3.28.2-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836493" comment="gnome-control-center-filesystem-3.28.2-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836494" comment="gnome-online-accounts-3.28.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836495" comment="gnome-online-accounts-devel-3.28.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836496" comment="gnome-photos-3.28.1-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836497" comment="gnome-photos-tests-3.28.1-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836498" comment="gnome-settings-daemon-3.32.0-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836499" comment="gnome-shell-3.32.2-30.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836500" comment="gnome-shell-extension-apps-menu-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836501" comment="gnome-shell-extension-auto-move-windows-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836502" comment="gnome-shell-extension-common-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836503" comment="gnome-shell-extension-dash-to-dock-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836504" comment="gnome-shell-extension-desktop-icons-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836505" comment="gnome-shell-extension-disable-screenshield-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836506" comment="gnome-shell-extension-drive-menu-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836507" comment="gnome-shell-extension-horizontal-workspaces-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836508" comment="gnome-shell-extension-launch-new-instance-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836509" comment="gnome-shell-extension-native-window-placement-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836510" comment="gnome-shell-extension-no-hot-corner-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836511" comment="gnome-shell-extension-panel-favorites-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836512" comment="gnome-shell-extension-places-menu-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836513" comment="gnome-shell-extension-screenshot-window-sizer-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836514" comment="gnome-shell-extension-systemMonitor-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836515" comment="gnome-shell-extension-top-icons-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836516" comment="gnome-shell-extension-updates-dialog-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836517" comment="gnome-shell-extension-user-theme-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836518" comment="gnome-shell-extension-window-grouper-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836519" comment="gnome-shell-extension-window-list-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836520" comment="gnome-shell-extension-windowsNavigator-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836521" comment="gnome-shell-extension-workspace-indicator-3.32.1-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836522" comment="gnome-software-3.36.1-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836523" comment="gnome-terminal-3.28.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836524" comment="gnome-terminal-nautilus-3.28.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836525" comment="gtk-doc-1.28-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836526" comment="gtk2-2.24.32-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836527" comment="gtk2-devel-2.24.32-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836528" comment="gtk2-devel-docs-2.24.32-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836529" comment="gtk2-immodule-xim-2.24.32-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836530" comment="gtk2-immodules-2.24.32-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836531" comment="gtkmm24-2.24.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836532" comment="gtkmm24-devel-2.24.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836533" comment="gtkmm24-docs-2.24.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836534" comment="gtkmm30-3.22.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836535" comment="gtkmm30-devel-3.22.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836536" comment="gtkmm30-doc-3.22.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836537" comment="gvfs-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836538" comment="gvfs-afc-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836539" comment="gvfs-afp-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836540" comment="gvfs-archive-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836541" comment="gvfs-client-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836542" comment="gvfs-devel-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836543" comment="gvfs-fuse-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836544" comment="gvfs-goa-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836545" comment="gvfs-gphoto2-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836546" comment="gvfs-mtp-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836547" comment="gvfs-smb-1.36.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836548" comment="libdazzle-3.28.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836549" comment="libdazzle-devel-3.28.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836550" comment="libepubgen-0.1.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836551" comment="libepubgen-devel-0.1.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836552" comment="libsass-3.4.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836553" comment="libsass-devel-3.4.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836554" comment="libsigc++20-2.10.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836555" comment="libsigc++20-devel-2.10.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836556" comment="libsigc++20-doc-2.10.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836557" comment="libvisual-0.4.0-25.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836558" comment="libvisual-devel-0.4.0-25.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836559" comment="mutter-3.32.2-57.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836560" comment="mutter-devel-3.32.2-57.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836561" comment="nautilus-3.28.1-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836562" comment="nautilus-devel-3.28.1-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836563" comment="nautilus-extensions-3.28.1-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836564" comment="pangomm-2.40.1-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836565" comment="pangomm-devel-2.40.1-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836566" comment="pangomm-doc-2.40.1-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836567" comment="soundtouch-2.0.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836568" comment="soundtouch-devel-2.0.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836569" comment="vala-0.40.19-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836570" comment="vala-devel-0.40.19-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836571" comment="webkit2gtk3-2.30.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836572" comment="webkit2gtk3-devel-2.30.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836573" comment="webkit2gtk3-jsc-2.30.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836574" comment="webkit2gtk3-jsc-devel-2.30.4-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836575" comment="woff2-1.0.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836576" comment="woff2-devel-1.0.2-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2024" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1593.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1593.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836577" comment="krb5-devel-1.18.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836578" comment="krb5-libs-1.18.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836579" comment="krb5-pkinit-1.18.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836580" comment="krb5-server-1.18.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836581" comment="krb5-server-ldap-1.18.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836582" comment="krb5-workstation-1.18.2-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836583" comment="libkadm5-1.18.2-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2025" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1597.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1597.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836584" comment="libxml2-2.9.7-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836585" comment="libxml2-devel-2.9.7-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836586" comment="python3-libxml2-2.9.7-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2026" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-27153" ref_url="https://www.suse.com/security/cve/CVE-2020-27153/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1598.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1598.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-27153/">CVE-2020-27153 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27153">CVE-2020-27153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836587" comment="bluez-5.52-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836588" comment="bluez-cups-5.52-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836589" comment="bluez-hid2hci-5.52-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836590" comment="bluez-libs-5.52-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836591" comment="bluez-libs-devel-5.52-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836592" comment="bluez-obexd-5.52-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2027" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26570" ref_url="https://www.suse.com/security/cve/CVE-2020-26570/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26570/">CVE-2020-26570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26570">CVE-2020-26570 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26571">CVE-2020-26571 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26572">CVE-2020-26572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836593" comment="opensc-0.20.0-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2028" version="1" class="patch">
	<metadata>
		<title>security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1608.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1608.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36242">CVE-2020-36242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836594" comment="python3-cryptography-3.2.1-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2029" version="1" class="patch">
	<metadata>
		<title>security update for p11-kit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="CVE-2020-29362" ref_url="https://www.suse.com/security/cve/CVE-2020-29362/" source="CVE"/>
		<reference ref_id="CVE-2020-29363" ref_url="https://www.suse.com/security/cve/CVE-2020-29363/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1609.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1609.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29361">CVE-2020-29361 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29362/">CVE-2020-29362 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29362">CVE-2020-29362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29363/">CVE-2020-29363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29363">CVE-2020-29363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836595" comment="p11-kit-0.23.22-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836596" comment="p11-kit-devel-0.23.22-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836597" comment="p11-kit-server-0.23.22-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836598" comment="p11-kit-trust-0.23.22-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2030" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<reference ref_id="CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1610.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1610.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8286">CVE-2020-8286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836599" comment="curl-7.61.1-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836600" comment="libcurl-7.61.1-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836601" comment="libcurl-devel-7.61.1-18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836602" comment="libcurl-minimal-7.61.1-18.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2031" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2020-13776" ref_url="https://www.suse.com/security/cve/CVE-2020-13776/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1611.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1611.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3842">CVE-2019-3842 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13776/">CVE-2020-13776 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13776">CVE-2020-13776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836603" comment="systemd-239-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836604" comment="systemd-container-239-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836605" comment="systemd-devel-239-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836606" comment="systemd-journal-remote-239-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836607" comment="systemd-libs-239-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836608" comment="systemd-pam-239-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836609" comment="systemd-tests-239-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836610" comment="systemd-udev-239-45.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2032" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1620.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1620.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12362">CVE-2020-12362 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12363">CVE-2020-12363 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12364">CVE-2020-12364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836611" comment="iwl100-firmware-39.31.5.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836612" comment="iwl1000-firmware-39.31.5.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836613" comment="iwl105-firmware-18.168.6.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836614" comment="iwl135-firmware-18.168.6.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836615" comment="iwl2000-firmware-18.168.6.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836616" comment="iwl2030-firmware-18.168.6.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836617" comment="iwl3160-firmware-25.30.13.0-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836618" comment="iwl3945-firmware-15.32.2.9-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836619" comment="iwl4965-firmware-228.61.2.24-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836620" comment="iwl5000-firmware-8.83.5.1_1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836621" comment="iwl5150-firmware-8.24.2.2-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836622" comment="iwl6000-firmware-9.221.4.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836623" comment="iwl6000g2a-firmware-18.168.6.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836624" comment="iwl6000g2b-firmware-18.168.6.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836625" comment="iwl6050-firmware-41.28.5.1-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836626" comment="iwl7260-firmware-25.30.13.0-102.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836627" comment="libertas-sd8686-firmware-20201218-102.git05789708.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836628" comment="libertas-sd8787-firmware-20201218-102.git05789708.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836629" comment="libertas-usb8388-firmware-20201218-102.git05789708.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836630" comment="libertas-usb8388-olpc-firmware-20201218-102.git05789708.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836631" comment="linux-firmware-20201218-102.git05789708.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2033" version="1" class="patch">
	<metadata>
		<title>security update for trousers (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24330" ref_url="https://www.suse.com/security/cve/CVE-2020-24330/" source="CVE"/>
		<reference ref_id="CVE-2020-24331" ref_url="https://www.suse.com/security/cve/CVE-2020-24331/" source="CVE"/>
		<reference ref_id="CVE-2020-24332" ref_url="https://www.suse.com/security/cve/CVE-2020-24332/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1627.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1627.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24330/">CVE-2020-24330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24330">CVE-2020-24330 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24331/">CVE-2020-24331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24331">CVE-2020-24331 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24332/">CVE-2020-24332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24332">CVE-2020-24332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836632" comment="trousers-0.3.15-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836633" comment="trousers-devel-0.3.15-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836634" comment="trousers-lib-0.3.15-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2034" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1631.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1631.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836635" comment="python3-urllib3-1.24.2-5.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2035" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1633.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1633.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836636" comment="platform-python-3.6.8-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836637" comment="platform-python-debug-3.6.8-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836638" comment="platform-python-devel-3.6.8-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836639" comment="python3-idle-3.6.8-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836640" comment="python3-libs-3.6.8-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836641" comment="python3-test-3.6.8-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836642" comment="python3-tkinter-3.6.8-37.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2036" version="1" class="patch">
	<metadata>
		<title>security update for openchange (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1647.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1647.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836643" comment="ctdb-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836644" comment="ctdb-tests-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836645" comment="libsmbclient-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836646" comment="libsmbclient-devel-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836647" comment="libwbclient-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836648" comment="libwbclient-devel-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836649" comment="openchange-2.3-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836650" comment="python3-samba-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836651" comment="python3-samba-test-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836652" comment="samba-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836653" comment="samba-client-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836654" comment="samba-client-libs-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836655" comment="samba-common-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836656" comment="samba-common-libs-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836657" comment="samba-common-tools-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836658" comment="samba-devel-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836659" comment="samba-krb5-printing-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836660" comment="samba-libs-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836661" comment="samba-pidl-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836662" comment="samba-test-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836663" comment="samba-test-libs-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836664" comment="samba-winbind-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836665" comment="samba-winbind-clients-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836666" comment="samba-winbind-krb5-locator-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836667" comment="samba-winbind-modules-4.13.3-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836668" comment="samba-winexe-4.13.3-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2037" version="1" class="patch">
	<metadata>
		<title>security update for libdb (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-2708" ref_url="https://www.suse.com/security/cve/CVE-2019-2708/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1675.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1675.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2708/">CVE-2019-2708 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2708">CVE-2019-2708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836669" comment="libdb-5.3.28-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836670" comment="libdb-cxx-5.3.28-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836671" comment="libdb-cxx-devel-5.3.28-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836672" comment="libdb-devel-5.3.28-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836673" comment="libdb-devel-doc-5.3.28-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836674" comment="libdb-sql-5.3.28-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836675" comment="libdb-sql-devel-5.3.28-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836676" comment="libdb-utils-5.3.28-40.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2038" version="1" class="patch">
	<metadata>
		<title>security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1678.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1678.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836677" comment="perl-5.26.3-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836678" comment="perl-Attribute-Handlers-0.99-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836679" comment="perl-Devel-Peek-1.26-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836680" comment="perl-Devel-SelfStubber-1.06-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836681" comment="perl-Errno-1.28-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836682" comment="perl-ExtUtils-Embed-1.34-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836683" comment="perl-ExtUtils-Miniperl-1.06-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836684" comment="perl-IO-1.38-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836685" comment="perl-IO-Zlib-1.10-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836686" comment="perl-Locale-Maketext-Simple-0.21-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836687" comment="perl-Math-Complex-1.59-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836688" comment="perl-Memoize-1.03-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836689" comment="perl-Module-Loaded-0.08-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836690" comment="perl-Net-Ping-2.55-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836691" comment="perl-Pod-Html-1.22.02-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836692" comment="perl-SelfLoader-1.23-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836693" comment="perl-Test-1.30-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836694" comment="perl-Time-Piece-1.31-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836695" comment="perl-devel-5.26.3-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836696" comment="perl-interpreter-5.26.3-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836697" comment="perl-libnetcfg-5.26.3-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836698" comment="perl-libs-5.26.3-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836699" comment="perl-macros-5.26.3-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836700" comment="perl-open-1.11-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836701" comment="perl-tests-5.26.3-419.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836702" comment="perl-utils-5.26.3-419.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2039" version="1" class="patch">
	<metadata>
		<title>security update for bash (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18276" ref_url="https://www.suse.com/security/cve/CVE-2019-18276/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1679.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1679.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18276/">CVE-2019-18276 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18276">CVE-2019-18276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836703" comment="bash-4.4.19-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836704" comment="bash-doc-4.4.19-14.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2040" version="1" class="patch">
	<metadata>
		<title>security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1686.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1686.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836705" comment="wpa_supplicant-2.9-5.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2041" version="1" class="patch">
	<metadata>
		<title>security update for brotli (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836706" comment="brotli-1.0.6-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836707" comment="brotli-devel-1.0.6-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836708" comment="python3-brotli-1.0.6-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2042" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1723.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1723.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836709" comment="sudo-1.8.29-7.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2043" version="1" class="patch">
	<metadata>
		<title>security update for sane-backends (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1744.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1744.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12867">CVE-2020-12867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836710" comment="sane-backends-1.0.27-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836711" comment="sane-backends-daemon-1.0.27-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836712" comment="sane-backends-devel-1.0.27-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836713" comment="sane-backends-doc-1.0.27-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836714" comment="sane-backends-drivers-cameras-1.0.27-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836715" comment="sane-backends-drivers-scanners-1.0.27-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836716" comment="sane-backends-libs-1.0.27-22.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2044" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3114" ref_url="https://www.suse.com/security/cve/CVE-2021-3114/" source="CVE"/>
		<reference ref_id="CVE-2021-3115" ref_url="https://www.suse.com/security/cve/CVE-2021-3115/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1746.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1746.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3114/">CVE-2021-3114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3114">CVE-2021-3114 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3115/">CVE-2021-3115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3115">CVE-2021-3115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836717" comment="delve-1.5.0-2.module+el8.4.0+8864+58b0fcdb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836718" comment="go-toolset-1.15.7-1.module+el8.4.0+9580+3b0e6c24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836719" comment="golang-1.15.7-1.module+el8.4.0+9580+3b0e6c24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836720" comment="golang-bin-1.15.7-1.module+el8.4.0+9580+3b0e6c24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836721" comment="golang-docs-1.15.7-1.module+el8.4.0+9580+3b0e6c24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836722" comment="golang-misc-1.15.7-1.module+el8.4.0+9580+3b0e6c24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836723" comment="golang-race-1.15.7-1.module+el8.4.0+9580+3b0e6c24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836724" comment="golang-src-1.15.7-1.module+el8.4.0+9580+3b0e6c24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836725" comment="golang-tests-1.15.7-1.module+el8.4.0+9580+3b0e6c24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2045" version="1" class="patch">
	<metadata>
		<title>security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108/" source="CVE"/>
		<reference ref_id="CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1751.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1751.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12108">CVE-2020-12108 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15011">CVE-2020-15011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836726" comment="mailman-2.1.29-11.module+el8.4.0+8277+5e2c6e6e is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2046" version="1" class="patch">
	<metadata>
		<title>security update for evolution (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16117" ref_url="https://www.suse.com/security/cve/CVE-2020-16117/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1752.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1752.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16117/">CVE-2020-16117 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16117">CVE-2020-16117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836727" comment="evolution-3.28.5-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836728" comment="evolution-bogofilter-3.28.5-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836729" comment="evolution-data-server-3.28.5-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836730" comment="evolution-data-server-devel-3.28.5-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836731" comment="evolution-data-server-doc-3.28.5-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836732" comment="evolution-data-server-langpacks-3.28.5-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836733" comment="evolution-data-server-perl-3.28.5-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836734" comment="evolution-data-server-tests-3.28.5-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836735" comment="evolution-devel-3.28.5-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836736" comment="evolution-ews-3.28.5-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836737" comment="evolution-ews-langpacks-3.28.5-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836738" comment="evolution-help-3.28.5-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836739" comment="evolution-langpacks-3.28.5-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836740" comment="evolution-pst-3.28.5-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836741" comment="evolution-spamassassin-3.28.5-16.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2047" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1756.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1756.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836742" comment="qt5-qtbase-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836743" comment="qt5-qtbase-common-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836744" comment="qt5-qtbase-devel-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836745" comment="qt5-qtbase-examples-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836746" comment="qt5-qtbase-gui-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836747" comment="qt5-qtbase-mysql-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836748" comment="qt5-qtbase-odbc-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836749" comment="qt5-qtbase-postgresql-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836750" comment="qt5-qtbase-private-devel-5.12.5-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836751" comment="qt5-qtbase-static-5.12.5-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2048" version="1" class="patch">
	<metadata>
		<title>security update for exiv2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17402" ref_url="https://www.suse.com/security/cve/CVE-2019-17402/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1758.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1758.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17402/">CVE-2019-17402 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17402">CVE-2019-17402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836752" comment="exiv2-0.27.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836753" comment="exiv2-devel-0.27.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836754" comment="exiv2-doc-0.27.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836755" comment="exiv2-libs-0.27.3-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2049" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1761.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1761.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832448" comment="babel-2.5.1-9.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832449" comment="python-nose-docs-1.3.7-30.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835513" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836756" comment="python2-2.7.18-4.module+el8.4.0+9577+0b56c8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832456" comment="python2-babel-2.5.1-9.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836757" comment="python2-backports-1.0-16.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836758" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832459" comment="python2-bson-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836759" comment="python2-debug-2.7.18-4.module+el8.4.0+9577+0b56c8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836760" comment="python2-devel-2.7.18-4.module+el8.4.0+9577+0b56c8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832471" comment="python2-jinja2-2.10-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836761" comment="python2-libs-2.7.18-4.module+el8.4.0+9577+0b56c8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836762" comment="python2-lxml-4.2.3-4.module+el8.4.0+9319+a932af88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832476" comment="python2-nose-1.3.7-30.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836763" comment="python2-numpy-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836764" comment="python2-numpy-doc-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836765" comment="python2-numpy-f2py-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835518" comment="python2-pip-9.0.3-18.module+el8.3.0+7707+eb4bba01 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835519" comment="python2-pip-wheel-9.0.3-18.module+el8.3.0+7707+eb4bba01 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832487" comment="python2-pygments-2.2.0-20.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832488" comment="python2-pymongo-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832489" comment="python2-pymongo-gridfs-3.6.1-11.module+el8.1.0+3446+c3d52da3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832497" comment="python2-scipy-1.0.0-20.module+el8.1.0+3323+7ac3e00f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836766" comment="python2-setuptools-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836767" comment="python2-setuptools-wheel-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836768" comment="python2-six-1.11.0-6.module+el8.4.0+9287+299307c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835522" comment="python2-sqlalchemy-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836769" comment="python2-test-2.7.18-4.module+el8.4.0+9577+0b56c8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836770" comment="python2-tkinter-2.7.18-4.module+el8.4.0+9577+0b56c8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836771" comment="python2-tools-2.7.18-4.module+el8.4.0+9577+0b56c8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836772" comment="python2-urllib3-1.24.2-3.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832507" comment="python2-virtualenv-15.1.0-19.module+el8.1.0+3507+d69c168d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832508" comment="python2-wheel-0.31.1-2.module+el8.1.0+3725+aac5cd17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832509" comment="python2-wheel-wheel-0.31.1-2.module+el8.1.0+3725+aac5cd17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2050" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-collections (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1695" ref_url="https://www.suse.com/security/cve/CVE-2020-1695/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1775.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1775.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1695/">CVE-2020-1695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1695">CVE-2020-1695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833840" comment="apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833841" comment="apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836773" comment="apache-commons-net-3.6-3.module+el8.3.0+6805+72837426 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833842" comment="bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833843" comment="glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833844" comment="glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833845" comment="glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833846" comment="glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833847" comment="glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833848" comment="jackson-annotations-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833849" comment="jackson-core-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833850" comment="jackson-databind-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833851" comment="jackson-jaxrs-json-provider-2.9.9-1.module+el8.1.0+3832+9784644d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833852" comment="jackson-jaxrs-providers-2.9.9-1.module+el8.1.0+3832+9784644d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833853" comment="jackson-module-jaxb-annotations-2.7.6-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833854" comment="jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833855" comment="javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833856" comment="javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836774" comment="jss-4.8.1-2.module+el8.4.0+10451+3e5b5448 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836775" comment="jss-javadoc-4.8.1-2.module+el8.4.0+10451+3e5b5448 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836121" comment="ldapjdk-4.22.0-1.module+el8.3.0+6784+6e1e4c62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836122" comment="ldapjdk-javadoc-4.22.0-1.module+el8.3.0+6784+6e1e4c62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836776" comment="pki-acme-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836777" comment="pki-base-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836778" comment="pki-base-java-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836779" comment="pki-ca-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836780" comment="pki-kra-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836781" comment="pki-server-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836782" comment="pki-servlet-4.0-api-9.0.30-1.module+el8.3.0+6730+8f9c6254 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836783" comment="pki-servlet-engine-9.0.30-1.module+el8.3.0+6730+8f9c6254 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836784" comment="pki-symkey-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836785" comment="pki-tools-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833870" comment="python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833871" comment="python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836786" comment="python3-pki-10.10.5-2.module+el8.4.0+10466+9830f79e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833873" comment="relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836787" comment="resteasy-3.0.26-6.module+el8.4.0+8891+bb8828ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833875" comment="slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833876" comment="slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836788" comment="stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836789" comment="tomcatjss-7.6.1-1.module+el8.4.0+8778+d07929ff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833879" comment="velocity-1.7-24.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833880" comment="xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833881" comment="xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833882" comment="xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833883" comment="xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836790" comment="xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833885" comment="xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2051" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1783.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1783.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26117">CVE-2020-26117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836791" comment="tigervnc-1.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836792" comment="tigervnc-icons-1.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836793" comment="tigervnc-license-1.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836794" comment="tigervnc-selinux-1.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836795" comment="tigervnc-server-1.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836796" comment="tigervnc-server-minimal-1.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836797" comment="tigervnc-server-module-1.11.0-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2052" version="1" class="patch">
	<metadata>
		<title>security update for gssdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12695" ref_url="https://www.suse.com/security/cve/CVE-2020-12695/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1789.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1789.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12695/">CVE-2020-12695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12695">CVE-2020-12695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836798" comment="gssdp-1.0.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836799" comment="gssdp-devel-1.0.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836800" comment="gssdp-docs-1.0.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836801" comment="gupnp-1.0.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836802" comment="gupnp-devel-1.0.6-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2053" version="1" class="patch">
	<metadata>
		<title>security update for spice-vdagent (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25650" ref_url="https://www.suse.com/security/cve/CVE-2020-25650/" source="CVE"/>
		<reference ref_id="CVE-2020-25651" ref_url="https://www.suse.com/security/cve/CVE-2020-25651/" source="CVE"/>
		<reference ref_id="CVE-2020-25652" ref_url="https://www.suse.com/security/cve/CVE-2020-25652/" source="CVE"/>
		<reference ref_id="CVE-2020-25653" ref_url="https://www.suse.com/security/cve/CVE-2020-25653/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1791.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1791.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25650/">CVE-2020-25650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25650">CVE-2020-25650 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25651/">CVE-2020-25651 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25651">CVE-2020-25651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25652/">CVE-2020-25652 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25652">CVE-2020-25652 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25653/">CVE-2020-25653 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25653">CVE-2020-25653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836803" comment="spice-vdagent-0.20.0-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2054" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-29652" ref_url="https://www.suse.com/security/cve/CVE-2020-29652/" source="CVE"/>
		<reference ref_id="CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1796.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1796.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-29652/">CVE-2020-29652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29652">CVE-2020-29652 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836804" comment="buildah-1.19.7-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836805" comment="buildah-tests-1.19.7-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836806" comment="cockpit-podman-29-2.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836807" comment="conmon-2.0.26-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836808" comment="container-selinux-2.158.0-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836809" comment="containernetworking-plugins-0.9.1-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836810" comment="containers-common-1.2.2-8.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836811" comment="crit-3.15-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836812" comment="criu-3.15-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836813" comment="crun-0.18-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836814" comment="fuse-overlayfs-1.4.0-2.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836815" comment="libslirp-4.3.1-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836816" comment="libslirp-devel-4.3.1-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836817" comment="oci-seccomp-bpf-hook-1.2.0-2.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836818" comment="podman-3.0.1-6.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836819" comment="podman-catatonit-3.0.1-6.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836820" comment="podman-docker-3.0.1-6.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836821" comment="podman-plugins-3.0.1-6.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836822" comment="podman-remote-3.0.1-6.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836823" comment="podman-tests-3.0.1-6.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836824" comment="python3-criu-3.15-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836825" comment="runc-1.0.0-70.rc92.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836826" comment="skopeo-1.2.2-8.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836827" comment="skopeo-tests-1.2.2-8.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836828" comment="slirp4netns-1.1.8-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836829" comment="toolbox-0.0.8-1.module+el8.4.0+10607+f4da7515 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836830" comment="udica-0.2.4-1.module+el8.4.0+10607+f4da7515 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2055" version="1" class="patch">
	<metadata>
		<title>security update for egl-wayland (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1804.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1804.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836831" comment="egl-wayland-1.1.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836832" comment="libX11-1.6.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836833" comment="libX11-common-1.6.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836834" comment="libX11-devel-1.6.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836835" comment="libX11-xcb-1.6.8-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836836" comment="libdrm-2.4.103-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836837" comment="libdrm-devel-2.4.103-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836838" comment="libglvnd-1.3.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836839" comment="libglvnd-core-devel-1.3.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836840" comment="libglvnd-devel-1.3.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836841" comment="libglvnd-egl-1.3.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836842" comment="libglvnd-gles-1.3.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836843" comment="libglvnd-glx-1.3.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836844" comment="libglvnd-opengl-1.3.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836845" comment="libinput-1.16.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836846" comment="libinput-devel-1.16.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836847" comment="libinput-utils-1.16.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836848" comment="libwacom-1.6-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836849" comment="libwacom-data-1.6-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836850" comment="libwacom-devel-1.6-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836851" comment="mesa-dri-drivers-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836852" comment="mesa-filesystem-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836853" comment="mesa-libEGL-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836854" comment="mesa-libEGL-devel-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836855" comment="mesa-libGL-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836856" comment="mesa-libGL-devel-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836857" comment="mesa-libOSMesa-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836858" comment="mesa-libOSMesa-devel-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836859" comment="mesa-libgbm-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836860" comment="mesa-libgbm-devel-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836861" comment="mesa-libglapi-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836862" comment="mesa-libxatracker-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836863" comment="mesa-vdpau-drivers-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836864" comment="mesa-vulkan-devel-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836865" comment="mesa-vulkan-drivers-20.3.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836866" comment="xorg-x11-drivers-7.7-30.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836867" comment="xorg-x11-server-Xdmx-1.20.10-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836868" comment="xorg-x11-server-Xephyr-1.20.10-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836869" comment="xorg-x11-server-Xnest-1.20.10-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836870" comment="xorg-x11-server-Xorg-1.20.10-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836871" comment="xorg-x11-server-Xvfb-1.20.10-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836872" comment="xorg-x11-server-Xwayland-1.20.10-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836873" comment="xorg-x11-server-common-1.20.10-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836874" comment="xorg-x11-server-devel-1.20.10-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836875" comment="xorg-x11-server-source-1.20.10-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2056" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-17199" ref_url="https://www.suse.com/security/cve/CVE-2018-17199/" source="CVE"/>
		<reference ref_id="CVE-2020-11984" ref_url="https://www.suse.com/security/cve/CVE-2020-11984/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17199/">CVE-2018-17199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17199">CVE-2018-17199 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11984/">CVE-2020-11984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11984">CVE-2020-11984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11993">CVE-2020-11993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836876" comment="httpd-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836877" comment="httpd-devel-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836878" comment="httpd-filesystem-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836879" comment="httpd-manual-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836880" comment="httpd-tools-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831132" comment="mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836881" comment="mod_ldap-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836882" comment="mod_proxy_html-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836883" comment="mod_session-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836884" comment="mod_ssl-2.4.37-39.module+el8.4.0+9658+b87b2deb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2057" version="1" class="patch">
	<metadata>
		<title>security update for libvncserver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14405" ref_url="https://www.suse.com/security/cve/CVE-2020-14405/" source="CVE"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1811.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1811.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21247">CVE-2018-21247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20839">CVE-2019-20839 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14397">CVE-2020-14397 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14405/">CVE-2020-14405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14405">CVE-2020-14405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25708">CVE-2020-25708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836885" comment="libvncserver-0.9.11-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836886" comment="libvncserver-devel-0.9.11-17.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2058" version="1" class="patch">
	<metadata>
		<title>security update for raptor2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="CVE-2020-25713" ref_url="https://www.suse.com/security/cve/CVE-2020-25713/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18926">CVE-2017-18926 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25713/">CVE-2020-25713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25713">CVE-2020-25713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836887" comment="raptor2-2.0.15-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836888" comment="raptor2-devel-2.0.15-16.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2059" version="1" class="patch">
	<metadata>
		<title>security update for bind-dyndb-ldap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1846.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1846.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836889" comment="bind-dyndb-ldap-11.6-2.module+el8.4.0+9328+4ec4e316 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836890" comment="custodia-0.6.0-3.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836891" comment="ipa-client-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836892" comment="ipa-client-common-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836893" comment="ipa-client-epn-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836894" comment="ipa-client-samba-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836895" comment="ipa-common-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836896" comment="ipa-healthcheck-0.7-3.module+el8.4.0+9007+5084bdd8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836897" comment="ipa-healthcheck-core-0.7-3.module+el8.4.0+9008+94c5103b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836898" comment="ipa-python-compat-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836899" comment="ipa-selinux-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836900" comment="ipa-server-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836901" comment="ipa-server-common-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836902" comment="ipa-server-dns-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836903" comment="ipa-server-trust-ad-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836904" comment="opendnssec-2.1.7-1.module+el8.4.0+9007+5084bdd8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836905" comment="python3-custodia-0.6.0-3.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836906" comment="python3-ipaclient-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836907" comment="python3-ipalib-4.9.2-3.module+el8.4.0+10413+a92f1bfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836908" comment="python3-ipaserver-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836909" comment="python3-ipatests-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836910" comment="python3-jwcrypto-0.5.0-1.module+el8.1.0+4107+4a66eb87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836911" comment="python3-kdcproxy-0.4-5.module+el8.2.0+4691+a05b2456 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836912" comment="python3-pyusb-1.0.0-9.module+el8.1.0+4107+4a66eb87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836913" comment="python3-qrcode-5.1-12.module+el8.1.0+4107+4a66eb87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836914" comment="python3-qrcode-core-5.1-12.module+el8.1.0+4107+4a66eb87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836915" comment="python3-yubico-1.3.2-9.module+el8.1.0+4107+4a66eb87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836916" comment="slapi-nis-0.56.6-1.module+el8.4.0+9005+f55ff3e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836917" comment="softhsm-2.6.0-5.module+el8.4.0+10227+076cd560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836918" comment="softhsm-devel-2.6.0-5.module+el8.4.0+10227+076cd560 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2060" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11095" ref_url="https://www.suse.com/security/cve/CVE-2020-11095/" source="CVE"/>
		<reference ref_id="CVE-2020-11096" ref_url="https://www.suse.com/security/cve/CVE-2020-11096/" source="CVE"/>
		<reference ref_id="CVE-2020-11097" ref_url="https://www.suse.com/security/cve/CVE-2020-11097/" source="CVE"/>
		<reference ref_id="CVE-2020-11098" ref_url="https://www.suse.com/security/cve/CVE-2020-11098/" source="CVE"/>
		<reference ref_id="CVE-2020-11099" ref_url="https://www.suse.com/security/cve/CVE-2020-11099/" source="CVE"/>
		<reference ref_id="CVE-2020-15103" ref_url="https://www.suse.com/security/cve/CVE-2020-15103/" source="CVE"/>
		<reference ref_id="CVE-2020-4030" ref_url="https://www.suse.com/security/cve/CVE-2020-4030/" source="CVE"/>
		<reference ref_id="CVE-2020-4033" ref_url="https://www.suse.com/security/cve/CVE-2020-4033/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1849.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1849.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11095/">CVE-2020-11095 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11095">CVE-2020-11095 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11096/">CVE-2020-11096 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11096">CVE-2020-11096 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11097/">CVE-2020-11097 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11097">CVE-2020-11097 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11098/">CVE-2020-11098 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11098">CVE-2020-11098 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11099/">CVE-2020-11099 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11099">CVE-2020-11099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15103/">CVE-2020-15103 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15103">CVE-2020-15103 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4030/">CVE-2020-4030 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4030">CVE-2020-4030 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4033/">CVE-2020-4033 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4033">CVE-2020-4033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836919" comment="freerdp-2.2.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836920" comment="freerdp-devel-2.2.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836921" comment="freerdp-libs-2.2.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836922" comment="libwinpr-2.2.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836923" comment="libwinpr-devel-2.2.0-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2061" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14373" ref_url="https://www.suse.com/security/cve/CVE-2020-14373/" source="CVE"/>
		<reference ref_id="CVE-2020-16287" ref_url="https://www.suse.com/security/cve/CVE-2020-16287/" source="CVE"/>
		<reference ref_id="CVE-2020-16288" ref_url="https://www.suse.com/security/cve/CVE-2020-16288/" source="CVE"/>
		<reference ref_id="CVE-2020-16289" ref_url="https://www.suse.com/security/cve/CVE-2020-16289/" source="CVE"/>
		<reference ref_id="CVE-2020-16290" ref_url="https://www.suse.com/security/cve/CVE-2020-16290/" source="CVE"/>
		<reference ref_id="CVE-2020-16291" ref_url="https://www.suse.com/security/cve/CVE-2020-16291/" source="CVE"/>
		<reference ref_id="CVE-2020-16292" ref_url="https://www.suse.com/security/cve/CVE-2020-16292/" source="CVE"/>
		<reference ref_id="CVE-2020-16293" ref_url="https://www.suse.com/security/cve/CVE-2020-16293/" source="CVE"/>
		<reference ref_id="CVE-2020-16294" ref_url="https://www.suse.com/security/cve/CVE-2020-16294/" source="CVE"/>
		<reference ref_id="CVE-2020-16295" ref_url="https://www.suse.com/security/cve/CVE-2020-16295/" source="CVE"/>
		<reference ref_id="CVE-2020-16296" ref_url="https://www.suse.com/security/cve/CVE-2020-16296/" source="CVE"/>
		<reference ref_id="CVE-2020-16297" ref_url="https://www.suse.com/security/cve/CVE-2020-16297/" source="CVE"/>
		<reference ref_id="CVE-2020-16298" ref_url="https://www.suse.com/security/cve/CVE-2020-16298/" source="CVE"/>
		<reference ref_id="CVE-2020-16299" ref_url="https://www.suse.com/security/cve/CVE-2020-16299/" source="CVE"/>
		<reference ref_id="CVE-2020-16300" ref_url="https://www.suse.com/security/cve/CVE-2020-16300/" source="CVE"/>
		<reference ref_id="CVE-2020-16301" ref_url="https://www.suse.com/security/cve/CVE-2020-16301/" source="CVE"/>
		<reference ref_id="CVE-2020-16302" ref_url="https://www.suse.com/security/cve/CVE-2020-16302/" source="CVE"/>
		<reference ref_id="CVE-2020-16303" ref_url="https://www.suse.com/security/cve/CVE-2020-16303/" source="CVE"/>
		<reference ref_id="CVE-2020-16304" ref_url="https://www.suse.com/security/cve/CVE-2020-16304/" source="CVE"/>
		<reference ref_id="CVE-2020-16305" ref_url="https://www.suse.com/security/cve/CVE-2020-16305/" source="CVE"/>
		<reference ref_id="CVE-2020-16306" ref_url="https://www.suse.com/security/cve/CVE-2020-16306/" source="CVE"/>
		<reference ref_id="CVE-2020-16307" ref_url="https://www.suse.com/security/cve/CVE-2020-16307/" source="CVE"/>
		<reference ref_id="CVE-2020-16308" ref_url="https://www.suse.com/security/cve/CVE-2020-16308/" source="CVE"/>
		<reference ref_id="CVE-2020-16309" ref_url="https://www.suse.com/security/cve/CVE-2020-16309/" source="CVE"/>
		<reference ref_id="CVE-2020-16310" ref_url="https://www.suse.com/security/cve/CVE-2020-16310/" source="CVE"/>
		<reference ref_id="CVE-2020-17538" ref_url="https://www.suse.com/security/cve/CVE-2020-17538/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14373/">CVE-2020-14373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14373">CVE-2020-14373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16287/">CVE-2020-16287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16287">CVE-2020-16287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16288/">CVE-2020-16288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16288">CVE-2020-16288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16289/">CVE-2020-16289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16289">CVE-2020-16289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16290/">CVE-2020-16290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16290">CVE-2020-16290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16291/">CVE-2020-16291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16291">CVE-2020-16291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16292/">CVE-2020-16292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16292">CVE-2020-16292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16293/">CVE-2020-16293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16293">CVE-2020-16293 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16294/">CVE-2020-16294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16294">CVE-2020-16294 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16295/">CVE-2020-16295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16295">CVE-2020-16295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16296/">CVE-2020-16296 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16296">CVE-2020-16296 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16297/">CVE-2020-16297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16297">CVE-2020-16297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16298/">CVE-2020-16298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16298">CVE-2020-16298 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16299/">CVE-2020-16299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16299">CVE-2020-16299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16300/">CVE-2020-16300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16300">CVE-2020-16300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16301/">CVE-2020-16301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16301">CVE-2020-16301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16302/">CVE-2020-16302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16302">CVE-2020-16302 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16303/">CVE-2020-16303 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16303">CVE-2020-16303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16304/">CVE-2020-16304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16304">CVE-2020-16304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16305/">CVE-2020-16305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16305">CVE-2020-16305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16306/">CVE-2020-16306 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16306">CVE-2020-16306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16307/">CVE-2020-16307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16307">CVE-2020-16307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16308/">CVE-2020-16308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16308">CVE-2020-16308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16309/">CVE-2020-16309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16309">CVE-2020-16309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16310/">CVE-2020-16310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16310">CVE-2020-16310 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17538/">CVE-2020-17538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17538">CVE-2020-17538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836924" comment="ghostscript-9.27-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836925" comment="ghostscript-doc-9.27-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836926" comment="ghostscript-tools-dvipdf-9.27-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836927" comment="ghostscript-tools-fonts-9.27-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836928" comment="ghostscript-tools-printing-9.27-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836929" comment="ghostscript-x11-9.27-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836930" comment="libgs-9.27-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836931" comment="libgs-devel-9.27-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2062" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-25032" ref_url="https://www.suse.com/security/cve/CVE-2019-25032/" source="CVE"/>
		<reference ref_id="CVE-2019-25034" ref_url="https://www.suse.com/security/cve/CVE-2019-25034/" source="CVE"/>
		<reference ref_id="CVE-2019-25035" ref_url="https://www.suse.com/security/cve/CVE-2019-25035/" source="CVE"/>
		<reference ref_id="CVE-2019-25036" ref_url="https://www.suse.com/security/cve/CVE-2019-25036/" source="CVE"/>
		<reference ref_id="CVE-2019-25037" ref_url="https://www.suse.com/security/cve/CVE-2019-25037/" source="CVE"/>
		<reference ref_id="CVE-2019-25038" ref_url="https://www.suse.com/security/cve/CVE-2019-25038/" source="CVE"/>
		<reference ref_id="CVE-2019-25039" ref_url="https://www.suse.com/security/cve/CVE-2019-25039/" source="CVE"/>
		<reference ref_id="CVE-2019-25040" ref_url="https://www.suse.com/security/cve/CVE-2019-25040/" source="CVE"/>
		<reference ref_id="CVE-2019-25041" ref_url="https://www.suse.com/security/cve/CVE-2019-25041/" source="CVE"/>
		<reference ref_id="CVE-2019-25042" ref_url="https://www.suse.com/security/cve/CVE-2019-25042/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1853.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1853.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25032/">CVE-2019-25032 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25032">CVE-2019-25032 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25034/">CVE-2019-25034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25034">CVE-2019-25034 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25035/">CVE-2019-25035 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25035">CVE-2019-25035 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25036/">CVE-2019-25036 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25036">CVE-2019-25036 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25037/">CVE-2019-25037 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25037">CVE-2019-25037 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25038/">CVE-2019-25038 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25038">CVE-2019-25038 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25039/">CVE-2019-25039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25039">CVE-2019-25039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25040/">CVE-2019-25040 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25040">CVE-2019-25040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25041/">CVE-2019-25041 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25041">CVE-2019-25041 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25042/">CVE-2019-25042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25042">CVE-2019-25042 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28935">CVE-2020-28935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836932" comment="python3-unbound-1.7.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836933" comment="unbound-1.7.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836934" comment="unbound-devel-1.7.3-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836935" comment="unbound-libs-1.7.3-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2063" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24303" ref_url="https://www.suse.com/security/cve/CVE-2020-24303/" source="CVE"/>
		<reference ref_id="CVE-2020-27846" ref_url="https://www.suse.com/security/cve/CVE-2020-27846/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1859.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1859.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24303/">CVE-2020-24303 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24303">CVE-2020-24303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27846/">CVE-2020-27846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27846">CVE-2020-27846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836936" comment="grafana-7.3.6-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2064" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1879.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1879.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830914" comment="python38-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830915" comment="python38-Cython-0.29.14-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830916" comment="python38-PyMySQL-0.10.1-1.module+el8.4.0+9692+8e86ab84 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830917" comment="python38-asn1crypto-1.2.0-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830918" comment="python38-babel-2.7.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830919" comment="python38-cffi-1.13.2-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830920" comment="python38-chardet-3.0.4-19.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830921" comment="python38-cryptography-2.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830922" comment="python38-debug-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830923" comment="python38-devel-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830924" comment="python38-idle-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830925" comment="python38-idna-2.8-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830926" comment="python38-jinja2-2.10.3-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830927" comment="python38-libs-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830928" comment="python38-lxml-4.4.1-5.module+el8.4.0+9001+fc421f6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830929" comment="python38-markupsafe-1.1.1-6.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830930" comment="python38-mod_wsgi-4.6.8-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830931" comment="python38-numpy-1.17.3-5.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830932" comment="python38-numpy-doc-1.17.3-5.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830933" comment="python38-numpy-f2py-1.17.3-5.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830934" comment="python38-pip-19.3.1-1.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830935" comment="python38-pip-wheel-19.3.1-1.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830936" comment="python38-ply-3.11-10.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830937" comment="python38-psutil-5.6.4-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830938" comment="python38-psycopg2-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830939" comment="python38-psycopg2-doc-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830940" comment="python38-psycopg2-tests-2.8.4-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830941" comment="python38-pycparser-2.19-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830942" comment="python38-pysocks-1.7.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830943" comment="python38-pytz-2019.3-3.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836937" comment="python38-pyyaml-5.3.1-1.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830945" comment="python38-requests-2.22.0-9.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830946" comment="python38-rpm-macros-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830947" comment="python38-scipy-1.3.1-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830948" comment="python38-setuptools-41.6.0-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830949" comment="python38-setuptools-wheel-41.6.0-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830950" comment="python38-six-1.12.0-10.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830951" comment="python38-test-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830952" comment="python38-tkinter-3.8.6-3.module+el8.4.0+9579+e9717e18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830953" comment="python38-urllib3-1.25.7-4.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830954" comment="python38-wheel-0.33.6-5.module+el8.4.0+8888+89bc7e79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830955" comment="python38-wheel-wheel-0.33.6-5.module+el8.4.0+8888+89bc7e79 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2065" version="1" class="patch">
	<metadata>
		<title>security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-27778" ref_url="https://www.suse.com/security/cve/CVE-2020-27778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1881.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1881.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27778/">CVE-2020-27778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27778">CVE-2020-27778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836938" comment="evince-3.28.4-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836939" comment="evince-browser-plugin-3.28.4-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836940" comment="evince-devel-3.28.4-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836941" comment="evince-libs-3.28.4-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836942" comment="evince-nautilus-3.28.4-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836943" comment="poppler-20.11.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836944" comment="poppler-cpp-20.11.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836945" comment="poppler-cpp-devel-20.11.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836946" comment="poppler-devel-20.11.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836947" comment="poppler-glib-20.11.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836948" comment="poppler-glib-devel-20.11.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836949" comment="poppler-qt5-20.11.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836950" comment="poppler-qt5-devel-20.11.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836951" comment="poppler-utils-20.11.0-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2066" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="CVE-2020-25275" ref_url="https://www.suse.com/security/cve/CVE-2020-25275/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1887.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1887.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24386">CVE-2020-24386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25275/">CVE-2020-25275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25275">CVE-2020-25275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836952" comment="dovecot-2.3.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836953" comment="dovecot-devel-2.3.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836954" comment="dovecot-mysql-2.3.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836955" comment="dovecot-pgsql-2.3.8-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836956" comment="dovecot-pigeonhole-2.3.8-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2067" version="1" class="patch">
	<metadata>
		<title>security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1898.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1898.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27783">CVE-2020-27783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836957" comment="python3-lxml-4.2.3-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2068" version="1" class="patch">
	<metadata>
		<title>security update for spice (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1924.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1924.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836958" comment="spice-server-0.14.3-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836959" comment="spice-server-devel-0.14.3-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2069" version="1" class="patch">
	<metadata>
		<title>security update for rust (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36317" ref_url="https://www.suse.com/security/cve/CVE-2020-36317/" source="CVE"/>
		<reference ref_id="CVE-2020-36318" ref_url="https://www.suse.com/security/cve/CVE-2020-36318/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1935.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1935.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36317/">CVE-2020-36317 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36317">CVE-2020-36317 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36318/">CVE-2020-36318 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36318">CVE-2020-36318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836960" comment="cargo-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836961" comment="cargo-doc-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836962" comment="clippy-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836963" comment="rls-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836964" comment="rust-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836965" comment="rust-analysis-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836966" comment="rust-debugger-common-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836967" comment="rust-doc-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836968" comment="rust-gdb-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836969" comment="rust-lldb-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836970" comment="rust-src-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836971" comment="rust-std-static-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836972" comment="rust-toolset-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836973" comment="rustfmt-1.49.0-1.module+el8.4.0+9446+1a463e08 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2070" version="1" class="patch">
	<metadata>
		<title>security update for mingw-binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1968.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1968.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836974" comment="mingw-binutils-generic-2.30-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836975" comment="mingw-filesystem-base-104-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836976" comment="mingw32-binutils-2.30-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836977" comment="mingw32-bzip2-1.0.6-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836978" comment="mingw32-bzip2-static-1.0.6-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836979" comment="mingw32-filesystem-104-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836980" comment="mingw32-sqlite-3.26.0.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836981" comment="mingw32-sqlite-static-3.26.0.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836982" comment="mingw64-binutils-2.30-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836983" comment="mingw64-bzip2-1.0.6-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836984" comment="mingw64-bzip2-static-1.0.6-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836985" comment="mingw64-filesystem-104-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836986" comment="mingw64-sqlite-3.26.0.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836987" comment="mingw64-sqlite-static-3.26.0.0-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2071" version="1" class="patch">
	<metadata>
		<title>security update for pandoc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-5238" ref_url="https://www.suse.com/security/cve/CVE-2020-5238/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1972.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1972.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-5238/">CVE-2020-5238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5238">CVE-2020-5238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836988" comment="pandoc-2.0.6-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836989" comment="pandoc-common-2.0.6-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2072" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1979.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1979.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832711" comment="libecap-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832712" comment="libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836990" comment="squid-4.11-4.module+el8.4.0+10676+a969168e.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2073" version="1" class="patch">
	<metadata>
		<title>security update for bind-dyndb-ldap (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3480" ref_url="https://www.suse.com/security/cve/CVE-2021-3480/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3480/">CVE-2021-3480 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3480">CVE-2021-3480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836889" comment="bind-dyndb-ldap-11.6-2.module+el8.4.0+9328+4ec4e316 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836890" comment="custodia-0.6.0-3.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836991" comment="ipa-client-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836992" comment="ipa-client-common-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836993" comment="ipa-client-epn-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836994" comment="ipa-client-samba-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836995" comment="ipa-common-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836896" comment="ipa-healthcheck-0.7-3.module+el8.4.0+9007+5084bdd8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836996" comment="ipa-healthcheck-core-0.7-3.module+el8.4.0+9007+5084bdd8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836997" comment="ipa-python-compat-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836998" comment="ipa-selinux-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836900" comment="ipa-server-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836901" comment="ipa-server-common-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836902" comment="ipa-server-dns-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836903" comment="ipa-server-trust-ad-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836904" comment="opendnssec-2.1.7-1.module+el8.4.0+9007+5084bdd8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836905" comment="python3-custodia-0.6.0-3.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836999" comment="python3-ipaclient-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837000" comment="python3-ipalib-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836908" comment="python3-ipaserver-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836909" comment="python3-ipatests-4.9.2-3.module+el8.4.0+10412+5ecb5b37 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837001" comment="python3-jwcrypto-0.5.0-1.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836911" comment="python3-kdcproxy-0.4-5.module+el8.2.0+4691+a05b2456 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837002" comment="python3-pyusb-1.0.0-9.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837003" comment="python3-qrcode-5.1-12.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837004" comment="python3-qrcode-core-5.1-12.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837005" comment="python3-yubico-1.3.2-9.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837006" comment="slapi-nis-0.56.6-2.module+el8.4.0+10615+2234cc2c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836917" comment="softhsm-2.6.0-5.module+el8.4.0+10227+076cd560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836918" comment="softhsm-devel-2.6.0-5.module+el8.4.0+10227+076cd560 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2074" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1989.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1989.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837007" comment="bind-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837008" comment="bind-chroot-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837009" comment="bind-devel-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837010" comment="bind-export-devel-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837011" comment="bind-export-libs-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837012" comment="bind-libs-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837013" comment="bind-libs-lite-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837014" comment="bind-license-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837015" comment="bind-lite-devel-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837016" comment="bind-pkcs11-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837017" comment="bind-pkcs11-devel-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837018" comment="bind-pkcs11-libs-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837019" comment="bind-pkcs11-utils-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837020" comment="bind-sdb-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837021" comment="bind-sdb-chroot-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837022" comment="bind-utils-9.11.26-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837023" comment="python3-bind-9.11.26-4.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2075" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29477" ref_url="https://www.suse.com/security/cve/CVE-2021-29477/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2034.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2034.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29477/">CVE-2021-29477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29477">CVE-2021-29477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837024" comment="redis-6.0.9-3.module+el8.4.0+10984+ed187465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837025" comment="redis-devel-6.0.9-3.module+el8.4.0+10984+ed187465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837026" comment="redis-doc-6.0.9-3.module+el8.4.0+10984+ed187465 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2076" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31204" ref_url="https://www.suse.com/security/cve/CVE-2021-31204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2036.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2036.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-31204/">CVE-2021-31204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31204">CVE-2021-31204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837027" comment="aspnetcore-runtime-5.0-5.0.6-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837028" comment="aspnetcore-targeting-pack-5.0-5.0.6-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837029" comment="dotnet-5.0.203-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837030" comment="dotnet-apphost-pack-5.0-5.0.6-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837031" comment="dotnet-host-5.0.6-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837032" comment="dotnet-hostfxr-5.0-5.0.6-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837033" comment="dotnet-runtime-5.0-5.0.6-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837034" comment="dotnet-sdk-5.0-5.0.203-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837035" comment="dotnet-targeting-pack-5.0-5.0.6-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837036" comment="dotnet-templates-5.0-5.0.203-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837037" comment="netstandard-targeting-pack-2.1-5.0.203-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2077" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31204" ref_url="https://www.suse.com/security/cve/CVE-2021-31204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2037.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2037.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-31204/">CVE-2021-31204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31204">CVE-2021-31204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837038" comment="aspnetcore-runtime-3.1-3.1.15-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837039" comment="aspnetcore-targeting-pack-3.1-3.1.15-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837040" comment="dotnet-apphost-pack-3.1-3.1.15-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837041" comment="dotnet-hostfxr-3.1-3.1.15-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837042" comment="dotnet-runtime-3.1-3.1.15-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837043" comment="dotnet-sdk-3.1-3.1.115-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837044" comment="dotnet-targeting-pack-3.1-3.1.15-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837045" comment="dotnet-templates-3.1-3.1.115-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2078" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3501" ref_url="https://www.suse.com/security/cve/CVE-2021-3501/" source="CVE"/>
		<reference ref_id="CVE-2021-3543" ref_url="https://www.suse.com/security/cve/CVE-2021-3543/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2168.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2168.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3501/">CVE-2021-3501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3501">CVE-2021-3501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3543/">CVE-2021-3543 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3543">CVE-2021-3543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837046" comment="bpftool-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837047" comment="kernel-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837048" comment="kernel-abi-stablelists-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837049" comment="kernel-core-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837050" comment="kernel-cross-headers-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837051" comment="kernel-debug-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837052" comment="kernel-debug-core-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837054" comment="kernel-debug-modules-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837055" comment="kernel-debug-modules-extra-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837057" comment="kernel-doc-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837058" comment="kernel-headers-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837059" comment="kernel-modules-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837060" comment="kernel-modules-extra-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837061" comment="kernel-tools-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837062" comment="kernel-tools-libs-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837064" comment="perf-4.18.0-305.3.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837065" comment="python3-perf-4.18.0-305.3.1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2079" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2170.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2170.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837066" comment="glib2-2.56.4-10.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837067" comment="glib2-devel-2.56.4-10.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837068" comment="glib2-doc-2.56.4-10.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837069" comment="glib2-fam-2.56.4-10.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837070" comment="glib2-static-2.56.4-10.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837071" comment="glib2-tests-2.56.4-10.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2080" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2233.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2233.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837072" comment="firefox-78.11.0-3.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2081" version="1" class="patch">
	<metadata>
		<title>security update for jss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3551" ref_url="https://www.suse.com/security/cve/CVE-2021-3551/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2235.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2235.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3551/">CVE-2021-3551 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3551">CVE-2021-3551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836774" comment="jss-4.8.1-2.module+el8.4.0+10451+3e5b5448 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836775" comment="jss-javadoc-4.8.1-2.module+el8.4.0+10451+3e5b5448 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836121" comment="ldapjdk-4.22.0-1.module+el8.3.0+6784+6e1e4c62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836122" comment="ldapjdk-javadoc-4.22.0-1.module+el8.3.0+6784+6e1e4c62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837073" comment="pki-acme-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837074" comment="pki-base-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837075" comment="pki-base-java-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837076" comment="pki-ca-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837077" comment="pki-kra-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837078" comment="pki-server-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837079" comment="pki-symkey-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837080" comment="pki-tools-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837081" comment="python3-pki-10.10.5-3.module+el8.4.0+11039+635979e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836789" comment="tomcatjss-7.6.1-1.module+el8.4.0+8778+d07929ff is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2082" version="1" class="patch">
	<metadata>
		<title>security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2238.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2238.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837082" comment="polkit-0.115-11.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837083" comment="polkit-devel-0.115-11.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837084" comment="polkit-docs-0.115-11.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837085" comment="polkit-libs-0.115-11.el8_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2083" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23017" ref_url="https://www.suse.com/security/cve/CVE-2021-23017/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2259.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2259.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23017/">CVE-2021-23017 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23017">CVE-2021-23017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837086" comment="nginx-1.18.0-3.module+el8.4.0+11152+f736ed63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837087" comment="nginx-all-modules-1.18.0-3.module+el8.4.0+11152+f736ed63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837088" comment="nginx-filesystem-1.18.0-3.module+el8.4.0+11152+f736ed63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837089" comment="nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+11152+f736ed63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837090" comment="nginx-mod-http-perl-1.18.0-3.module+el8.4.0+11152+f736ed63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837091" comment="nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+11152+f736ed63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837092" comment="nginx-mod-mail-1.18.0-3.module+el8.4.0+11152+f736ed63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837093" comment="nginx-mod-stream-1.18.0-3.module+el8.4.0+11152+f736ed63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2084" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29956" ref_url="https://www.suse.com/security/cve/CVE-2021-29956/" source="CVE"/>
		<reference ref_id="CVE-2021-29957" ref_url="https://www.suse.com/security/cve/CVE-2021-29957/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2264.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2264.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29956/">CVE-2021-29956 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29956">CVE-2021-29956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29957/">CVE-2021-29957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29957">CVE-2021-29957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837094" comment="thunderbird-78.11.0-1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2085" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23017" ref_url="https://www.suse.com/security/cve/CVE-2021-23017/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2290.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2290.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23017/">CVE-2021-23017 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23017">CVE-2021-23017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837095" comment="nginx-1.16.1-2.module+el8.4.0+11155+68135136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837096" comment="nginx-all-modules-1.16.1-2.module+el8.4.0+11155+68135136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837097" comment="nginx-filesystem-1.16.1-2.module+el8.4.0+11155+68135136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837098" comment="nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+11155+68135136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837099" comment="nginx-mod-http-perl-1.16.1-2.module+el8.4.0+11155+68135136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837100" comment="nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+11155+68135136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837101" comment="nginx-mod-mail-1.16.1-2.module+el8.4.0+11155+68135136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837102" comment="nginx-mod-stream-1.16.1-2.module+el8.4.0+11155+68135136.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2086" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2291.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2291.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837103" comment="buildah-1.11.6-8.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837104" comment="buildah-tests-1.11.6-8.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837105" comment="cockpit-podman-11-1.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837106" comment="conmon-2.0.15-1.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837107" comment="container-selinux-2.130.0-1.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837108" comment="containernetworking-plugins-0.8.3-4.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837109" comment="containers-common-0.1.41-4.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837110" comment="crit-3.12-9.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837111" comment="criu-3.12-9.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837112" comment="fuse-overlayfs-0.7.8-1.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837113" comment="podman-1.6.4-26.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837114" comment="podman-docker-1.6.4-26.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837115" comment="podman-remote-1.6.4-26.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837116" comment="podman-tests-1.6.4-26.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837117" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837118" comment="python3-criu-3.12-9.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837119" comment="runc-1.0.0-65.rc10.module+el8.4.0+11031+7edfb656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837120" comment="skopeo-0.1.41-4.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837121" comment="skopeo-tests-0.1.41-4.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837122" comment="slirp4netns-0.4.2-3.git21fdece.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837123" comment="toolbox-0.0.7-1.module+el8.4.0+10193+e90fd8eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837124" comment="udica-0.2.1-2.module+el8.4.0+10193+e90fd8eb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2087" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2308.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2308.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837125" comment="microcode_ctl-20210216-1.20210525.1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2088" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31957" ref_url="https://www.suse.com/security/cve/CVE-2021-31957/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2352.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2352.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-31957/">CVE-2021-31957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31957">CVE-2021-31957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837126" comment="aspnetcore-runtime-3.1-3.1.16-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837127" comment="aspnetcore-targeting-pack-3.1-3.1.16-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837128" comment="dotnet-apphost-pack-3.1-3.1.16-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837129" comment="dotnet-hostfxr-3.1-3.1.16-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837130" comment="dotnet-runtime-3.1-3.1.16-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837131" comment="dotnet-sdk-3.1-3.1.116-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837132" comment="dotnet-targeting-pack-3.1-3.1.16-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837133" comment="dotnet-templates-3.1-3.1.116-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2089" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31957" ref_url="https://www.suse.com/security/cve/CVE-2021-31957/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2353.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2353.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-31957/">CVE-2021-31957 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31957">CVE-2021-31957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837134" comment="aspnetcore-runtime-5.0-5.0.7-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837135" comment="aspnetcore-targeting-pack-5.0-5.0.7-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837136" comment="dotnet-5.0.204-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837137" comment="dotnet-apphost-pack-5.0-5.0.7-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837138" comment="dotnet-host-5.0.7-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837139" comment="dotnet-hostfxr-5.0-5.0.7-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837140" comment="dotnet-runtime-5.0-5.0.7-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837141" comment="dotnet-sdk-5.0-5.0.204-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837142" comment="dotnet-targeting-pack-5.0-5.0.7-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837143" comment="dotnet-templates-5.0-5.0.204-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837144" comment="netstandard-targeting-pack-2.1-5.0.204-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2090" version="1" class="patch">
	<metadata>
		<title>security update for libwebp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2020-36328" ref_url="https://www.suse.com/security/cve/CVE-2020-36328/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2354.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2354.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36328/">CVE-2020-36328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36328">CVE-2020-36328 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837145" comment="libwebp-1.0.0-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837146" comment="libwebp-devel-1.0.0-3.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2091" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2359.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2359.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837147" comment="dhcp-client-4.3.6-44.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837148" comment="dhcp-common-4.3.6-44.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837149" comment="dhcp-libs-4.3.6-44.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837150" comment="dhcp-relay-4.3.6-44.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837151" comment="dhcp-server-4.3.6-44.el8_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2092" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2360.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2360.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837152" comment="postgresql-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837153" comment="postgresql-contrib-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837154" comment="postgresql-docs-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837155" comment="postgresql-plperl-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837156" comment="postgresql-plpython3-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837157" comment="postgresql-pltcl-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837158" comment="postgresql-server-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837159" comment="postgresql-server-devel-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837160" comment="postgresql-static-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837161" comment="postgresql-test-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837162" comment="postgresql-test-rpm-macros-9.6.22-1.module+el8.4.0+11244+beebcf7e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2093" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2361.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2361.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837163" comment="postgresql-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837164" comment="postgresql-contrib-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837165" comment="postgresql-docs-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837166" comment="postgresql-plperl-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837167" comment="postgresql-plpython3-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837168" comment="postgresql-pltcl-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837169" comment="postgresql-server-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837170" comment="postgresql-server-devel-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837171" comment="postgresql-static-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837172" comment="postgresql-test-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837173" comment="postgresql-test-rpm-macros-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837174" comment="postgresql-upgrade-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837175" comment="postgresql-upgrade-devel-10.17-1.module+el8.4.0+11249+895597ab is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2094" version="1" class="patch">
	<metadata>
		<title>security update for gupnp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2363.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2363.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33516">CVE-2021-33516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837176" comment="gupnp-1.0.6-2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837177" comment="gupnp-devel-1.0.6-2.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2095" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2370.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2370.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837178" comment="buildah-1.19.7-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837179" comment="buildah-tests-1.19.7-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837180" comment="cockpit-podman-29-2.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837181" comment="conmon-2.0.26-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837182" comment="container-selinux-2.158.0-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837183" comment="containernetworking-plugins-0.9.1-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837184" comment="containers-common-1.2.2-7.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837185" comment="crit-3.15-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837186" comment="criu-3.15-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837187" comment="crun-0.18-2.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837188" comment="fuse-overlayfs-1.4.0-2.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837189" comment="libslirp-4.3.1-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837190" comment="libslirp-devel-4.3.1-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837191" comment="oci-seccomp-bpf-hook-1.2.0-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837192" comment="podman-3.0.1-6.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837193" comment="podman-catatonit-3.0.1-6.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837194" comment="podman-docker-3.0.1-6.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837195" comment="podman-plugins-3.0.1-6.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837196" comment="podman-remote-3.0.1-6.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837197" comment="podman-tests-3.0.1-6.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837198" comment="python3-criu-3.15-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837199" comment="runc-1.0.0-71.rc92.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837200" comment="skopeo-1.2.2-7.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837201" comment="skopeo-tests-1.2.2-7.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837202" comment="slirp4netns-1.1.8-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837203" comment="toolbox-0.0.8-1.module+el8.4.0+11310+8c67a752 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837204" comment="udica-0.2.4-1.module+el8.4.0+11310+8c67a752 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2096" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2371.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2371.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837205" comment="buildah-1.19.7-2.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837206" comment="buildah-tests-1.19.7-2.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837207" comment="cockpit-podman-29-2.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837208" comment="conmon-2.0.26-3.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837209" comment="container-selinux-2.162.0-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837210" comment="containernetworking-plugins-0.9.1-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837211" comment="containers-common-1.2.2-10.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837212" comment="crit-3.15-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837213" comment="criu-3.15-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837214" comment="crun-0.18-2.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837215" comment="fuse-overlayfs-1.4.0-3.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837216" comment="libslirp-4.3.1-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837217" comment="libslirp-devel-4.3.1-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837218" comment="oci-seccomp-bpf-hook-1.2.0-2.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837219" comment="podman-3.0.1-7.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837220" comment="podman-catatonit-3.0.1-7.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837221" comment="podman-docker-3.0.1-7.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837222" comment="podman-plugins-3.0.1-7.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837223" comment="podman-remote-3.0.1-7.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837224" comment="podman-tests-3.0.1-7.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837225" comment="python3-criu-3.15-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837226" comment="runc-1.0.0-73.rc93.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837227" comment="skopeo-1.2.2-10.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837228" comment="skopeo-tests-1.2.2-10.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837229" comment="slirp4netns-1.1.8-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837230" comment="toolbox-0.0.8-1.module+el8.4.0+11311+9da8acfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837231" comment="udica-0.2.4-1.module+el8.4.0+11311+9da8acfb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2097" version="1" class="patch">
	<metadata>
		<title>security update for pgaudit (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2372.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2372.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3393">CVE-2021-3393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837232" comment="pgaudit-1.4.0-6.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837233" comment="postgres-decoderbufs-0.10.0-2.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837234" comment="postgresql-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837235" comment="postgresql-contrib-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837236" comment="postgresql-docs-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837237" comment="postgresql-plperl-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837238" comment="postgresql-plpython3-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837239" comment="postgresql-pltcl-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837240" comment="postgresql-server-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837241" comment="postgresql-server-devel-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837242" comment="postgresql-static-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837243" comment="postgresql-test-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837244" comment="postgresql-test-rpm-macros-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837245" comment="postgresql-upgrade-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837246" comment="postgresql-upgrade-devel-12.7-1.module+el8.4.0+11288+c193d6d7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2098" version="1" class="patch">
	<metadata>
		<title>security update for pgaudit (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2375.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2375.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32028">CVE-2021-32028 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32029">CVE-2021-32029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837247" comment="pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837248" comment="postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837249" comment="postgresql-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837250" comment="postgresql-contrib-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837251" comment="postgresql-docs-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837252" comment="postgresql-plperl-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837253" comment="postgresql-plpython3-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837254" comment="postgresql-pltcl-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837255" comment="postgresql-server-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837256" comment="postgresql-server-devel-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837257" comment="postgresql-static-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837258" comment="postgresql-test-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837259" comment="postgresql-test-rpm-macros-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837260" comment="postgresql-upgrade-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837261" comment="postgresql-upgrade-devel-13.3-1.module+el8.4.0+11254+85259292 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2099" version="1" class="patch">
	<metadata>
		<title>security update for fwupd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2566.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2566.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837262" comment="fwupd-1.5.9-1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2100" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2569.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2569.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837263" comment="libxml2-2.9.7-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837264" comment="libxml2-devel-2.9.7-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837265" comment="python3-libxml2-2.9.7-9.el8_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2101" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26541" ref_url="https://www.suse.com/security/cve/CVE-2020-26541/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2570.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2570.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26541/">CVE-2020-26541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26541">CVE-2020-26541 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837266" comment="bpftool-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837267" comment="kernel-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837268" comment="kernel-abi-stablelists-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837269" comment="kernel-core-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837270" comment="kernel-cross-headers-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837271" comment="kernel-debug-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837272" comment="kernel-debug-core-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837274" comment="kernel-debug-modules-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837275" comment="kernel-debug-modules-extra-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837277" comment="kernel-doc-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837278" comment="kernel-headers-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837279" comment="kernel-modules-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837280" comment="kernel-modules-extra-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837281" comment="kernel-tools-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837282" comment="kernel-tools-libs-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837284" comment="perf-4.18.0-305.7.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837285" comment="python3-perf-4.18.0-305.7.1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2102" version="1" class="patch">
	<metadata>
		<title>security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2574.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2574.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837286" comment="python3-rpm-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837287" comment="rpm-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837288" comment="rpm-apidocs-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037646" comment="rpm-build-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837289" comment="rpm-build-libs-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837290" comment="rpm-cron-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837291" comment="rpm-devel-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837292" comment="rpm-libs-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037647" comment="rpm-plugin-fapolicyd-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837293" comment="rpm-plugin-ima-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837294" comment="rpm-plugin-prioreset-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837295" comment="rpm-plugin-selinux-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837296" comment="rpm-plugin-syslog-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837297" comment="rpm-plugin-systemd-inhibit-4.14.3-14.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837298" comment="rpm-sign-4.14.3-14.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2103" version="1" class="patch">
	<metadata>
		<title>security update for lz4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2575.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2575.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837299" comment="lz4-1.8.3-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837300" comment="lz4-devel-1.8.3-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837301" comment="lz4-libs-1.8.3-3.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2104" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2584.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2584.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837302" comment="ruby-2.7.3-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837303" comment="ruby-default-gems-2.7.3-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837304" comment="ruby-devel-2.7.3-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837305" comment="ruby-doc-2.7.3-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837306" comment="ruby-libs-2.7.3-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837307" comment="rubygem-abrt-0.4.0-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837308" comment="rubygem-abrt-doc-0.4.0-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837309" comment="rubygem-bigdecimal-2.0.0-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837310" comment="rubygem-bson-4.8.1-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837311" comment="rubygem-bson-doc-4.8.1-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837312" comment="rubygem-bundler-2.1.4-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837313" comment="rubygem-io-console-0.5.6-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837314" comment="rubygem-irb-1.2.6-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837315" comment="rubygem-json-2.3.0-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837316" comment="rubygem-minitest-5.13.0-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837317" comment="rubygem-mongo-2.11.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837318" comment="rubygem-mongo-doc-2.11.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837319" comment="rubygem-mysql2-0.5.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837320" comment="rubygem-mysql2-doc-0.5.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837321" comment="rubygem-net-telnet-0.2.0-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837322" comment="rubygem-openssl-2.1.2-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837323" comment="rubygem-pg-1.2.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837324" comment="rubygem-pg-doc-1.2.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837325" comment="rubygem-power_assert-1.1.7-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837326" comment="rubygem-psych-3.1.0-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837327" comment="rubygem-rake-13.0.1-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837328" comment="rubygem-rdoc-6.2.1-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837329" comment="rubygem-test-unit-3.3.4-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837330" comment="rubygem-xmlrpc-0.3.0-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837331" comment="rubygems-3.1.6-136.module+el8.4.0+10728+4c884998 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837332" comment="rubygems-devel-3.1.6-136.module+el8.4.0+10728+4c884998 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2105" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2587.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2587.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837333" comment="ruby-2.5.9-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837334" comment="ruby-devel-2.5.9-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837335" comment="ruby-doc-2.5.9-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837336" comment="ruby-irb-2.5.9-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837337" comment="ruby-libs-2.5.9-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837338" comment="rubygem-abrt-0.3.0-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837339" comment="rubygem-abrt-doc-0.3.0-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837340" comment="rubygem-bigdecimal-1.3.4-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837341" comment="rubygem-bson-4.3.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837342" comment="rubygem-bson-doc-4.3.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837343" comment="rubygem-bundler-1.16.1-3.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837344" comment="rubygem-bundler-doc-1.16.1-3.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837345" comment="rubygem-did_you_mean-1.2.0-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837346" comment="rubygem-io-console-0.4.6-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837347" comment="rubygem-json-2.1.0-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837348" comment="rubygem-minitest-5.10.3-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837349" comment="rubygem-mongo-2.5.1-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837350" comment="rubygem-mongo-doc-2.5.1-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837351" comment="rubygem-mysql2-0.4.10-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837352" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837353" comment="rubygem-net-telnet-0.1.1-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837354" comment="rubygem-openssl-2.1.2-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837355" comment="rubygem-pg-1.0.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837356" comment="rubygem-pg-doc-1.0.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837357" comment="rubygem-power_assert-1.1.1-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837358" comment="rubygem-psych-3.0.2-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837359" comment="rubygem-rake-12.3.3-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837360" comment="rubygem-rdoc-6.0.1.1-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837361" comment="rubygem-test-unit-3.2.7-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837362" comment="rubygem-xmlrpc-0.3.0-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837363" comment="rubygems-2.7.6.3-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837364" comment="rubygems-devel-2.7.6.3-107.module+el8.4.0+10822+fe4fffb1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2106" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-3881" ref_url="https://www.suse.com/security/cve/CVE-2019-3881/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2588.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2588.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3881/">CVE-2019-3881 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3881">CVE-2019-3881 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837365" comment="ruby-2.6.7-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837366" comment="ruby-devel-2.6.7-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837367" comment="ruby-doc-2.6.7-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837368" comment="ruby-libs-2.6.7-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837369" comment="rubygem-abrt-0.3.0-4.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837370" comment="rubygem-abrt-doc-0.3.0-4.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837371" comment="rubygem-bigdecimal-1.4.1-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837372" comment="rubygem-bson-4.5.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837373" comment="rubygem-bson-doc-4.5.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837374" comment="rubygem-bundler-1.17.2-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837375" comment="rubygem-did_you_mean-1.3.0-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837376" comment="rubygem-io-console-0.4.7-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837377" comment="rubygem-irb-1.0.0-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837378" comment="rubygem-json-2.1.0-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837379" comment="rubygem-minitest-5.11.3-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837380" comment="rubygem-mongo-2.8.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837381" comment="rubygem-mongo-doc-2.8.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837382" comment="rubygem-mysql2-0.5.2-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837383" comment="rubygem-mysql2-doc-0.5.2-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837384" comment="rubygem-net-telnet-0.2.0-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837385" comment="rubygem-openssl-2.1.2-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837386" comment="rubygem-pg-1.1.4-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837387" comment="rubygem-pg-doc-1.1.4-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837388" comment="rubygem-power_assert-1.1.3-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837389" comment="rubygem-psych-3.1.0-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837390" comment="rubygem-rake-12.3.3-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837391" comment="rubygem-rdoc-6.1.2-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837392" comment="rubygem-test-unit-3.2.9-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837393" comment="rubygem-xmlrpc-0.3.0-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837394" comment="rubygems-3.0.3.1-107.module+el8.4.0+10830+bbd85cce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837395" comment="rubygems-devel-3.0.3.1-107.module+el8.4.0+10830+bbd85cce is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2107" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28211">CVE-2021-28211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837396" comment="edk2-ovmf-20200602gitca407c7246bf-4.el8_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2108" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3514" ref_url="https://www.suse.com/security/cve/CVE-2021-3514/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3514/">CVE-2021-3514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3514">CVE-2021-3514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837397" comment="389-ds-base-1.4.3.16-16.module+el8.4.0+11446+fc96bc48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837398" comment="389-ds-base-devel-1.4.3.16-16.module+el8.4.0+11446+fc96bc48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837399" comment="389-ds-base-legacy-tools-1.4.3.16-16.module+el8.4.0+11446+fc96bc48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837400" comment="389-ds-base-libs-1.4.3.16-16.module+el8.4.0+11446+fc96bc48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837401" comment="389-ds-base-snmp-1.4.3.16-16.module+el8.4.0+11446+fc96bc48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837402" comment="python3-lib389-1.4.3.16-16.module+el8.4.0+11446+fc96bc48 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2109" version="1" class="patch">
	<metadata>
		<title>security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2660.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2660.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837403" comment="linuxptp-2.0-5.el8_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2110" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2714.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2714.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837404" comment="bpftool-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837405" comment="kernel-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837406" comment="kernel-abi-stablelists-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837407" comment="kernel-core-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837408" comment="kernel-cross-headers-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837409" comment="kernel-debug-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837410" comment="kernel-debug-core-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837412" comment="kernel-debug-modules-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837413" comment="kernel-debug-modules-extra-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837415" comment="kernel-doc-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837416" comment="kernel-headers-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837417" comment="kernel-modules-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837418" comment="kernel-modules-extra-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837419" comment="kernel-tools-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837420" comment="kernel-tools-libs-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837422" comment="perf-4.18.0-305.10.2.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837423" comment="python3-perf-4.18.0-305.10.2.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2111" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2717.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2717.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837424" comment="systemd-239-45.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837425" comment="systemd-container-239-45.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837426" comment="systemd-devel-239-45.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837427" comment="systemd-journal-remote-239-45.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837428" comment="systemd-libs-239-45.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837429" comment="systemd-pam-239-45.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837430" comment="systemd-tests-239-45.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837431" comment="systemd-udev-239-45.el8_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2112" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2743.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2743.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837432" comment="firefox-78.12.0-1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2113" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2776.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2776.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837433" comment="java-1.8.0-openjdk-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837434" comment="java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837435" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837436" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837437" comment="java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837438" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837439" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837440" comment="java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837441" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837442" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837443" comment="java-1.8.0-openjdk-fastdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837444" comment="java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837445" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837446" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837447" comment="java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837448" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837449" comment="java-1.8.0-openjdk-slowdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837450" comment="java-1.8.0-openjdk-src-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837451" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.302.b08-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837452" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.302.b08-0.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2114" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2781.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2781.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837453" comment="java-11-openjdk-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837454" comment="java-11-openjdk-demo-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837455" comment="java-11-openjdk-demo-fastdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837456" comment="java-11-openjdk-demo-slowdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837457" comment="java-11-openjdk-devel-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837458" comment="java-11-openjdk-devel-fastdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837459" comment="java-11-openjdk-devel-slowdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837460" comment="java-11-openjdk-fastdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837461" comment="java-11-openjdk-headless-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837462" comment="java-11-openjdk-headless-fastdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837463" comment="java-11-openjdk-headless-slowdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837464" comment="java-11-openjdk-javadoc-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837465" comment="java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837466" comment="java-11-openjdk-jmods-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837467" comment="java-11-openjdk-jmods-fastdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837468" comment="java-11-openjdk-jmods-slowdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837469" comment="java-11-openjdk-slowdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837470" comment="java-11-openjdk-src-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837471" comment="java-11-openjdk-src-fastdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837472" comment="java-11-openjdk-src-slowdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837473" comment="java-11-openjdk-static-libs-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837474" comment="java-11-openjdk-static-libs-fastdebug-11.0.12.0.7-0.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837475" comment="java-11-openjdk-static-libs-slowdebug-11.0.12.0.7-0.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2115" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29969" ref_url="https://www.suse.com/security/cve/CVE-2021-29969/" source="CVE"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2883.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2883.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29969/">CVE-2021-29969 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29969">CVE-2021-29969 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837476" comment="thunderbird-78.12.0-3.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2116" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36327" ref_url="https://www.suse.com/security/cve/CVE-2020-36327/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3020.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3020.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36327/">CVE-2020-36327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36327">CVE-2020-36327 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837477" comment="ruby-2.7.4-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837478" comment="ruby-default-gems-2.7.4-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837479" comment="ruby-devel-2.7.4-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837480" comment="ruby-doc-2.7.4-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837481" comment="ruby-libs-2.7.4-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837307" comment="rubygem-abrt-0.4.0-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837308" comment="rubygem-abrt-doc-0.4.0-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837482" comment="rubygem-bigdecimal-2.0.0-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837310" comment="rubygem-bson-4.8.1-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837311" comment="rubygem-bson-doc-4.8.1-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837483" comment="rubygem-bundler-2.2.24-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837484" comment="rubygem-io-console-0.5.6-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837485" comment="rubygem-irb-1.2.6-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837486" comment="rubygem-json-2.3.0-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837487" comment="rubygem-minitest-5.13.0-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837317" comment="rubygem-mongo-2.11.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837318" comment="rubygem-mongo-doc-2.11.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837319" comment="rubygem-mysql2-0.5.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837320" comment="rubygem-mysql2-doc-0.5.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837488" comment="rubygem-net-telnet-0.2.0-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837489" comment="rubygem-openssl-2.1.2-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837323" comment="rubygem-pg-1.2.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837324" comment="rubygem-pg-doc-1.2.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837490" comment="rubygem-power_assert-1.1.7-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837491" comment="rubygem-psych-3.1.0-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837492" comment="rubygem-rake-13.0.1-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837493" comment="rubygem-rdoc-6.2.1.1-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837494" comment="rubygem-test-unit-3.3.4-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837495" comment="rubygem-xmlrpc-0.3.0-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837496" comment="rubygems-3.1.6-137.module+el8.4.0+12025+f744ca41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837497" comment="rubygems-devel-3.1.6-137.module+el8.4.0+12025+f744ca41 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2117" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3027.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3027.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837498" comment="microcode_ctl-20210216-1.20210608.1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2118" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3057.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3057.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837499" comment="bpftool-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837500" comment="kernel-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837501" comment="kernel-abi-stablelists-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837502" comment="kernel-core-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837503" comment="kernel-cross-headers-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837504" comment="kernel-debug-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837505" comment="kernel-debug-core-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837507" comment="kernel-debug-modules-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837508" comment="kernel-debug-modules-extra-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837510" comment="kernel-doc-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837511" comment="kernel-headers-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837512" comment="kernel-modules-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837513" comment="kernel-modules-extra-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837514" comment="kernel-tools-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837515" comment="kernel-tools-libs-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837517" comment="perf-4.18.0-305.12.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837518" comment="python3-perf-4.18.0-305.12.1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2119" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3058.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3058.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837519" comment="glib2-2.56.4-10.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837520" comment="glib2-devel-2.56.4-10.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837521" comment="glib2-doc-2.56.4-10.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837522" comment="glib2-fam-2.56.4-10.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837523" comment="glib2-static-2.56.4-10.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837524" comment="glib2-tests-2.56.4-10.el8_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2120" version="1" class="patch">
	<metadata>
		<title>security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36323" ref_url="https://www.suse.com/security/cve/CVE-2020-36323/" source="CVE"/>
		<reference ref_id="CVE-2021-28875" ref_url="https://www.suse.com/security/cve/CVE-2021-28875/" source="CVE"/>
		<reference ref_id="CVE-2021-28876" ref_url="https://www.suse.com/security/cve/CVE-2021-28876/" source="CVE"/>
		<reference ref_id="CVE-2021-28877" ref_url="https://www.suse.com/security/cve/CVE-2021-28877/" source="CVE"/>
		<reference ref_id="CVE-2021-28878" ref_url="https://www.suse.com/security/cve/CVE-2021-28878/" source="CVE"/>
		<reference ref_id="CVE-2021-28879" ref_url="https://www.suse.com/security/cve/CVE-2021-28879/" source="CVE"/>
		<reference ref_id="CVE-2021-31162" ref_url="https://www.suse.com/security/cve/CVE-2021-31162/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36323/">CVE-2020-36323 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36323">CVE-2020-36323 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28875/">CVE-2021-28875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28875">CVE-2021-28875 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28876/">CVE-2021-28876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28876">CVE-2021-28876 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28877/">CVE-2021-28877 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28877">CVE-2021-28877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28878/">CVE-2021-28878 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28878">CVE-2021-28878 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28879/">CVE-2021-28879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28879">CVE-2021-28879 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31162/">CVE-2021-31162 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31162">CVE-2021-31162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837525" comment="cargo-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837526" comment="cargo-doc-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837527" comment="clippy-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837528" comment="rls-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837529" comment="rust-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837530" comment="rust-analysis-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837531" comment="rust-debugger-common-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837532" comment="rust-doc-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837533" comment="rust-gdb-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837534" comment="rust-lldb-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837535" comment="rust-src-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837536" comment="rust-std-static-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837537" comment="rust-toolset-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837538" comment="rustfmt-1.52.1-1.module+el8.4.0+11282+0729bac9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2121" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38575" ref_url="https://www.suse.com/security/cve/CVE-2021-38575/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3066.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3066.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38575/">CVE-2021-38575 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38575">CVE-2021-38575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837539" comment="edk2-ovmf-20200602gitca407c7246bf-4.el8_4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2122" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3073.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3073.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23362">CVE-2021-23362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27290">CVE-2021-27290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837540" comment="nodejs-12.22.3-2.module+el8.4.0+11732+c668cc9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837541" comment="nodejs-devel-12.22.3-2.module+el8.4.0+11732+c668cc9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837542" comment="nodejs-docs-12.22.3-2.module+el8.4.0+11732+c668cc9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837543" comment="nodejs-full-i18n-12.22.3-2.module+el8.4.0+11732+c668cc9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837544" comment="nodejs-nodemon-2.0.3-1.module+el8.4.0+11732+c668cc9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837545" comment="npm-6.14.13-1.12.22.3.2.module+el8.4.0+11732+c668cc9f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2123" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3074.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3074.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23362">CVE-2021-23362 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27290">CVE-2021-27290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837546" comment="nodejs-14.17.3-2.module+el8.4.0+11738+3bd42762 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837547" comment="nodejs-devel-14.17.3-2.module+el8.4.0+11738+3bd42762 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837548" comment="nodejs-docs-14.17.3-2.module+el8.4.0+11738+3bd42762 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837549" comment="nodejs-full-i18n-14.17.3-2.module+el8.4.0+11738+3bd42762 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835981" comment="nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837550" comment="npm-6.14.13-1.14.17.3.2.module+el8.4.0+11738+3bd42762 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2124" version="1" class="patch">
	<metadata>
		<title>security update for libuv (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3075.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3075.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22918">CVE-2021-22918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837551" comment="libuv-1.41.1-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837552" comment="libuv-devel-1.41.1-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2125" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-27918" ref_url="https://www.suse.com/security/cve/CVE-2021-27918/" source="CVE"/>
		<reference ref_id="CVE-2021-31525" ref_url="https://www.suse.com/security/cve/CVE-2021-31525/" source="CVE"/>
		<reference ref_id="CVE-2021-33196" ref_url="https://www.suse.com/security/cve/CVE-2021-33196/" source="CVE"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3076.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3076.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-27918/">CVE-2021-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31525/">CVE-2021-31525 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31525">CVE-2021-31525 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33196/">CVE-2021-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836717" comment="delve-1.5.0-2.module+el8.4.0+8864+58b0fcdb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837553" comment="go-toolset-1.15.14-1.module+el8.4.0+11833+614b07b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837554" comment="golang-1.15.14-1.module+el8.4.0+11833+614b07b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837555" comment="golang-bin-1.15.14-1.module+el8.4.0+11833+614b07b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837556" comment="golang-docs-1.15.14-1.module+el8.4.0+11833+614b07b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837557" comment="golang-misc-1.15.14-1.module+el8.4.0+11833+614b07b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837558" comment="golang-race-1.15.14-1.module+el8.4.0+11833+614b07b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837559" comment="golang-src-1.15.14-1.module+el8.4.0+11833+614b07b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837560" comment="golang-tests-1.15.14-1.module+el8.4.0+11833+614b07b8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2126" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3652" ref_url="https://www.suse.com/security/cve/CVE-2021-3652/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3652/">CVE-2021-3652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3652">CVE-2021-3652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837561" comment="389-ds-base-1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837562" comment="389-ds-base-devel-1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837563" comment="389-ds-base-legacy-tools-1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837564" comment="389-ds-base-libs-1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837565" comment="389-ds-base-snmp-1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837566" comment="python3-lib389-1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2127" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3429" ref_url="https://www.suse.com/security/cve/CVE-2021-3429/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3081.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3081.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3429/">CVE-2021-3429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3429">CVE-2021-3429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837567" comment="cloud-init-20.3-10.el8_4.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2128" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-26423" ref_url="https://www.suse.com/security/cve/CVE-2021-26423/" source="CVE"/>
		<reference ref_id="CVE-2021-34485" ref_url="https://www.suse.com/security/cve/CVE-2021-34485/" source="CVE"/>
		<reference ref_id="CVE-2021-34532" ref_url="https://www.suse.com/security/cve/CVE-2021-34532/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26423/">CVE-2021-26423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26423">CVE-2021-26423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34485/">CVE-2021-34485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34485">CVE-2021-34485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34532/">CVE-2021-34532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34532">CVE-2021-34532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837568" comment="aspnetcore-runtime-3.1-3.1.18-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837569" comment="aspnetcore-targeting-pack-3.1-3.1.18-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837570" comment="dotnet-apphost-pack-3.1-3.1.18-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837571" comment="dotnet-hostfxr-3.1-3.1.18-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837572" comment="dotnet-runtime-3.1-3.1.18-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837573" comment="dotnet-sdk-3.1-3.1.118-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837574" comment="dotnet-targeting-pack-3.1-3.1.18-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837575" comment="dotnet-templates-3.1-3.1.118-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2129" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-34485" ref_url="https://www.suse.com/security/cve/CVE-2021-34485/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34485/">CVE-2021-34485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34485">CVE-2021-34485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837576" comment="dotnet-host-fxr-2.1-2.1.29-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837577" comment="dotnet-runtime-2.1-2.1.29-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837578" comment="dotnet-sdk-2.1-2.1.525-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837579" comment="dotnet-sdk-2.1.5xx-2.1.525-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2130" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-26423" ref_url="https://www.suse.com/security/cve/CVE-2021-26423/" source="CVE"/>
		<reference ref_id="CVE-2021-34485" ref_url="https://www.suse.com/security/cve/CVE-2021-34485/" source="CVE"/>
		<reference ref_id="CVE-2021-34532" ref_url="https://www.suse.com/security/cve/CVE-2021-34532/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3148.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3148.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-26423/">CVE-2021-26423 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26423">CVE-2021-26423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34485/">CVE-2021-34485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34485">CVE-2021-34485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34532/">CVE-2021-34532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34532">CVE-2021-34532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837580" comment="aspnetcore-runtime-5.0-5.0.9-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837581" comment="aspnetcore-targeting-pack-5.0-5.0.9-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837582" comment="dotnet-5.0.206-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837583" comment="dotnet-apphost-pack-5.0-5.0.9-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837584" comment="dotnet-host-5.0.9-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837585" comment="dotnet-hostfxr-5.0-5.0.9-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837586" comment="dotnet-runtime-5.0-5.0.9-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837587" comment="dotnet-sdk-5.0-5.0.206-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837588" comment="dotnet-targeting-pack-5.0-5.0.9-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837589" comment="dotnet-templates-5.0-5.0.206-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837590" comment="netstandard-targeting-pack-2.1-5.0.206-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2131" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3621" ref_url="https://www.suse.com/security/cve/CVE-2021-3621/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3621/">CVE-2021-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3621">CVE-2021-3621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837591" comment="libipa_hbac-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837592" comment="libsss_autofs-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837593" comment="libsss_certmap-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837594" comment="libsss_idmap-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837595" comment="libsss_nss_idmap-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837596" comment="libsss_nss_idmap-devel-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837597" comment="libsss_simpleifp-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837598" comment="libsss_sudo-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837599" comment="python3-libipa_hbac-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837600" comment="python3-libsss_nss_idmap-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837601" comment="python3-sss-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837602" comment="python3-sss-murmur-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837603" comment="python3-sssdconfig-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837604" comment="sssd-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837605" comment="sssd-ad-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837606" comment="sssd-client-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837607" comment="sssd-common-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837608" comment="sssd-common-pac-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837609" comment="sssd-dbus-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837610" comment="sssd-ipa-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837611" comment="sssd-kcm-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837612" comment="sssd-krb5-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837613" comment="sssd-krb5-common-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837614" comment="sssd-ldap-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837615" comment="sssd-libwbclient-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837616" comment="sssd-nfs-idmap-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837617" comment="sssd-polkit-rules-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837618" comment="sssd-proxy-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837619" comment="sssd-tools-2.4.0-9.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837620" comment="sssd-winbind-idmap-2.4.0-9.el8_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2132" version="1" class="patch">
	<metadata>
		<title>security update for exiv2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3152.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3152.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837621" comment="exiv2-0.27.3-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837622" comment="exiv2-devel-0.27.3-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837623" comment="exiv2-doc-0.27.3-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837624" comment="exiv2-libs-0.27.3-3.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2133" version="1" class="patch">
	<metadata>
		<title>security update for compat-exiv2-026 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3153.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3153.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837625" comment="compat-exiv2-026-0.26-4.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2134" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3155.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3155.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837626" comment="thunderbird-78.13.0-1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2135" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3157.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3157.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837627" comment="firefox-78.13.0-2.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2136" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3253.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3253.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837628" comment="libsndfile-1.0.28-10.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837629" comment="libsndfile-devel-1.0.28-10.el8_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2137" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="CVE-2021-38201" ref_url="https://www.suse.com/security/cve/CVE-2021-38201/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3447.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3447.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38201/">CVE-2021-38201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38201">CVE-2021-38201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837630" comment="bpftool-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837631" comment="kernel-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837632" comment="kernel-abi-stablelists-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837633" comment="kernel-core-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837634" comment="kernel-cross-headers-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837635" comment="kernel-debug-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837636" comment="kernel-debug-core-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837638" comment="kernel-debug-modules-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837639" comment="kernel-debug-modules-extra-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837641" comment="kernel-doc-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837642" comment="kernel-headers-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837643" comment="kernel-modules-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837644" comment="kernel-modules-extra-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837645" comment="kernel-tools-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837646" comment="kernel-tools-libs-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837648" comment="perf-4.18.0-305.17.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837649" comment="python3-perf-4.18.0-305.17.1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2138" version="1" class="patch">
	<metadata>
		<title>security update for cyrus-imapd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33582" ref_url="https://www.suse.com/security/cve/CVE-2021-33582/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3492.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3492.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33582/">CVE-2021-33582 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33582">CVE-2021-33582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837650" comment="cyrus-imapd-3.0.7-20.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837651" comment="cyrus-imapd-utils-3.0.7-20.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837652" comment="cyrus-imapd-vzic-3.0.7-20.el8_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2139" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3497.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3497.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38493">CVE-2021-38493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837653" comment="firefox-78.14.0-1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2140" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3499.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3499.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38493">CVE-2021-38493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837654" comment="thunderbird-78.14.0-1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2141" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3548.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3548.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837655" comment="bpftool-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837656" comment="kernel-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837657" comment="kernel-abi-stablelists-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837658" comment="kernel-core-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837659" comment="kernel-cross-headers-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837660" comment="kernel-debug-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837661" comment="kernel-debug-core-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837663" comment="kernel-debug-modules-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837664" comment="kernel-debug-modules-extra-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837666" comment="kernel-doc-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837667" comment="kernel-headers-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837668" comment="kernel-modules-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837669" comment="kernel-modules-extra-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837670" comment="kernel-tools-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837671" comment="kernel-tools-libs-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837673" comment="perf-4.18.0-305.19.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837674" comment="python3-perf-4.18.0-305.19.1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2142" version="1" class="patch">
	<metadata>
		<title>security update for nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3572.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3572.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837675" comment="nspr-4.32.0-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837676" comment="nspr-devel-4.32.0-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837677" comment="nss-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837678" comment="nss-devel-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837679" comment="nss-softokn-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837680" comment="nss-softokn-devel-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837681" comment="nss-softokn-freebl-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837682" comment="nss-softokn-freebl-devel-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837683" comment="nss-sysinit-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837684" comment="nss-tools-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837685" comment="nss-util-3.67.0-6.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837686" comment="nss-util-devel-3.67.0-6.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2143" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3576.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3576.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837687" comment="krb5-devel-1.18.2-8.3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837688" comment="krb5-libs-1.18.2-8.3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837689" comment="krb5-pkinit-1.18.2-8.3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837690" comment="krb5-server-1.18.2-8.3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837691" comment="krb5-server-ldap-1.18.2-8.3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837692" comment="krb5-workstation-1.18.2-8.3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837693" comment="libkadm5-1.18.2-8.3.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2144" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837694" comment="curl-7.61.1-18.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837695" comment="libcurl-7.61.1-18.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837696" comment="libcurl-devel-7.61.1-18.el8_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837697" comment="libcurl-minimal-7.61.1-18.el8_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2145" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29923" ref_url="https://www.suse.com/security/cve/CVE-2021-29923/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29923/">CVE-2021-29923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836717" comment="delve-1.5.0-2.module+el8.4.0+8864+58b0fcdb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837698" comment="go-toolset-1.15.14-2.module+el8.4.0+12542+e3fec473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837699" comment="golang-1.15.14-2.module+el8.4.0+12542+e3fec473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837700" comment="golang-bin-1.15.14-2.module+el8.4.0+12542+e3fec473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837701" comment="golang-docs-1.15.14-2.module+el8.4.0+12542+e3fec473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837702" comment="golang-misc-1.15.14-2.module+el8.4.0+12542+e3fec473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837703" comment="golang-race-1.15.14-2.module+el8.4.0+12542+e3fec473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837704" comment="golang-src-1.15.14-2.module+el8.4.0+12542+e3fec473 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837705" comment="golang-tests-1.15.14-2.module+el8.4.0+12542+e3fec473 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2146" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14672" ref_url="https://www.suse.com/security/cve/CVE-2020-14672/" source="CVE"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14769" ref_url="https://www.suse.com/security/cve/CVE-2020-14769/" source="CVE"/>
		<reference ref_id="CVE-2020-14773" ref_url="https://www.suse.com/security/cve/CVE-2020-14773/" source="CVE"/>
		<reference ref_id="CVE-2020-14775" ref_url="https://www.suse.com/security/cve/CVE-2020-14775/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14777" ref_url="https://www.suse.com/security/cve/CVE-2020-14777/" source="CVE"/>
		<reference ref_id="CVE-2020-14785" ref_url="https://www.suse.com/security/cve/CVE-2020-14785/" source="CVE"/>
		<reference ref_id="CVE-2020-14786" ref_url="https://www.suse.com/security/cve/CVE-2020-14786/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14790" ref_url="https://www.suse.com/security/cve/CVE-2020-14790/" source="CVE"/>
		<reference ref_id="CVE-2020-14791" ref_url="https://www.suse.com/security/cve/CVE-2020-14791/" source="CVE"/>
		<reference ref_id="CVE-2020-14793" ref_url="https://www.suse.com/security/cve/CVE-2020-14793/" source="CVE"/>
		<reference ref_id="CVE-2020-14794" ref_url="https://www.suse.com/security/cve/CVE-2020-14794/" source="CVE"/>
		<reference ref_id="CVE-2020-14800" ref_url="https://www.suse.com/security/cve/CVE-2020-14800/" source="CVE"/>
		<reference ref_id="CVE-2020-14804" ref_url="https://www.suse.com/security/cve/CVE-2020-14804/" source="CVE"/>
		<reference ref_id="CVE-2020-14809" ref_url="https://www.suse.com/security/cve/CVE-2020-14809/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-14814" ref_url="https://www.suse.com/security/cve/CVE-2020-14814/" source="CVE"/>
		<reference ref_id="CVE-2020-14821" ref_url="https://www.suse.com/security/cve/CVE-2020-14821/" source="CVE"/>
		<reference ref_id="CVE-2020-14828" ref_url="https://www.suse.com/security/cve/CVE-2020-14828/" source="CVE"/>
		<reference ref_id="CVE-2020-14829" ref_url="https://www.suse.com/security/cve/CVE-2020-14829/" source="CVE"/>
		<reference ref_id="CVE-2020-14830" ref_url="https://www.suse.com/security/cve/CVE-2020-14830/" source="CVE"/>
		<reference ref_id="CVE-2020-14836" ref_url="https://www.suse.com/security/cve/CVE-2020-14836/" source="CVE"/>
		<reference ref_id="CVE-2020-14837" ref_url="https://www.suse.com/security/cve/CVE-2020-14837/" source="CVE"/>
		<reference ref_id="CVE-2020-14838" ref_url="https://www.suse.com/security/cve/CVE-2020-14838/" source="CVE"/>
		<reference ref_id="CVE-2020-14839" ref_url="https://www.suse.com/security/cve/CVE-2020-14839/" source="CVE"/>
		<reference ref_id="CVE-2020-14844" ref_url="https://www.suse.com/security/cve/CVE-2020-14844/" source="CVE"/>
		<reference ref_id="CVE-2020-14845" ref_url="https://www.suse.com/security/cve/CVE-2020-14845/" source="CVE"/>
		<reference ref_id="CVE-2020-14846" ref_url="https://www.suse.com/security/cve/CVE-2020-14846/" source="CVE"/>
		<reference ref_id="CVE-2020-14848" ref_url="https://www.suse.com/security/cve/CVE-2020-14848/" source="CVE"/>
		<reference ref_id="CVE-2020-14852" ref_url="https://www.suse.com/security/cve/CVE-2020-14852/" source="CVE"/>
		<reference ref_id="CVE-2020-14860" ref_url="https://www.suse.com/security/cve/CVE-2020-14860/" source="CVE"/>
		<reference ref_id="CVE-2020-14861" ref_url="https://www.suse.com/security/cve/CVE-2020-14861/" source="CVE"/>
		<reference ref_id="CVE-2020-14866" ref_url="https://www.suse.com/security/cve/CVE-2020-14866/" source="CVE"/>
		<reference ref_id="CVE-2020-14867" ref_url="https://www.suse.com/security/cve/CVE-2020-14867/" source="CVE"/>
		<reference ref_id="CVE-2020-14868" ref_url="https://www.suse.com/security/cve/CVE-2020-14868/" source="CVE"/>
		<reference ref_id="CVE-2020-14870" ref_url="https://www.suse.com/security/cve/CVE-2020-14870/" source="CVE"/>
		<reference ref_id="CVE-2020-14873" ref_url="https://www.suse.com/security/cve/CVE-2020-14873/" source="CVE"/>
		<reference ref_id="CVE-2020-14888" ref_url="https://www.suse.com/security/cve/CVE-2020-14888/" source="CVE"/>
		<reference ref_id="CVE-2020-14891" ref_url="https://www.suse.com/security/cve/CVE-2020-14891/" source="CVE"/>
		<reference ref_id="CVE-2020-14893" ref_url="https://www.suse.com/security/cve/CVE-2020-14893/" source="CVE"/>
		<reference ref_id="CVE-2021-2001" ref_url="https://www.suse.com/security/cve/CVE-2021-2001/" source="CVE"/>
		<reference ref_id="CVE-2021-2002" ref_url="https://www.suse.com/security/cve/CVE-2021-2002/" source="CVE"/>
		<reference ref_id="CVE-2021-2010" ref_url="https://www.suse.com/security/cve/CVE-2021-2010/" source="CVE"/>
		<reference ref_id="CVE-2021-2011" ref_url="https://www.suse.com/security/cve/CVE-2021-2011/" source="CVE"/>
		<reference ref_id="CVE-2021-2021" ref_url="https://www.suse.com/security/cve/CVE-2021-2021/" source="CVE"/>
		<reference ref_id="CVE-2021-2022" ref_url="https://www.suse.com/security/cve/CVE-2021-2022/" source="CVE"/>
		<reference ref_id="CVE-2021-2024" ref_url="https://www.suse.com/security/cve/CVE-2021-2024/" source="CVE"/>
		<reference ref_id="CVE-2021-2028" ref_url="https://www.suse.com/security/cve/CVE-2021-2028/" source="CVE"/>
		<reference ref_id="CVE-2021-2030" ref_url="https://www.suse.com/security/cve/CVE-2021-2030/" source="CVE"/>
		<reference ref_id="CVE-2021-2031" ref_url="https://www.suse.com/security/cve/CVE-2021-2031/" source="CVE"/>
		<reference ref_id="CVE-2021-2032" ref_url="https://www.suse.com/security/cve/CVE-2021-2032/" source="CVE"/>
		<reference ref_id="CVE-2021-2036" ref_url="https://www.suse.com/security/cve/CVE-2021-2036/" source="CVE"/>
		<reference ref_id="CVE-2021-2038" ref_url="https://www.suse.com/security/cve/CVE-2021-2038/" source="CVE"/>
		<reference ref_id="CVE-2021-2042" ref_url="https://www.suse.com/security/cve/CVE-2021-2042/" source="CVE"/>
		<reference ref_id="CVE-2021-2046" ref_url="https://www.suse.com/security/cve/CVE-2021-2046/" source="CVE"/>
		<reference ref_id="CVE-2021-2048" ref_url="https://www.suse.com/security/cve/CVE-2021-2048/" source="CVE"/>
		<reference ref_id="CVE-2021-2055" ref_url="https://www.suse.com/security/cve/CVE-2021-2055/" source="CVE"/>
		<reference ref_id="CVE-2021-2056" ref_url="https://www.suse.com/security/cve/CVE-2021-2056/" source="CVE"/>
		<reference ref_id="CVE-2021-2058" ref_url="https://www.suse.com/security/cve/CVE-2021-2058/" source="CVE"/>
		<reference ref_id="CVE-2021-2060" ref_url="https://www.suse.com/security/cve/CVE-2021-2060/" source="CVE"/>
		<reference ref_id="CVE-2021-2061" ref_url="https://www.suse.com/security/cve/CVE-2021-2061/" source="CVE"/>
		<reference ref_id="CVE-2021-2065" ref_url="https://www.suse.com/security/cve/CVE-2021-2065/" source="CVE"/>
		<reference ref_id="CVE-2021-2070" ref_url="https://www.suse.com/security/cve/CVE-2021-2070/" source="CVE"/>
		<reference ref_id="CVE-2021-2072" ref_url="https://www.suse.com/security/cve/CVE-2021-2072/" source="CVE"/>
		<reference ref_id="CVE-2021-2076" ref_url="https://www.suse.com/security/cve/CVE-2021-2076/" source="CVE"/>
		<reference ref_id="CVE-2021-2081" ref_url="https://www.suse.com/security/cve/CVE-2021-2081/" source="CVE"/>
		<reference ref_id="CVE-2021-2087" ref_url="https://www.suse.com/security/cve/CVE-2021-2087/" source="CVE"/>
		<reference ref_id="CVE-2021-2088" ref_url="https://www.suse.com/security/cve/CVE-2021-2088/" source="CVE"/>
		<reference ref_id="CVE-2021-2122" ref_url="https://www.suse.com/security/cve/CVE-2021-2122/" source="CVE"/>
		<reference ref_id="CVE-2021-2146" ref_url="https://www.suse.com/security/cve/CVE-2021-2146/" source="CVE"/>
		<reference ref_id="CVE-2021-2164" ref_url="https://www.suse.com/security/cve/CVE-2021-2164/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-2169" ref_url="https://www.suse.com/security/cve/CVE-2021-2169/" source="CVE"/>
		<reference ref_id="CVE-2021-2170" ref_url="https://www.suse.com/security/cve/CVE-2021-2170/" source="CVE"/>
		<reference ref_id="CVE-2021-2171" ref_url="https://www.suse.com/security/cve/CVE-2021-2171/" source="CVE"/>
		<reference ref_id="CVE-2021-2172" ref_url="https://www.suse.com/security/cve/CVE-2021-2172/" source="CVE"/>
		<reference ref_id="CVE-2021-2174" ref_url="https://www.suse.com/security/cve/CVE-2021-2174/" source="CVE"/>
		<reference ref_id="CVE-2021-2178" ref_url="https://www.suse.com/security/cve/CVE-2021-2178/" source="CVE"/>
		<reference ref_id="CVE-2021-2179" ref_url="https://www.suse.com/security/cve/CVE-2021-2179/" source="CVE"/>
		<reference ref_id="CVE-2021-2180" ref_url="https://www.suse.com/security/cve/CVE-2021-2180/" source="CVE"/>
		<reference ref_id="CVE-2021-2193" ref_url="https://www.suse.com/security/cve/CVE-2021-2193/" source="CVE"/>
		<reference ref_id="CVE-2021-2194" ref_url="https://www.suse.com/security/cve/CVE-2021-2194/" source="CVE"/>
		<reference ref_id="CVE-2021-2196" ref_url="https://www.suse.com/security/cve/CVE-2021-2196/" source="CVE"/>
		<reference ref_id="CVE-2021-2201" ref_url="https://www.suse.com/security/cve/CVE-2021-2201/" source="CVE"/>
		<reference ref_id="CVE-2021-2202" ref_url="https://www.suse.com/security/cve/CVE-2021-2202/" source="CVE"/>
		<reference ref_id="CVE-2021-2203" ref_url="https://www.suse.com/security/cve/CVE-2021-2203/" source="CVE"/>
		<reference ref_id="CVE-2021-2208" ref_url="https://www.suse.com/security/cve/CVE-2021-2208/" source="CVE"/>
		<reference ref_id="CVE-2021-2212" ref_url="https://www.suse.com/security/cve/CVE-2021-2212/" source="CVE"/>
		<reference ref_id="CVE-2021-2213" ref_url="https://www.suse.com/security/cve/CVE-2021-2213/" source="CVE"/>
		<reference ref_id="CVE-2021-2215" ref_url="https://www.suse.com/security/cve/CVE-2021-2215/" source="CVE"/>
		<reference ref_id="CVE-2021-2217" ref_url="https://www.suse.com/security/cve/CVE-2021-2217/" source="CVE"/>
		<reference ref_id="CVE-2021-2226" ref_url="https://www.suse.com/security/cve/CVE-2021-2226/" source="CVE"/>
		<reference ref_id="CVE-2021-2230" ref_url="https://www.suse.com/security/cve/CVE-2021-2230/" source="CVE"/>
		<reference ref_id="CVE-2021-2232" ref_url="https://www.suse.com/security/cve/CVE-2021-2232/" source="CVE"/>
		<reference ref_id="CVE-2021-2278" ref_url="https://www.suse.com/security/cve/CVE-2021-2278/" source="CVE"/>
		<reference ref_id="CVE-2021-2293" ref_url="https://www.suse.com/security/cve/CVE-2021-2293/" source="CVE"/>
		<reference ref_id="CVE-2021-2298" ref_url="https://www.suse.com/security/cve/CVE-2021-2298/" source="CVE"/>
		<reference ref_id="CVE-2021-2299" ref_url="https://www.suse.com/security/cve/CVE-2021-2299/" source="CVE"/>
		<reference ref_id="CVE-2021-2300" ref_url="https://www.suse.com/security/cve/CVE-2021-2300/" source="CVE"/>
		<reference ref_id="CVE-2021-2301" ref_url="https://www.suse.com/security/cve/CVE-2021-2301/" source="CVE"/>
		<reference ref_id="CVE-2021-2304" ref_url="https://www.suse.com/security/cve/CVE-2021-2304/" source="CVE"/>
		<reference ref_id="CVE-2021-2305" ref_url="https://www.suse.com/security/cve/CVE-2021-2305/" source="CVE"/>
		<reference ref_id="CVE-2021-2307" ref_url="https://www.suse.com/security/cve/CVE-2021-2307/" source="CVE"/>
		<reference ref_id="CVE-2021-2308" ref_url="https://www.suse.com/security/cve/CVE-2021-2308/" source="CVE"/>
		<reference ref_id="CVE-2021-2339" ref_url="https://www.suse.com/security/cve/CVE-2021-2339/" source="CVE"/>
		<reference ref_id="CVE-2021-2340" ref_url="https://www.suse.com/security/cve/CVE-2021-2340/" source="CVE"/>
		<reference ref_id="CVE-2021-2342" ref_url="https://www.suse.com/security/cve/CVE-2021-2342/" source="CVE"/>
		<reference ref_id="CVE-2021-2352" ref_url="https://www.suse.com/security/cve/CVE-2021-2352/" source="CVE"/>
		<reference ref_id="CVE-2021-2354" ref_url="https://www.suse.com/security/cve/CVE-2021-2354/" source="CVE"/>
		<reference ref_id="CVE-2021-2356" ref_url="https://www.suse.com/security/cve/CVE-2021-2356/" source="CVE"/>
		<reference ref_id="CVE-2021-2357" ref_url="https://www.suse.com/security/cve/CVE-2021-2357/" source="CVE"/>
		<reference ref_id="CVE-2021-2367" ref_url="https://www.suse.com/security/cve/CVE-2021-2367/" source="CVE"/>
		<reference ref_id="CVE-2021-2370" ref_url="https://www.suse.com/security/cve/CVE-2021-2370/" source="CVE"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2374" ref_url="https://www.suse.com/security/cve/CVE-2021-2374/" source="CVE"/>
		<reference ref_id="CVE-2021-2383" ref_url="https://www.suse.com/security/cve/CVE-2021-2383/" source="CVE"/>
		<reference ref_id="CVE-2021-2384" ref_url="https://www.suse.com/security/cve/CVE-2021-2384/" source="CVE"/>
		<reference ref_id="CVE-2021-2385" ref_url="https://www.suse.com/security/cve/CVE-2021-2385/" source="CVE"/>
		<reference ref_id="CVE-2021-2387" ref_url="https://www.suse.com/security/cve/CVE-2021-2387/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<reference ref_id="CVE-2021-2390" ref_url="https://www.suse.com/security/cve/CVE-2021-2390/" source="CVE"/>
		<reference ref_id="CVE-2021-2399" ref_url="https://www.suse.com/security/cve/CVE-2021-2399/" source="CVE"/>
		<reference ref_id="CVE-2021-2402" ref_url="https://www.suse.com/security/cve/CVE-2021-2402/" source="CVE"/>
		<reference ref_id="CVE-2021-2410" ref_url="https://www.suse.com/security/cve/CVE-2021-2410/" source="CVE"/>
		<reference ref_id="CVE-2021-2412" ref_url="https://www.suse.com/security/cve/CVE-2021-2412/" source="CVE"/>
		<reference ref_id="CVE-2021-2417" ref_url="https://www.suse.com/security/cve/CVE-2021-2417/" source="CVE"/>
		<reference ref_id="CVE-2021-2418" ref_url="https://www.suse.com/security/cve/CVE-2021-2418/" source="CVE"/>
		<reference ref_id="CVE-2021-2422" ref_url="https://www.suse.com/security/cve/CVE-2021-2422/" source="CVE"/>
		<reference ref_id="CVE-2021-2424" ref_url="https://www.suse.com/security/cve/CVE-2021-2424/" source="CVE"/>
		<reference ref_id="CVE-2021-2425" ref_url="https://www.suse.com/security/cve/CVE-2021-2425/" source="CVE"/>
		<reference ref_id="CVE-2021-2426" ref_url="https://www.suse.com/security/cve/CVE-2021-2426/" source="CVE"/>
		<reference ref_id="CVE-2021-2427" ref_url="https://www.suse.com/security/cve/CVE-2021-2427/" source="CVE"/>
		<reference ref_id="CVE-2021-2429" ref_url="https://www.suse.com/security/cve/CVE-2021-2429/" source="CVE"/>
		<reference ref_id="CVE-2021-2437" ref_url="https://www.suse.com/security/cve/CVE-2021-2437/" source="CVE"/>
		<reference ref_id="CVE-2021-2440" ref_url="https://www.suse.com/security/cve/CVE-2021-2440/" source="CVE"/>
		<reference ref_id="CVE-2021-2441" ref_url="https://www.suse.com/security/cve/CVE-2021-2441/" source="CVE"/>
		<reference ref_id="CVE-2021-2444" ref_url="https://www.suse.com/security/cve/CVE-2021-2444/" source="CVE"/>
		<reference ref_id="CVE-2021-35537" ref_url="https://www.suse.com/security/cve/CVE-2021-35537/" source="CVE"/>
		<reference ref_id="CVE-2021-35629" ref_url="https://www.suse.com/security/cve/CVE-2021-35629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3590.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3590.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14672/">CVE-2020-14672 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14672">CVE-2020-14672 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14765">CVE-2020-14765 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14769/">CVE-2020-14769 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14769">CVE-2020-14769 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14773/">CVE-2020-14773 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14773">CVE-2020-14773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14775/">CVE-2020-14775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14775">CVE-2020-14775 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14776">CVE-2020-14776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14777/">CVE-2020-14777 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14777">CVE-2020-14777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14785/">CVE-2020-14785 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14785">CVE-2020-14785 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14786/">CVE-2020-14786 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14786">CVE-2020-14786 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14789">CVE-2020-14789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14790/">CVE-2020-14790 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14790">CVE-2020-14790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14791/">CVE-2020-14791 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14791">CVE-2020-14791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14793/">CVE-2020-14793 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14793">CVE-2020-14793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14794/">CVE-2020-14794 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14794">CVE-2020-14794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14800/">CVE-2020-14800 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14800">CVE-2020-14800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14804/">CVE-2020-14804 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14804">CVE-2020-14804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14809/">CVE-2020-14809 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14809">CVE-2020-14809 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14812">CVE-2020-14812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14814/">CVE-2020-14814 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14814">CVE-2020-14814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14821/">CVE-2020-14821 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14821">CVE-2020-14821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14828/">CVE-2020-14828 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14828">CVE-2020-14828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14829/">CVE-2020-14829 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14829">CVE-2020-14829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14830/">CVE-2020-14830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14830">CVE-2020-14830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14836/">CVE-2020-14836 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14836">CVE-2020-14836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14837/">CVE-2020-14837 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14837">CVE-2020-14837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14838/">CVE-2020-14838 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14838">CVE-2020-14838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14839/">CVE-2020-14839 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14839">CVE-2020-14839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14844/">CVE-2020-14844 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14844">CVE-2020-14844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14845/">CVE-2020-14845 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14845">CVE-2020-14845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14846/">CVE-2020-14846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14846">CVE-2020-14846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14848/">CVE-2020-14848 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14848">CVE-2020-14848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14852/">CVE-2020-14852 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14852">CVE-2020-14852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14860/">CVE-2020-14860 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14860">CVE-2020-14860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14861/">CVE-2020-14861 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14861">CVE-2020-14861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14866/">CVE-2020-14866 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14866">CVE-2020-14866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14867/">CVE-2020-14867 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14867">CVE-2020-14867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14868/">CVE-2020-14868 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14868">CVE-2020-14868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14870/">CVE-2020-14870 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14870">CVE-2020-14870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14873/">CVE-2020-14873 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14873">CVE-2020-14873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14888/">CVE-2020-14888 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14888">CVE-2020-14888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14891/">CVE-2020-14891 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14891">CVE-2020-14891 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-14893/">CVE-2020-14893 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14893">CVE-2020-14893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2001/">CVE-2021-2001 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2001">CVE-2021-2001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2002/">CVE-2021-2002 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2002">CVE-2021-2002 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2010/">CVE-2021-2010 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2010">CVE-2021-2010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2011/">CVE-2021-2011 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2011">CVE-2021-2011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2021/">CVE-2021-2021 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2021">CVE-2021-2021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2022/">CVE-2021-2022 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2022">CVE-2021-2022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2024/">CVE-2021-2024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2024">CVE-2021-2024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2028/">CVE-2021-2028 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2028">CVE-2021-2028 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2030/">CVE-2021-2030 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2030">CVE-2021-2030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2031/">CVE-2021-2031 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2031">CVE-2021-2031 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2032/">CVE-2021-2032 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2032">CVE-2021-2032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2036/">CVE-2021-2036 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2036">CVE-2021-2036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2038/">CVE-2021-2038 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2038">CVE-2021-2038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2042/">CVE-2021-2042 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2042">CVE-2021-2042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2046/">CVE-2021-2046 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2046">CVE-2021-2046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2048/">CVE-2021-2048 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2048">CVE-2021-2048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2055/">CVE-2021-2055 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2055">CVE-2021-2055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2056/">CVE-2021-2056 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2056">CVE-2021-2056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2058/">CVE-2021-2058 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2058">CVE-2021-2058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2060/">CVE-2021-2060 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2060">CVE-2021-2060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2061/">CVE-2021-2061 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2061">CVE-2021-2061 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2065/">CVE-2021-2065 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2065">CVE-2021-2065 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2070/">CVE-2021-2070 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2070">CVE-2021-2070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2072/">CVE-2021-2072 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2072">CVE-2021-2072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2076/">CVE-2021-2076 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2076">CVE-2021-2076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2081/">CVE-2021-2081 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2081">CVE-2021-2081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2087/">CVE-2021-2087 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2087">CVE-2021-2087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2088/">CVE-2021-2088 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2088">CVE-2021-2088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2122/">CVE-2021-2122 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2122">CVE-2021-2122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2146/">CVE-2021-2146 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2146">CVE-2021-2146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2164/">CVE-2021-2164 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2164">CVE-2021-2164 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2166">CVE-2021-2166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2169/">CVE-2021-2169 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2169">CVE-2021-2169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2170/">CVE-2021-2170 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2170">CVE-2021-2170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2171/">CVE-2021-2171 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2171">CVE-2021-2171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2172/">CVE-2021-2172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2172">CVE-2021-2172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2174/">CVE-2021-2174 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2174">CVE-2021-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2178/">CVE-2021-2178 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2178">CVE-2021-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2179/">CVE-2021-2179 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2179">CVE-2021-2179 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2180/">CVE-2021-2180 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2180">CVE-2021-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2193/">CVE-2021-2193 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2193">CVE-2021-2193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2194/">CVE-2021-2194 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2194">CVE-2021-2194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2196/">CVE-2021-2196 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2196">CVE-2021-2196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2201/">CVE-2021-2201 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2201">CVE-2021-2201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2202/">CVE-2021-2202 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2202">CVE-2021-2202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2203/">CVE-2021-2203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2203">CVE-2021-2203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2208/">CVE-2021-2208 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2208">CVE-2021-2208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2212/">CVE-2021-2212 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2212">CVE-2021-2212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2213/">CVE-2021-2213 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2213">CVE-2021-2213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2215/">CVE-2021-2215 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2215">CVE-2021-2215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2217/">CVE-2021-2217 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2217">CVE-2021-2217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2226/">CVE-2021-2226 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2226">CVE-2021-2226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2230/">CVE-2021-2230 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2230">CVE-2021-2230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2232/">CVE-2021-2232 at SUSE</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2232">CVE-2021-2232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2278/">CVE-2021-2278 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2278">CVE-2021-2278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2293/">CVE-2021-2293 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2293">CVE-2021-2293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2298/">CVE-2021-2298 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2298">CVE-2021-2298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2299/">CVE-2021-2299 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2299">CVE-2021-2299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2300/">CVE-2021-2300 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2300">CVE-2021-2300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2301/">CVE-2021-2301 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2301">CVE-2021-2301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2304/">CVE-2021-2304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2304">CVE-2021-2304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2305/">CVE-2021-2305 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2305">CVE-2021-2305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2307/">CVE-2021-2307 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2307">CVE-2021-2307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2308/">CVE-2021-2308 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2308">CVE-2021-2308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2339/">CVE-2021-2339 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2339">CVE-2021-2339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2340/">CVE-2021-2340 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2340">CVE-2021-2340 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2342/">CVE-2021-2342 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2342">CVE-2021-2342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2352/">CVE-2021-2352 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2352">CVE-2021-2352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2354/">CVE-2021-2354 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2354">CVE-2021-2354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2356/">CVE-2021-2356 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2356">CVE-2021-2356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2357/">CVE-2021-2357 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2357">CVE-2021-2357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2367/">CVE-2021-2367 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2367">CVE-2021-2367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2370/">CVE-2021-2370 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2370">CVE-2021-2370 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2372">CVE-2021-2372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2374/">CVE-2021-2374 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2374">CVE-2021-2374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2383/">CVE-2021-2383 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2383">CVE-2021-2383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2384/">CVE-2021-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2384">CVE-2021-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2385/">CVE-2021-2385 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2385">CVE-2021-2385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2387/">CVE-2021-2387 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2387">CVE-2021-2387 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2389">CVE-2021-2389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2390/">CVE-2021-2390 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2390">CVE-2021-2390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2399/">CVE-2021-2399 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2399">CVE-2021-2399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2402/">CVE-2021-2402 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2402">CVE-2021-2402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2410/">CVE-2021-2410 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2410">CVE-2021-2410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2412/">CVE-2021-2412 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2412">CVE-2021-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2417/">CVE-2021-2417 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2417">CVE-2021-2417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2418/">CVE-2021-2418 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2418">CVE-2021-2418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2422/">CVE-2021-2422 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2422">CVE-2021-2422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2424/">CVE-2021-2424 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2424">CVE-2021-2424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2425/">CVE-2021-2425 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2425">CVE-2021-2425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2426/">CVE-2021-2426 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2426">CVE-2021-2426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2427/">CVE-2021-2427 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2427">CVE-2021-2427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2429/">CVE-2021-2429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2429">CVE-2021-2429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2437/">CVE-2021-2437 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2437">CVE-2021-2437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2440/">CVE-2021-2440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2440">CVE-2021-2440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2441/">CVE-2021-2441 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2441">CVE-2021-2441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2444/">CVE-2021-2444 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2444">CVE-2021-2444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35537/">CVE-2021-35537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35537">CVE-2021-35537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35629/">CVE-2021-35629 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35629">CVE-2021-35629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832263" comment="mecab-0.996-1.module+el8.0.0+3898+e09bb8de.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832264" comment="mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832265" comment="mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837706" comment="mysql-8.0.26-1.module+el8.4.0+12359+b8928c02 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837707" comment="mysql-common-8.0.26-1.module+el8.4.0+12359+b8928c02 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837708" comment="mysql-devel-8.0.26-1.module+el8.4.0+12359+b8928c02 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837709" comment="mysql-errmsg-8.0.26-1.module+el8.4.0+12359+b8928c02 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837710" comment="mysql-libs-8.0.26-1.module+el8.4.0+12359+b8928c02 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837711" comment="mysql-server-8.0.26-1.module+el8.4.0+12359+b8928c02 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837712" comment="mysql-test-8.0.26-1.module+el8.4.0+12359+b8928c02 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2147" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3623.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3623.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22930">CVE-2021-22930 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22931">CVE-2021-22931 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22939">CVE-2021-22939 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22940">CVE-2021-22940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23343">CVE-2021-23343 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32803">CVE-2021-32803 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32804">CVE-2021-32804 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837713" comment="nodejs-12.22.5-1.module+el8.4.0+12242+af52a4c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837714" comment="nodejs-devel-12.22.5-1.module+el8.4.0+12242+af52a4c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837715" comment="nodejs-docs-12.22.5-1.module+el8.4.0+12242+af52a4c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837716" comment="nodejs-full-i18n-12.22.5-1.module+el8.4.0+12242+af52a4c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837544" comment="nodejs-nodemon-2.0.3-1.module+el8.4.0+11732+c668cc9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833604" comment="nodejs-packaging-17-3.module+el8.1.0+3369+37ae6a45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837717" comment="npm-6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2148" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3666.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3666.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22930">CVE-2021-22930 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22931">CVE-2021-22931 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22939">CVE-2021-22939 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22940">CVE-2021-22940 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23343">CVE-2021-23343 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32803">CVE-2021-32803 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32804">CVE-2021-32804 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837718" comment="nodejs-14.17.5-1.module+el8.4.0+12247+e2879e58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837719" comment="nodejs-devel-14.17.5-1.module+el8.4.0+12247+e2879e58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837720" comment="nodejs-docs-14.17.5-1.module+el8.4.0+12247+e2879e58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837721" comment="nodejs-full-i18n-14.17.5-1.module+el8.4.0+12247+e2879e58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835981" comment="nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837722" comment="npm-6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2149" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3755.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3755.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837723" comment="firefox-91.2.0-4.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2150" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-39226" ref_url="https://www.suse.com/security/cve/CVE-2021-39226/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3771.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3771.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-39226/">CVE-2021-39226 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39226">CVE-2021-39226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837724" comment="grafana-7.3.6-3.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2151" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3816.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3816.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837725" comment="httpd-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837726" comment="httpd-devel-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837727" comment="httpd-filesystem-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837728" comment="httpd-manual-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837729" comment="httpd-tools-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831132" comment="mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837730" comment="mod_ldap-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837731" comment="mod_proxy_html-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837732" comment="mod_session-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837733" comment="mod_ssl-2.4.37-39.module+el8.4.0+12865+a7065a39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2152" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41355" ref_url="https://www.suse.com/security/cve/CVE-2021-41355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3819.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3819.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41355/">CVE-2021-41355 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41355">CVE-2021-41355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837734" comment="aspnetcore-runtime-5.0-5.0.11-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837735" comment="aspnetcore-targeting-pack-5.0-5.0.11-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837736" comment="dotnet-5.0.208-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837737" comment="dotnet-apphost-pack-5.0-5.0.11-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837738" comment="dotnet-host-5.0.11-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837739" comment="dotnet-hostfxr-5.0-5.0.11-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837740" comment="dotnet-runtime-5.0-5.0.11-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837741" comment="dotnet-sdk-5.0-5.0.208-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837742" comment="dotnet-targeting-pack-5.0-5.0.11-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837743" comment="dotnet-templates-5.0-5.0.208-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837744" comment="netstandard-targeting-pack-2.1-5.0.208-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2153" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="CVE-2021-38502" ref_url="https://www.suse.com/security/cve/CVE-2021-38502/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38502/">CVE-2021-38502 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38502">CVE-2021-38502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837745" comment="thunderbird-91.2.0-1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2154" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3891.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3891.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837746" comment="java-11-openjdk-11.0.13.0.8-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837747" comment="java-11-openjdk-demo-11.0.13.0.8-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837748" comment="java-11-openjdk-devel-11.0.13.0.8-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837749" comment="java-11-openjdk-headless-11.0.13.0.8-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837750" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837751" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837752" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837753" comment="java-11-openjdk-src-11.0.13.0.8-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837754" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2155" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3893.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3893.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837755" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837756" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837757" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837758" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837759" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837760" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837761" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837762" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837763" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837764" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837765" comment="java-1.8.0-openjdk-fastdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837766" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837767" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837768" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837769" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837770" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837771" comment="java-1.8.0-openjdk-slowdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837772" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837773" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.312.b07-1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837774" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.312.b07-1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2156" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32626" ref_url="https://www.suse.com/security/cve/CVE-2021-32626/" source="CVE"/>
		<reference ref_id="CVE-2021-32627" ref_url="https://www.suse.com/security/cve/CVE-2021-32627/" source="CVE"/>
		<reference ref_id="CVE-2021-32628" ref_url="https://www.suse.com/security/cve/CVE-2021-32628/" source="CVE"/>
		<reference ref_id="CVE-2021-32675" ref_url="https://www.suse.com/security/cve/CVE-2021-32675/" source="CVE"/>
		<reference ref_id="CVE-2021-32687" ref_url="https://www.suse.com/security/cve/CVE-2021-32687/" source="CVE"/>
		<reference ref_id="CVE-2021-41099" ref_url="https://www.suse.com/security/cve/CVE-2021-41099/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3918.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3918.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32626/">CVE-2021-32626 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">CVE-2021-32626 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32627/">CVE-2021-32627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">CVE-2021-32627 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32628/">CVE-2021-32628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">CVE-2021-32628 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32675/">CVE-2021-32675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">CVE-2021-32675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32687/">CVE-2021-32687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">CVE-2021-32687 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41099/">CVE-2021-41099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">CVE-2021-41099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837775" comment="redis-5.0.3-5.module+el8.4.0+12927+b9845322 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837776" comment="redis-devel-5.0.3-5.module+el8.4.0+12927+b9845322 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837777" comment="redis-doc-5.0.3-5.module+el8.4.0+12927+b9845322 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2157" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32626" ref_url="https://www.suse.com/security/cve/CVE-2021-32626/" source="CVE"/>
		<reference ref_id="CVE-2021-32627" ref_url="https://www.suse.com/security/cve/CVE-2021-32627/" source="CVE"/>
		<reference ref_id="CVE-2021-32628" ref_url="https://www.suse.com/security/cve/CVE-2021-32628/" source="CVE"/>
		<reference ref_id="CVE-2021-32675" ref_url="https://www.suse.com/security/cve/CVE-2021-32675/" source="CVE"/>
		<reference ref_id="CVE-2021-32687" ref_url="https://www.suse.com/security/cve/CVE-2021-32687/" source="CVE"/>
		<reference ref_id="CVE-2021-41099" ref_url="https://www.suse.com/security/cve/CVE-2021-41099/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3945.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3945.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32626/">CVE-2021-32626 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32626">CVE-2021-32626 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32627/">CVE-2021-32627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32627">CVE-2021-32627 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32628/">CVE-2021-32628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32628">CVE-2021-32628 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32675/">CVE-2021-32675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32675">CVE-2021-32675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32687/">CVE-2021-32687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32687">CVE-2021-32687 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41099/">CVE-2021-41099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41099">CVE-2021-41099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837778" comment="redis-6.0.9-5.module+el8.4.0+12929+1bb0d2aa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837779" comment="redis-devel-6.0.9-5.module+el8.4.0+12929+1bb0d2aa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837780" comment="redis-doc-6.0.9-5.module+el8.4.0+12929+1bb0d2aa is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2158" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41133" ref_url="https://www.suse.com/security/cve/CVE-2021-41133/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4042.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4042.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41133/">CVE-2021-41133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41133">CVE-2021-41133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837781" comment="flatpak-1.8.5-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837782" comment="flatpak-libs-1.8.5-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837783" comment="flatpak-selinux-1.8.5-4.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837784" comment="flatpak-session-helper-1.8.5-4.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2159" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4056.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4056.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837785" comment="bpftool-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837786" comment="kernel-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837787" comment="kernel-abi-stablelists-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837788" comment="kernel-core-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837789" comment="kernel-cross-headers-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837790" comment="kernel-debug-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837791" comment="kernel-debug-core-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837793" comment="kernel-debug-modules-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837794" comment="kernel-debug-modules-extra-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837796" comment="kernel-doc-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837797" comment="kernel-headers-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837798" comment="kernel-modules-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837799" comment="kernel-modules-extra-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837800" comment="kernel-tools-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837801" comment="kernel-tools-libs-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837803" comment="perf-4.18.0-305.25.1.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837804" comment="python3-perf-4.18.0-305.25.1.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2160" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4057.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4057.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837805" comment="platform-python-3.6.8-39.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837806" comment="platform-python-debug-3.6.8-39.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837807" comment="platform-python-devel-3.6.8-39.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837808" comment="python3-idle-3.6.8-39.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837809" comment="python3-libs-3.6.8-39.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837810" comment="python3-test-3.6.8-39.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837811" comment="python3-tkinter-3.6.8-39.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2161" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4058.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4058.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837812" comment="ctdb-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837813" comment="ctdb-tests-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837814" comment="libsmbclient-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837815" comment="libsmbclient-devel-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837816" comment="libwbclient-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837817" comment="libwbclient-devel-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837818" comment="python3-samba-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837819" comment="python3-samba-test-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837820" comment="samba-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837821" comment="samba-client-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837822" comment="samba-client-libs-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837823" comment="samba-common-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837824" comment="samba-common-libs-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837825" comment="samba-common-tools-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837826" comment="samba-devel-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837827" comment="samba-krb5-printing-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837828" comment="samba-libs-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837829" comment="samba-pidl-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837830" comment="samba-test-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837831" comment="samba-test-libs-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837832" comment="samba-winbind-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837833" comment="samba-winbind-clients-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837834" comment="samba-winbind-krb5-locator-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837835" comment="samba-winbind-modules-4.13.3-5.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837836" comment="samba-winexe-4.13.3-5.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2162" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837837" comment="curl-7.61.1-18.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837838" comment="libcurl-7.61.1-18.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837839" comment="libcurl-devel-7.61.1-18.el8_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837840" comment="libcurl-minimal-7.61.1-18.el8_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2163" version="1" class="patch">
	<metadata>
		<title>security update for libsolv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33928" ref_url="https://www.suse.com/security/cve/CVE-2021-33928/" source="CVE"/>
		<reference ref_id="CVE-2021-33929" ref_url="https://www.suse.com/security/cve/CVE-2021-33929/" source="CVE"/>
		<reference ref_id="CVE-2021-33930" ref_url="https://www.suse.com/security/cve/CVE-2021-33930/" source="CVE"/>
		<reference ref_id="CVE-2021-33938" ref_url="https://www.suse.com/security/cve/CVE-2021-33938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33928/">CVE-2021-33928 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33928">CVE-2021-33928 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33929/">CVE-2021-33929 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33929">CVE-2021-33929 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33930/">CVE-2021-33930 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33930">CVE-2021-33930 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33938/">CVE-2021-33938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33938">CVE-2021-33938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837841" comment="libsolv-0.7.16-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837842" comment="libsolv-devel-0.7.16-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837843" comment="libsolv-tools-0.7.16-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837844" comment="python3-solv-0.7.16-3.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2164" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4097.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4097.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837845" comment="webkit2gtk3-2.30.4-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837846" comment="webkit2gtk3-devel-2.30.4-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837847" comment="webkit2gtk3-jsc-2.30.4-3.el8_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837848" comment="webkit2gtk3-jsc-devel-2.30.4-3.el8_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2165" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-43534" ref_url="https://www.suse.com/security/cve/CVE-2021-43534/" source="CVE"/>
		<reference ref_id="CVE-2021-43535" ref_url="https://www.suse.com/security/cve/CVE-2021-43535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4123.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4123.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43534/">CVE-2021-43534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43534">CVE-2021-43534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43535/">CVE-2021-43535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43535">CVE-2021-43535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837849" comment="firefox-91.3.0-1.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2166" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-43529" ref_url="https://www.suse.com/security/cve/CVE-2021-43529/" source="CVE"/>
		<reference ref_id="CVE-2021-43534" ref_url="https://www.suse.com/security/cve/CVE-2021-43534/" source="CVE"/>
		<reference ref_id="CVE-2021-43535" ref_url="https://www.suse.com/security/cve/CVE-2021-43535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4130.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4130.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43529/">CVE-2021-43529 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43529">CVE-2021-43529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43534/">CVE-2021-43534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43534">CVE-2021-43534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43535/">CVE-2021-43535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43535">CVE-2021-43535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837850" comment="thunderbird-91.3.0-2.el8_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2167" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837851" comment="java-17-openjdk-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837852" comment="java-17-openjdk-demo-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837853" comment="java-17-openjdk-demo-fastdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837854" comment="java-17-openjdk-demo-slowdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837855" comment="java-17-openjdk-devel-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837856" comment="java-17-openjdk-devel-fastdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837857" comment="java-17-openjdk-devel-slowdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837858" comment="java-17-openjdk-fastdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837859" comment="java-17-openjdk-headless-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837860" comment="java-17-openjdk-headless-fastdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837861" comment="java-17-openjdk-headless-slowdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837862" comment="java-17-openjdk-javadoc-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837863" comment="java-17-openjdk-javadoc-zip-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837864" comment="java-17-openjdk-jmods-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837865" comment="java-17-openjdk-jmods-fastdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837866" comment="java-17-openjdk-jmods-slowdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837867" comment="java-17-openjdk-slowdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837868" comment="java-17-openjdk-src-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837869" comment="java-17-openjdk-src-fastdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837870" comment="java-17-openjdk-src-slowdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837871" comment="java-17-openjdk-static-libs-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837872" comment="java-17-openjdk-static-libs-fastdebug-17.0.1.0.12-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837873" comment="java-17-openjdk-static-libs-slowdebug-17.0.1.0.12-2.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2168" version="1" class="patch">
	<metadata>
		<title>security update for resource-agents (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20270" ref_url="https://www.suse.com/security/cve/CVE-2021-20270/" source="CVE"/>
		<reference ref_id="CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4139.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4139.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20270/">CVE-2021-20270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20270">CVE-2021-20270 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27291">CVE-2021-27291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837874" comment="resource-agents-4.1.1-98.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837875" comment="resource-agents-aliyun-4.1.1-98.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837876" comment="resource-agents-gcp-4.1.1-98.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837877" comment="resource-agents-paf-4.1.1-98.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2169" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<reference ref_id="CVE-2020-7656" ref_url="https://www.suse.com/security/cve/CVE-2020-7656/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7656/">CVE-2020-7656 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7656">CVE-2020-7656 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837878" comment="pcs-0.10.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837879" comment="pcs-snmp-0.10.10-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2170" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653/" source="CVE"/>
		<reference ref_id="CVE-2020-35655" ref_url="https://www.suse.com/security/cve/CVE-2020-35655/" source="CVE"/>
		<reference ref_id="CVE-2021-25287" ref_url="https://www.suse.com/security/cve/CVE-2021-25287/" source="CVE"/>
		<reference ref_id="CVE-2021-25288" ref_url="https://www.suse.com/security/cve/CVE-2021-25288/" source="CVE"/>
		<reference ref_id="CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290/" source="CVE"/>
		<reference ref_id="CVE-2021-25292" ref_url="https://www.suse.com/security/cve/CVE-2021-25292/" source="CVE"/>
		<reference ref_id="CVE-2021-25293" ref_url="https://www.suse.com/security/cve/CVE-2021-25293/" source="CVE"/>
		<reference ref_id="CVE-2021-27921" ref_url="https://www.suse.com/security/cve/CVE-2021-27921/" source="CVE"/>
		<reference ref_id="CVE-2021-27922" ref_url="https://www.suse.com/security/cve/CVE-2021-27922/" source="CVE"/>
		<reference ref_id="CVE-2021-27923" ref_url="https://www.suse.com/security/cve/CVE-2021-27923/" source="CVE"/>
		<reference ref_id="CVE-2021-28675" ref_url="https://www.suse.com/security/cve/CVE-2021-28675/" source="CVE"/>
		<reference ref_id="CVE-2021-28676" ref_url="https://www.suse.com/security/cve/CVE-2021-28676/" source="CVE"/>
		<reference ref_id="CVE-2021-28677" ref_url="https://www.suse.com/security/cve/CVE-2021-28677/" source="CVE"/>
		<reference ref_id="CVE-2021-28678" ref_url="https://www.suse.com/security/cve/CVE-2021-28678/" source="CVE"/>
		<reference ref_id="CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4149.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4149.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35653">CVE-2020-35653 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35655/">CVE-2020-35655 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35655">CVE-2020-35655 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25287/">CVE-2021-25287 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25287">CVE-2021-25287 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25288/">CVE-2021-25288 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25288">CVE-2021-25288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25290">CVE-2021-25290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25292/">CVE-2021-25292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25292">CVE-2021-25292 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25293/">CVE-2021-25293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25293">CVE-2021-25293 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27921/">CVE-2021-27921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27921">CVE-2021-27921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27922/">CVE-2021-27922 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27922">CVE-2021-27922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27923/">CVE-2021-27923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27923">CVE-2021-27923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28675/">CVE-2021-28675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28675">CVE-2021-28675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28676/">CVE-2021-28676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28676">CVE-2021-28676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28677/">CVE-2021-28677 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28677">CVE-2021-28677 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28678/">CVE-2021-28678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28678">CVE-2021-28678 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34552">CVE-2021-34552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837880" comment="python3-pillow-5.1.1-16.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2171" version="1" class="patch">
	<metadata>
		<title>security update for python-PyMySQL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20270" ref_url="https://www.suse.com/security/cve/CVE-2021-20270/" source="CVE"/>
		<reference ref_id="CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20270/">CVE-2021-20270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20270">CVE-2021-20270 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27291">CVE-2021-27291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837881" comment="python-nose-docs-1.3.7-31.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837882" comment="python-pymongo-doc-3.7.0-1.module+el8.4.0+9670+1849b5f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837883" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6646+6b4b10ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837884" comment="python-virtualenv-doc-15.1.0-21.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837885" comment="python3-PyMySQL-0.10.1-2.module+el8.4.0+9657+a4b6a102 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837886" comment="python3-bson-3.7.0-1.module+el8.4.0+9670+1849b5f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837887" comment="python3-distro-1.4.0-2.module+el8.1.0+3334+5cb623d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837888" comment="python3-docs-3.6.7-2.module+el8.1.0+3334+5cb623d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837889" comment="python3-docutils-0.14-12.module+el8.1.0+3334+5cb623d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837890" comment="python3-nose-1.3.7-31.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837891" comment="python3-pygments-2.2.0-22.module+el8.5.0+10789+e4939b94 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837892" comment="python3-pymongo-3.7.0-1.module+el8.4.0+9670+1849b5f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837893" comment="python3-pymongo-gridfs-3.7.0-1.module+el8.4.0+9670+1849b5f9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837894" comment="python3-scipy-1.0.0-21.module+el8.5.0+10916+41bd434d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837895" comment="python3-sqlalchemy-1.3.2-2.module+el8.3.0+6646+6b4b10ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837896" comment="python3-virtualenv-15.1.0-21.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837897" comment="python3-wheel-0.31.1-3.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837898" comment="python3-wheel-wheel-0.31.1-3.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837899" comment="python36-3.6.8-38.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837900" comment="python36-debug-3.6.8-38.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837901" comment="python36-devel-3.6.8-38.module+el8.5.0+12207+5c5719bc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837902" comment="python36-rpm-macros-3.6.8-38.module+el8.5.0+12207+5c5719bc is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2172" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="CVE-2021-20095" ref_url="https://www.suse.com/security/cve/CVE-2021-20095/" source="CVE"/>
		<reference ref_id="CVE-2021-20270" ref_url="https://www.suse.com/security/cve/CVE-2021-20270/" source="CVE"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20095/">CVE-2021-20095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20095">CVE-2021-20095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20270/">CVE-2021-20270 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20270">CVE-2021-20270 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27291">CVE-2021-27291 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837903" comment="babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837904" comment="python-nose-docs-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835513" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837905" comment="python2-2.7.18-7.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837906" comment="python2-babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836757" comment="python2-backports-1.0-16.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836758" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837907" comment="python2-bson-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837908" comment="python2-debug-2.7.18-7.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837909" comment="python2-devel-2.7.18-7.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837910" comment="python2-jinja2-2.10-9.module+el8.5.0+10541+706bb066 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837911" comment="python2-libs-2.7.18-7.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837912" comment="python2-lxml-4.2.3-5.module+el8.5.0+10534+22332931 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837913" comment="python2-nose-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836763" comment="python2-numpy-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836764" comment="python2-numpy-doc-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836765" comment="python2-numpy-f2py-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835518" comment="python2-pip-9.0.3-18.module+el8.3.0+7707+eb4bba01 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835519" comment="python2-pip-wheel-9.0.3-18.module+el8.3.0+7707+eb4bba01 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837914" comment="python2-pygments-2.2.0-22.module+el8.5.0+10788+a4cea9e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837915" comment="python2-pymongo-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837916" comment="python2-pymongo-gridfs-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837917" comment="python2-scipy-1.0.0-21.module+el8.5.0+10858+05337455 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836766" comment="python2-setuptools-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836767" comment="python2-setuptools-wheel-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836768" comment="python2-six-1.11.0-6.module+el8.4.0+9287+299307c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835522" comment="python2-sqlalchemy-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837918" comment="python2-test-2.7.18-7.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837919" comment="python2-tkinter-2.7.18-7.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837920" comment="python2-tools-2.7.18-7.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836772" comment="python2-urllib3-1.24.2-3.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837921" comment="python2-virtualenv-15.1.0-21.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837922" comment="python2-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837923" comment="python2-wheel-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2173" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4153.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4153.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837924" comment="dnsmasq-2.79-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837925" comment="dnsmasq-utils-2.79-19.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2174" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291/" source="CVE"/>
		<reference ref_id="CVE-2021-3602" ref_url="https://www.suse.com/security/cve/CVE-2021-3602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4154.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4154.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3602/">CVE-2021-3602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3602">CVE-2021-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837926" comment="buildah-1.22.3-2.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837927" comment="buildah-tests-1.22.3-2.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837928" comment="cockpit-podman-33-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837929" comment="conmon-2.0.29-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837930" comment="container-selinux-2.167.0-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837931" comment="containernetworking-plugins-1.0.0-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837932" comment="containers-common-1-2.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837933" comment="crit-3.15-3.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837934" comment="criu-3.15-3.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837935" comment="criu-devel-3.15-3.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837936" comment="criu-libs-3.15-3.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837937" comment="crun-1.0-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837938" comment="fuse-overlayfs-1.7.1-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837939" comment="libslirp-4.4.0-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837940" comment="libslirp-devel-4.4.0-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837941" comment="oci-seccomp-bpf-hook-1.2.3-3.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837942" comment="podman-3.3.1-9.module+el8.5.0+12697+018f24d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837943" comment="podman-catatonit-3.3.1-9.module+el8.5.0+12697+018f24d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837944" comment="podman-docker-3.3.1-9.module+el8.5.0+12697+018f24d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837945" comment="podman-gvproxy-3.3.1-9.module+el8.5.0+12697+018f24d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837946" comment="podman-plugins-3.3.1-9.module+el8.5.0+12697+018f24d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837947" comment="podman-remote-3.3.1-9.module+el8.5.0+12697+018f24d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837948" comment="podman-tests-3.3.1-9.module+el8.5.0+12697+018f24d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837949" comment="python3-criu-3.15-3.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837950" comment="python3-podman-3.2.0-2.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837951" comment="runc-1.0.2-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837952" comment="skopeo-1.4.2-0.1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837953" comment="skopeo-tests-1.4.2-0.1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837954" comment="slirp4netns-1.1.8-1.module+el8.5.0+12582+56d94c81 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837955" comment="toolbox-0.0.99.3-0.4.module+el8.5.0+12682+a4eeb084 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837956" comment="toolbox-tests-0.0.99.3-0.4.module+el8.5.0+12682+a4eeb084 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837957" comment="udica-0.2.5-2.module+el8.5.0+12582+56d94c81 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2175" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4156.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4156.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837958" comment="delve-1.6.0-1.module+el8.5.0+10379+d6b83bd0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837959" comment="go-toolset-1.16.7-1.module+el8.5.0+12246+1aac4e3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837960" comment="golang-1.16.7-1.module+el8.5.0+12246+1aac4e3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837961" comment="golang-bin-1.16.7-1.module+el8.5.0+12246+1aac4e3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837962" comment="golang-docs-1.16.7-1.module+el8.5.0+12246+1aac4e3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837963" comment="golang-misc-1.16.7-1.module+el8.5.0+12246+1aac4e3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837964" comment="golang-race-1.16.7-1.module+el8.5.0+12246+1aac4e3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837965" comment="golang-src-1.16.7-1.module+el8.5.0+12246+1aac4e3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837966" comment="golang-tests-1.16.7-1.module+el8.5.0+12246+1aac4e3f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2176" version="1" class="patch">
	<metadata>
		<title>security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4158.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4158.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28957">CVE-2021-28957 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837967" comment="python3-lxml-4.2.3-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2177" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4161.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4161.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28493">CVE-2020-28493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837968" comment="python3-jinja2-2.10.1-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2178" version="1" class="patch">
	<metadata>
		<title>security update for adwaita-qt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3481" ref_url="https://www.suse.com/security/cve/CVE-2021-3481/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4172.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4172.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3481/">CVE-2021-3481 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3481">CVE-2021-3481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837969" comment="adwaita-qt5-1.2.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837970" comment="libadwaita-qt5-1.2.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837971" comment="python-qt5-rpm-macros-5.15.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837972" comment="python3-pyqt5-sip-4.19.24-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837973" comment="python3-qt5-5.15.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837974" comment="python3-qt5-base-5.15.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837975" comment="python3-qt5-devel-5.15.0-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837976" comment="python3-sip-devel-4.19.24-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837977" comment="python3-wx-siplib-4.19.24-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837978" comment="qgnomeplatform-0.7.1-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837979" comment="qt5-assistant-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837980" comment="qt5-designer-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837981" comment="qt5-devel-5.15.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837982" comment="qt5-doctools-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837983" comment="qt5-linguist-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837984" comment="qt5-qdbusviewer-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837985" comment="qt5-qt3d-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837986" comment="qt5-qt3d-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837987" comment="qt5-qt3d-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837988" comment="qt5-qtbase-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837989" comment="qt5-qtbase-common-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837990" comment="qt5-qtbase-devel-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837991" comment="qt5-qtbase-examples-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837992" comment="qt5-qtbase-gui-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837993" comment="qt5-qtbase-mysql-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837994" comment="qt5-qtbase-odbc-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837995" comment="qt5-qtbase-postgresql-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837996" comment="qt5-qtbase-private-devel-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837997" comment="qt5-qtbase-static-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837998" comment="qt5-qtcanvas3d-5.12.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837999" comment="qt5-qtcanvas3d-examples-5.12.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838000" comment="qt5-qtconnectivity-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838001" comment="qt5-qtconnectivity-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838002" comment="qt5-qtconnectivity-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838003" comment="qt5-qtdeclarative-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838004" comment="qt5-qtdeclarative-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838005" comment="qt5-qtdeclarative-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838006" comment="qt5-qtdeclarative-static-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838007" comment="qt5-qtdoc-5.15.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838008" comment="qt5-qtgraphicaleffects-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838009" comment="qt5-qtimageformats-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838010" comment="qt5-qtlocation-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838011" comment="qt5-qtlocation-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838012" comment="qt5-qtlocation-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838013" comment="qt5-qtmultimedia-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838014" comment="qt5-qtmultimedia-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838015" comment="qt5-qtmultimedia-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838016" comment="qt5-qtquickcontrols-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838017" comment="qt5-qtquickcontrols-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838018" comment="qt5-qtquickcontrols2-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838019" comment="qt5-qtquickcontrols2-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838020" comment="qt5-qtquickcontrols2-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838021" comment="qt5-qtscript-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838022" comment="qt5-qtscript-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838023" comment="qt5-qtscript-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838024" comment="qt5-qtsensors-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838025" comment="qt5-qtsensors-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838026" comment="qt5-qtsensors-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838027" comment="qt5-qtserialbus-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838028" comment="qt5-qtserialbus-devel-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838029" comment="qt5-qtserialbus-examples-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838030" comment="qt5-qtserialport-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838031" comment="qt5-qtserialport-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838032" comment="qt5-qtserialport-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838033" comment="qt5-qtsvg-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838034" comment="qt5-qtsvg-devel-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838035" comment="qt5-qtsvg-examples-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838036" comment="qt5-qttools-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838037" comment="qt5-qttools-common-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838038" comment="qt5-qttools-devel-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838039" comment="qt5-qttools-examples-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838040" comment="qt5-qttools-libs-designer-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838041" comment="qt5-qttools-libs-designercomponents-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838042" comment="qt5-qttools-libs-help-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838043" comment="qt5-qttools-static-5.15.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838044" comment="qt5-qttranslations-5.15.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838045" comment="qt5-qtwayland-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838046" comment="qt5-qtwayland-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838047" comment="qt5-qtwayland-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838048" comment="qt5-qtwebchannel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838049" comment="qt5-qtwebchannel-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838050" comment="qt5-qtwebchannel-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838051" comment="qt5-qtwebsockets-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838052" comment="qt5-qtwebsockets-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838053" comment="qt5-qtwebsockets-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838054" comment="qt5-qtx11extras-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838055" comment="qt5-qtx11extras-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838056" comment="qt5-qtxmlpatterns-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838057" comment="qt5-qtxmlpatterns-devel-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838058" comment="qt5-qtxmlpatterns-examples-5.15.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838059" comment="qt5-rpm-macros-5.15.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838060" comment="qt5-srpm-macros-5.15.2-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838061" comment="sip-4.19.24-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2179" version="1" class="patch">
	<metadata>
		<title>security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29457" ref_url="https://www.suse.com/security/cve/CVE-2021-29457/" source="CVE"/>
		<reference ref_id="CVE-2021-29458" ref_url="https://www.suse.com/security/cve/CVE-2021-29458/" source="CVE"/>
		<reference ref_id="CVE-2021-29463" ref_url="https://www.suse.com/security/cve/CVE-2021-29463/" source="CVE"/>
		<reference ref_id="CVE-2021-29464" ref_url="https://www.suse.com/security/cve/CVE-2021-29464/" source="CVE"/>
		<reference ref_id="CVE-2021-29470" ref_url="https://www.suse.com/security/cve/CVE-2021-29470/" source="CVE"/>
		<reference ref_id="CVE-2021-29473" ref_url="https://www.suse.com/security/cve/CVE-2021-29473/" source="CVE"/>
		<reference ref_id="CVE-2021-29623" ref_url="https://www.suse.com/security/cve/CVE-2021-29623/" source="CVE"/>
		<reference ref_id="CVE-2021-31292" ref_url="https://www.suse.com/security/cve/CVE-2021-31292/" source="CVE"/>
		<reference ref_id="CVE-2021-32617" ref_url="https://www.suse.com/security/cve/CVE-2021-32617/" source="CVE"/>
		<reference ref_id="CVE-2021-3482" ref_url="https://www.suse.com/security/cve/CVE-2021-3482/" source="CVE"/>
		<reference ref_id="CVE-2021-37618" ref_url="https://www.suse.com/security/cve/CVE-2021-37618/" source="CVE"/>
		<reference ref_id="CVE-2021-37619" ref_url="https://www.suse.com/security/cve/CVE-2021-37619/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4173.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4173.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29457/">CVE-2021-29457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29457">CVE-2021-29457 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29458/">CVE-2021-29458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29458">CVE-2021-29458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29463/">CVE-2021-29463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29463">CVE-2021-29463 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29464/">CVE-2021-29464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29464">CVE-2021-29464 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29470/">CVE-2021-29470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29470">CVE-2021-29470 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29473/">CVE-2021-29473 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29473">CVE-2021-29473 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29623/">CVE-2021-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29623">CVE-2021-29623 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31292/">CVE-2021-31292 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31292">CVE-2021-31292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32617/">CVE-2021-32617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32617">CVE-2021-32617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3482/">CVE-2021-3482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3482">CVE-2021-3482 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37618/">CVE-2021-37618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37618">CVE-2021-37618 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37619/">CVE-2021-37619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37619">CVE-2021-37619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838062" comment="exiv2-0.27.4-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838063" comment="exiv2-devel-0.27.4-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838064" comment="exiv2-doc-0.27.4-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838065" comment="exiv2-libs-0.27.4-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2180" version="1" class="patch">
	<metadata>
		<title>security update for file-roller (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36314" ref_url="https://www.suse.com/security/cve/CVE-2020-36314/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4179.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4179.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36314/">CVE-2020-36314 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36314">CVE-2020-36314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838066" comment="file-roller-3.28.1-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2181" version="1" class="patch">
	<metadata>
		<title>security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4181.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4181.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28896">CVE-2020-28896 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3181">CVE-2021-3181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838067" comment="mutt-2.0.7-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2182" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4198.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4198.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28210">CVE-2021-28210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838068" comment="edk2-ovmf-20210527gite1999b264f1f-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2183" version="1" class="patch">
	<metadata>
		<title>security update for babel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20095" ref_url="https://www.suse.com/security/cve/CVE-2021-20095/" source="CVE"/>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20095/">CVE-2021-20095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20095">CVE-2021-20095 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838069" comment="python3-babel-2.5.1-7.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2184" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068/" source="CVE"/>
		<reference ref_id="CVE-2020-7069" ref_url="https://www.suse.com/security/cve/CVE-2020-7069/" source="CVE"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4213.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4213.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7068">CVE-2020-7068 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7069/">CVE-2020-7069 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7069">CVE-2020-7069 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7070">CVE-2020-7070 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7071">CVE-2020-7071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21702">CVE-2021-21702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838070" comment="apcu-panel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838071" comment="libzip-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838072" comment="libzip-devel-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838073" comment="libzip-tools-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838074" comment="php-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838075" comment="php-bcmath-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838076" comment="php-cli-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838077" comment="php-common-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838078" comment="php-dba-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838079" comment="php-dbg-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838080" comment="php-devel-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838081" comment="php-embedded-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838082" comment="php-enchant-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838083" comment="php-ffi-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838084" comment="php-fpm-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838085" comment="php-gd-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838086" comment="php-gmp-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838087" comment="php-intl-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838088" comment="php-json-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838089" comment="php-ldap-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838090" comment="php-mbstring-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838091" comment="php-mysqlnd-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838092" comment="php-odbc-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838093" comment="php-opcache-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838094" comment="php-pdo-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838095" comment="php-pear-1.10.12-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838096" comment="php-pecl-apcu-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838097" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838098" comment="php-pecl-rrd-2.0.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838099" comment="php-pecl-xdebug-2.9.5-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838100" comment="php-pecl-zip-1.18.2-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838101" comment="php-pgsql-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838102" comment="php-process-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838103" comment="php-snmp-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838104" comment="php-soap-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838105" comment="php-xml-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838106" comment="php-xmlrpc-7.4.19-1.module+el8.5.0+11143+cc873159 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2185" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3602" ref_url="https://www.suse.com/security/cve/CVE-2021-3602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4221.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4221.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3602/">CVE-2021-3602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3602">CVE-2021-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838107" comment="buildah-1.11.6-9.module+el8.5.0+12239+ec01067b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838108" comment="buildah-tests-1.11.6-9.module+el8.5.0+12239+ec01067b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838109" comment="cockpit-podman-11-1.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838110" comment="conmon-2.0.15-1.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838111" comment="container-selinux-2.130.0-1.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838112" comment="containernetworking-plugins-0.8.3-4.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838113" comment="containers-common-0.1.41-4.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838114" comment="crit-3.12-9.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838115" comment="criu-3.12-9.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838116" comment="fuse-overlayfs-0.7.8-1.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838117" comment="podman-1.6.4-26.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838118" comment="podman-docker-1.6.4-26.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838119" comment="podman-remote-1.6.4-26.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838120" comment="podman-tests-1.6.4-26.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838121" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838122" comment="python3-criu-3.12-9.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838123" comment="runc-1.0.0-66.rc10.module+el8.5.0+11041+627a5cdc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838124" comment="skopeo-0.1.41-4.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838125" comment="skopeo-tests-0.1.41-4.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838126" comment="slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838127" comment="toolbox-0.0.7-1.module+el8.5.0+10223+f7559c42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838128" comment="udica-0.2.1-2.module+el8.5.0+10223+f7559c42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2186" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3602" ref_url="https://www.suse.com/security/cve/CVE-2021-3602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4222.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4222.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3602/">CVE-2021-3602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3602">CVE-2021-3602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838129" comment="buildah-1.19.9-1.module+el8.5.0+12236+c988d830 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838130" comment="buildah-tests-1.19.9-1.module+el8.5.0+12236+c988d830 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838131" comment="cockpit-podman-29-2.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838132" comment="conmon-2.0.26-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838133" comment="container-selinux-2.167.0-1.module+el8.5.0+12609+beaa716d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838134" comment="containernetworking-plugins-0.9.1-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838135" comment="containers-common-1.2.2-10.module+el8.5.0+11808+4e1db630 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838136" comment="crit-3.15-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838137" comment="criu-3.15-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838138" comment="crun-0.18-2.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838139" comment="fuse-overlayfs-1.4.0-2.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838140" comment="libslirp-4.3.1-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838141" comment="libslirp-devel-4.3.1-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838142" comment="oci-seccomp-bpf-hook-1.2.0-3.module+el8.5.0+11073+ba5c6d09 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838143" comment="podman-3.0.1-6.module+el8.5.0+12609+beaa716d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838144" comment="podman-catatonit-3.0.1-6.module+el8.5.0+12609+beaa716d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838145" comment="podman-docker-3.0.1-6.module+el8.5.0+12609+beaa716d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838146" comment="podman-plugins-3.0.1-6.module+el8.5.0+12609+beaa716d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838147" comment="podman-remote-3.0.1-6.module+el8.5.0+12609+beaa716d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838148" comment="podman-tests-3.0.1-6.module+el8.5.0+12609+beaa716d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838149" comment="python3-criu-3.15-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838150" comment="runc-1.0.0-72.rc92.module+el8.5.0+12236+c988d830 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838151" comment="skopeo-1.2.2-10.module+el8.5.0+11808+4e1db630 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838152" comment="skopeo-tests-1.2.2-10.module+el8.5.0+11808+4e1db630 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838153" comment="slirp4netns-1.1.8-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838154" comment="toolbox-0.0.99-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838155" comment="toolbox-tests-0.0.99-1.module+el8.5.0+10306+3f72d66d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838156" comment="udica-0.2.4-1.module+el8.5.0+10306+3f72d66d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2187" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-27358" ref_url="https://www.suse.com/security/cve/CVE-2021-27358/" source="CVE"/>
		<reference ref_id="CVE-2021-3114" ref_url="https://www.suse.com/security/cve/CVE-2021-3114/" source="CVE"/>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4226.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4226.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27358/">CVE-2021-27358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27358">CVE-2021-27358 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3114/">CVE-2021-3114 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3114">CVE-2021-3114 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838157" comment="grafana-7.5.9-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2188" version="1" class="patch">
	<metadata>
		<title>security update for libwebp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2018-25014" ref_url="https://www.suse.com/security/cve/CVE-2018-25014/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4231.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4231.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25009">CVE-2018-25009 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25010">CVE-2018-25010 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25012">CVE-2018-25012 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25013">CVE-2018-25013 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25014/">CVE-2018-25014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25014">CVE-2018-25014 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36330">CVE-2020-36330 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36331">CVE-2020-36331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36332">CVE-2020-36332 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838158" comment="libwebp-1.0.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838159" comment="libwebp-devel-1.0.0-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2189" version="1" class="patch">
	<metadata>
		<title>security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-26926" ref_url="https://www.suse.com/security/cve/CVE-2021-26926/" source="CVE"/>
		<reference ref_id="CVE-2021-26927" ref_url="https://www.suse.com/security/cve/CVE-2021-26927/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4235.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4235.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27828">CVE-2020-27828 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26926/">CVE-2021-26926 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26926">CVE-2021-26926 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26927/">CVE-2021-26927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26927">CVE-2021-26927 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3272">CVE-2021-3272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838160" comment="jasper-devel-2.0.14-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838161" comment="jasper-libs-2.0.14-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2190" version="1" class="patch">
	<metadata>
		<title>security update for tcpdump (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4236.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4236.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8037">CVE-2020-8037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838162" comment="tcpdump-4.9.3-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2191" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4241.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4241.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35521">CVE-2020-35521 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35522">CVE-2020-35522 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35523">CVE-2020-35523 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35524">CVE-2020-35524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838163" comment="libtiff-4.0.9-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838164" comment="libtiff-devel-4.0.9-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838165" comment="libtiff-tools-4.0.9-20.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2192" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-20847" ref_url="https://www.suse.com/security/cve/CVE-2018-20847/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27814" ref_url="https://www.suse.com/security/cve/CVE-2020-27814/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-27824" ref_url="https://www.suse.com/security/cve/CVE-2020-27824/" source="CVE"/>
		<reference ref_id="CVE-2020-27842" ref_url="https://www.suse.com/security/cve/CVE-2020-27842/" source="CVE"/>
		<reference ref_id="CVE-2020-27843" ref_url="https://www.suse.com/security/cve/CVE-2020-27843/" source="CVE"/>
		<reference ref_id="CVE-2020-27845" ref_url="https://www.suse.com/security/cve/CVE-2020-27845/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2021-3575" ref_url="https://www.suse.com/security/cve/CVE-2021-3575/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4251.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4251.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20845">CVE-2018-20845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20847/">CVE-2018-20847 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20847">CVE-2018-20847 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5727">CVE-2018-5727 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5785">CVE-2018-5785 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12973">CVE-2019-12973 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15389">CVE-2020-15389 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27814/">CVE-2020-27814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27814">CVE-2020-27814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27823">CVE-2020-27823 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27824/">CVE-2020-27824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27824">CVE-2020-27824 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27842/">CVE-2020-27842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27842">CVE-2020-27842 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27843/">CVE-2020-27843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27843">CVE-2020-27843 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27845/">CVE-2020-27845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27845">CVE-2020-27845 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29338">CVE-2021-29338 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3575/">CVE-2021-3575 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3575">CVE-2021-3575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838166" comment="openjpeg2-2.4.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838167" comment="openjpeg2-devel-2.4.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838168" comment="openjpeg2-devel-docs-2.4.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838169" comment="openjpeg2-tools-2.4.0-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2193" version="1" class="patch">
	<metadata>
		<title>security update for graphviz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4256.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4256.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18032">CVE-2020-18032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838170" comment="graphviz-2.40.1-43.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838171" comment="graphviz-devel-2.40.1-43.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838172" comment="graphviz-doc-2.40.1-43.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838173" comment="graphviz-gd-2.40.1-43.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838174" comment="graphviz-python3-2.40.1-43.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2194" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4257.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4257.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26690">CVE-2021-26690 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30641">CVE-2021-30641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838175" comment="httpd-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838176" comment="httpd-devel-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838177" comment="httpd-filesystem-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838178" comment="httpd-manual-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838179" comment="httpd-tools-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831132" comment="mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838180" comment="mod_ldap-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838181" comment="mod_proxy_html-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838182" comment="mod_session-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838183" comment="mod_ssl-2.4.37-41.module+el8.5.0+11772+c8e0c271 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2195" version="1" class="patch">
	<metadata>
		<title>security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-29922" ref_url="https://www.suse.com/security/cve/CVE-2021-29922/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4270.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4270.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29922/">CVE-2021-29922 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29922">CVE-2021-29922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838184" comment="cargo-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838185" comment="cargo-doc-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838186" comment="clippy-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838187" comment="rls-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838188" comment="rust-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838189" comment="rust-analysis-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838190" comment="rust-debugger-common-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838191" comment="rust-doc-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838192" comment="rust-gdb-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838193" comment="rust-lldb-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838194" comment="rust-src-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838195" comment="rust-std-static-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838196" comment="rust-std-static-wasm32-unknown-unknown-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838197" comment="rust-toolset-1.54.0-1.module+el8.5.0+12195+effd8a03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838198" comment="rustfmt-1.54.0-2.module+el8.5.0+12254+dc27bae9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2196" version="1" class="patch">
	<metadata>
		<title>security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4288.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4288.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17541">CVE-2020-17541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838199" comment="libjpeg-turbo-1.5.3-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838200" comment="libjpeg-turbo-devel-1.5.3-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838201" comment="libjpeg-turbo-utils-1.5.3-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838202" comment="turbojpeg-1.5.3-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838203" comment="turbojpeg-devel-1.5.3-12.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2197" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="CVE-2021-28652" ref_url="https://www.suse.com/security/cve/CVE-2021-28652/" source="CVE"/>
		<reference ref_id="CVE-2021-28662" ref_url="https://www.suse.com/security/cve/CVE-2021-28662/" source="CVE"/>
		<reference ref_id="CVE-2021-31806" ref_url="https://www.suse.com/security/cve/CVE-2021-31806/" source="CVE"/>
		<reference ref_id="CVE-2021-31807" ref_url="https://www.suse.com/security/cve/CVE-2021-31807/" source="CVE"/>
		<reference ref_id="CVE-2021-31808" ref_url="https://www.suse.com/security/cve/CVE-2021-31808/" source="CVE"/>
		<reference ref_id="CVE-2021-33620" ref_url="https://www.suse.com/security/cve/CVE-2021-33620/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4292.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4292.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28651">CVE-2021-28651 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28652/">CVE-2021-28652 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28652">CVE-2021-28652 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28662/">CVE-2021-28662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28662">CVE-2021-28662 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31806/">CVE-2021-31806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31806">CVE-2021-31806 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31807/">CVE-2021-31807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31807">CVE-2021-31807 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31808/">CVE-2021-31808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31808">CVE-2021-31808 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33620/">CVE-2021-33620 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33620">CVE-2021-33620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832711" comment="libecap-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832712" comment="libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838204" comment="squid-4.15-1.module+el8.5.0+11469+24c223d9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2198" version="1" class="patch">
	<metadata>
		<title>security update for spamassassin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4315.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4315.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1946">CVE-2020-1946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838205" comment="spamassassin-3.4.4-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2199" version="1" class="patch">
	<metadata>
		<title>security update for zziplib (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-18442" ref_url="https://www.suse.com/security/cve/CVE-2020-18442/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4316.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4316.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18442/">CVE-2020-18442 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18442">CVE-2020-18442 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838206" comment="zziplib-0.13.68-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838207" comment="zziplib-devel-0.13.68-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838208" comment="zziplib-utils-0.13.68-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2200" version="1" class="patch">
	<metadata>
		<title>security update for compat-exiv2-026 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31292" ref_url="https://www.suse.com/security/cve/CVE-2021-31292/" source="CVE"/>
		<reference ref_id="CVE-2021-37618" ref_url="https://www.suse.com/security/cve/CVE-2021-37618/" source="CVE"/>
		<reference ref_id="CVE-2021-37619" ref_url="https://www.suse.com/security/cve/CVE-2021-37619/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4319.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4319.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31292/">CVE-2021-31292 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31292">CVE-2021-31292 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37618/">CVE-2021-37618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37618">CVE-2021-37618 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-37619/">CVE-2021-37619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37619">CVE-2021-37619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838209" comment="compat-exiv2-026-0.26-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2201" version="1" class="patch">
	<metadata>
		<title>security update for linuxptp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3571" ref_url="https://www.suse.com/security/cve/CVE-2021-3571/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4321.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4321.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3571/">CVE-2021-3571 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3571">CVE-2021-3571 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838210" comment="linuxptp-3.1.1-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2202" version="1" class="patch">
	<metadata>
		<title>security update for python-psutil (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18874" ref_url="https://www.suse.com/security/cve/CVE-2019-18874/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4324.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4324.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18874/">CVE-2019-18874 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18874">CVE-2019-18874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838211" comment="python3-psutil-5.4.3-11.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2203" version="1" class="patch">
	<metadata>
		<title>security update for lasso (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-28091" ref_url="https://www.suse.com/security/cve/CVE-2021-28091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4325.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4325.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28091/">CVE-2021-28091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28091">CVE-2021-28091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838212" comment="lasso-2.6.0-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838213" comment="lasso-devel-2.6.0-12.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2204" version="1" class="patch">
	<metadata>
		<title>security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4326.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4326.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838214" comment="libX11-1.6.8-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838215" comment="libX11-common-1.6.8-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838216" comment="libX11-devel-1.6.8-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838217" comment="libX11-xcb-1.6.8-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2205" version="1" class="patch">
	<metadata>
		<title>security update for grilo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-39365" ref_url="https://www.suse.com/security/cve/CVE-2021-39365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4339.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4339.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39365/">CVE-2021-39365 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39365">CVE-2021-39365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838218" comment="grilo-0.3.6-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838219" comment="grilo-devel-0.3.6-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2206" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-15794" ref_url="https://www.suse.com/security/cve/CVE-2019-15794/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-24502" ref_url="https://www.suse.com/security/cve/CVE-2020-24502/" source="CVE"/>
		<reference ref_id="CVE-2020-24503" ref_url="https://www.suse.com/security/cve/CVE-2020-24503/" source="CVE"/>
		<reference ref_id="CVE-2020-24504" ref_url="https://www.suse.com/security/cve/CVE-2020-24504/" source="CVE"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26140" ref_url="https://www.suse.com/security/cve/CVE-2020-26140/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26143" ref_url="https://www.suse.com/security/cve/CVE-2020-26143/" source="CVE"/>
		<reference ref_id="CVE-2020-26144" ref_url="https://www.suse.com/security/cve/CVE-2020-26144/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26146" ref_url="https://www.suse.com/security/cve/CVE-2020-26146/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-20194" ref_url="https://www.suse.com/security/cve/CVE-2021-20194/" source="CVE"/>
		<reference ref_id="CVE-2021-20239" ref_url="https://www.suse.com/security/cve/CVE-2021-20239/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29646" ref_url="https://www.suse.com/security/cve/CVE-2021-29646/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-29657" ref_url="https://www.suse.com/security/cve/CVE-2021-29657/" source="CVE"/>
		<reference ref_id="CVE-2021-31440" ref_url="https://www.suse.com/security/cve/CVE-2021-31440/" source="CVE"/>
		<reference ref_id="CVE-2021-31829" ref_url="https://www.suse.com/security/cve/CVE-2021-31829/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3489" ref_url="https://www.suse.com/security/cve/CVE-2021-3489/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3600" ref_url="https://www.suse.com/security/cve/CVE-2021-3600/" source="CVE"/>
		<reference ref_id="CVE-2021-3635" ref_url="https://www.suse.com/security/cve/CVE-2021-3635/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-4442" ref_url="https://www.suse.com/security/cve/CVE-2021-4442/" source="CVE"/>
		<reference ref_id="CVE-2021-46905" ref_url="https://www.suse.com/security/cve/CVE-2021-46905/" source="CVE"/>
		<reference ref_id="CVE-2021-46983" ref_url="https://www.suse.com/security/cve/CVE-2021-46983/" source="CVE"/>
		<reference ref_id="CVE-2021-47011" ref_url="https://www.suse.com/security/cve/CVE-2021-47011/" source="CVE"/>
		<reference ref_id="CVE-2021-47080" ref_url="https://www.suse.com/security/cve/CVE-2021-47080/" source="CVE"/>
		<reference ref_id="CVE-2022-20166" ref_url="https://www.suse.com/security/cve/CVE-2022-20166/" source="CVE"/>
		<reference ref_id="CVE-2022-50042" ref_url="https://www.suse.com/security/cve/CVE-2022-50042/" source="CVE"/>
		<reference ref_id="CVE-2022-50073" ref_url="https://www.suse.com/security/cve/CVE-2022-50073/" source="CVE"/>
		<reference ref_id="CVE-2023-53578" ref_url="https://www.suse.com/security/cve/CVE-2023-53578/" source="CVE"/>
		<reference ref_id="CVE-2023-53598" ref_url="https://www.suse.com/security/cve/CVE-2023-53598/" source="CVE"/>
		<reference ref_id="CVE-2023-53607" ref_url="https://www.suse.com/security/cve/CVE-2023-53607/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4356.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4356.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15794/">CVE-2019-15794 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15794">CVE-2019-15794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24502/">CVE-2020-24502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24502">CVE-2020-24502 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24503/">CVE-2020-24503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24503">CVE-2020-24503 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24504/">CVE-2020-24504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24504">CVE-2020-24504 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26140/">CVE-2020-26140 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26140">CVE-2020-26140 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26143/">CVE-2020-26143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26143">CVE-2020-26143 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26144/">CVE-2020-26144 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26144">CVE-2020-26144 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26146/">CVE-2020-26146 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26146">CVE-2020-26146 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29368">CVE-2020-29368 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20194/">CVE-2021-20194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20194">CVE-2021-20194 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20239/">CVE-2021-20239 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20239">CVE-2021-20239 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23133">CVE-2021-23133 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29155">CVE-2021-29155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29646/">CVE-2021-29646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29646">CVE-2021-29646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29657/">CVE-2021-29657 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29657">CVE-2021-29657 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31440/">CVE-2021-31440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31440">CVE-2021-31440 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31829/">CVE-2021-31829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31829">CVE-2021-31829 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">CVE-2021-31916 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33098">CVE-2021-33098 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33200">CVE-2021-33200 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3348">CVE-2021-3348 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3444">CVE-2021-3444 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3489/">CVE-2021-3489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3489">CVE-2021-3489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3600/">CVE-2021-3600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3600">CVE-2021-3600 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3635/">CVE-2021-3635 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3635">CVE-2021-3635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4442/">CVE-2021-4442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4442">CVE-2021-4442 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46905/">CVE-2021-46905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46905">CVE-2021-46905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46983/">CVE-2021-46983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46983">CVE-2021-46983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47011/">CVE-2021-47011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47011">CVE-2021-47011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47080/">CVE-2021-47080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47080">CVE-2021-47080 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-20166/">CVE-2022-20166 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20166">CVE-2022-20166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50042/">CVE-2022-50042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50042">CVE-2022-50042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50073/">CVE-2022-50073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50073">CVE-2022-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53578/">CVE-2023-53578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53578">CVE-2023-53578 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53598/">CVE-2023-53598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53598">CVE-2023-53598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53607/">CVE-2023-53607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53607">CVE-2023-53607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838220" comment="bpftool-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838221" comment="kernel-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838222" comment="kernel-abi-stablelists-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838223" comment="kernel-core-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838224" comment="kernel-cross-headers-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838225" comment="kernel-debug-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838226" comment="kernel-debug-core-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838228" comment="kernel-debug-modules-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838229" comment="kernel-debug-modules-extra-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838231" comment="kernel-doc-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838232" comment="kernel-headers-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838233" comment="kernel-modules-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838234" comment="kernel-modules-extra-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838235" comment="kernel-tools-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838236" comment="kernel-tools-libs-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838238" comment="perf-4.18.0-348.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838239" comment="python3-perf-4.18.0-348.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2207" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-27645" ref_url="https://www.suse.com/security/cve/CVE-2021-27645/" source="CVE"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4358.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4358.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27645/">CVE-2021-27645 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27645">CVE-2021-27645 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838240" comment="compat-libpthread-nonshared-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838241" comment="glibc-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838242" comment="glibc-all-langpacks-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838243" comment="glibc-benchtests-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838244" comment="glibc-common-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838245" comment="glibc-devel-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838246" comment="glibc-headers-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838247" comment="glibc-langpack-aa-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838248" comment="glibc-langpack-af-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838249" comment="glibc-langpack-agr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838250" comment="glibc-langpack-ak-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838251" comment="glibc-langpack-am-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838252" comment="glibc-langpack-an-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838253" comment="glibc-langpack-anp-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838254" comment="glibc-langpack-ar-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838255" comment="glibc-langpack-as-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838256" comment="glibc-langpack-ast-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838257" comment="glibc-langpack-ayc-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838258" comment="glibc-langpack-az-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838259" comment="glibc-langpack-be-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838260" comment="glibc-langpack-bem-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838261" comment="glibc-langpack-ber-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838262" comment="glibc-langpack-bg-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838263" comment="glibc-langpack-bhb-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838264" comment="glibc-langpack-bho-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838265" comment="glibc-langpack-bi-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838266" comment="glibc-langpack-bn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838267" comment="glibc-langpack-bo-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838268" comment="glibc-langpack-br-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838269" comment="glibc-langpack-brx-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838270" comment="glibc-langpack-bs-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838271" comment="glibc-langpack-byn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838272" comment="glibc-langpack-ca-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838273" comment="glibc-langpack-ce-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838274" comment="glibc-langpack-chr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838275" comment="glibc-langpack-cmn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838276" comment="glibc-langpack-crh-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838277" comment="glibc-langpack-cs-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838278" comment="glibc-langpack-csb-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838279" comment="glibc-langpack-cv-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838280" comment="glibc-langpack-cy-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838281" comment="glibc-langpack-da-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838282" comment="glibc-langpack-de-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838283" comment="glibc-langpack-doi-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838284" comment="glibc-langpack-dsb-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838285" comment="glibc-langpack-dv-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838286" comment="glibc-langpack-dz-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838287" comment="glibc-langpack-el-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838288" comment="glibc-langpack-en-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838289" comment="glibc-langpack-eo-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838290" comment="glibc-langpack-es-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838291" comment="glibc-langpack-et-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838292" comment="glibc-langpack-eu-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838293" comment="glibc-langpack-fa-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838294" comment="glibc-langpack-ff-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838295" comment="glibc-langpack-fi-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838296" comment="glibc-langpack-fil-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838297" comment="glibc-langpack-fo-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838298" comment="glibc-langpack-fr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838299" comment="glibc-langpack-fur-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838300" comment="glibc-langpack-fy-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838301" comment="glibc-langpack-ga-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838302" comment="glibc-langpack-gd-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838303" comment="glibc-langpack-gez-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838304" comment="glibc-langpack-gl-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838305" comment="glibc-langpack-gu-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838306" comment="glibc-langpack-gv-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838307" comment="glibc-langpack-ha-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838308" comment="glibc-langpack-hak-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838309" comment="glibc-langpack-he-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838310" comment="glibc-langpack-hi-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838311" comment="glibc-langpack-hif-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838312" comment="glibc-langpack-hne-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838313" comment="glibc-langpack-hr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838314" comment="glibc-langpack-hsb-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838315" comment="glibc-langpack-ht-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838316" comment="glibc-langpack-hu-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838317" comment="glibc-langpack-hy-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838318" comment="glibc-langpack-ia-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838319" comment="glibc-langpack-id-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838320" comment="glibc-langpack-ig-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838321" comment="glibc-langpack-ik-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838322" comment="glibc-langpack-is-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838323" comment="glibc-langpack-it-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838324" comment="glibc-langpack-iu-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838325" comment="glibc-langpack-ja-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838326" comment="glibc-langpack-ka-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838327" comment="glibc-langpack-kab-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838328" comment="glibc-langpack-kk-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838329" comment="glibc-langpack-kl-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838330" comment="glibc-langpack-km-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838331" comment="glibc-langpack-kn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838332" comment="glibc-langpack-ko-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838333" comment="glibc-langpack-kok-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838334" comment="glibc-langpack-ks-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838335" comment="glibc-langpack-ku-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838336" comment="glibc-langpack-kw-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838337" comment="glibc-langpack-ky-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838338" comment="glibc-langpack-lb-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838339" comment="glibc-langpack-lg-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838340" comment="glibc-langpack-li-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838341" comment="glibc-langpack-lij-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838342" comment="glibc-langpack-ln-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838343" comment="glibc-langpack-lo-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838344" comment="glibc-langpack-lt-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838345" comment="glibc-langpack-lv-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838346" comment="glibc-langpack-lzh-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838347" comment="glibc-langpack-mag-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838348" comment="glibc-langpack-mai-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838349" comment="glibc-langpack-mfe-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838350" comment="glibc-langpack-mg-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838351" comment="glibc-langpack-mhr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838352" comment="glibc-langpack-mi-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838353" comment="glibc-langpack-miq-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838354" comment="glibc-langpack-mjw-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838355" comment="glibc-langpack-mk-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838356" comment="glibc-langpack-ml-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838357" comment="glibc-langpack-mn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838358" comment="glibc-langpack-mni-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838359" comment="glibc-langpack-mr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838360" comment="glibc-langpack-ms-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838361" comment="glibc-langpack-mt-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838362" comment="glibc-langpack-my-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838363" comment="glibc-langpack-nan-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838364" comment="glibc-langpack-nb-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838365" comment="glibc-langpack-nds-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838366" comment="glibc-langpack-ne-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838367" comment="glibc-langpack-nhn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838368" comment="glibc-langpack-niu-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838369" comment="glibc-langpack-nl-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838370" comment="glibc-langpack-nn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838371" comment="glibc-langpack-nr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838372" comment="glibc-langpack-nso-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838373" comment="glibc-langpack-oc-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838374" comment="glibc-langpack-om-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838375" comment="glibc-langpack-or-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838376" comment="glibc-langpack-os-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838377" comment="glibc-langpack-pa-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838378" comment="glibc-langpack-pap-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838379" comment="glibc-langpack-pl-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838380" comment="glibc-langpack-ps-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838381" comment="glibc-langpack-pt-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838382" comment="glibc-langpack-quz-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838383" comment="glibc-langpack-raj-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838384" comment="glibc-langpack-ro-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838385" comment="glibc-langpack-ru-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838386" comment="glibc-langpack-rw-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838387" comment="glibc-langpack-sa-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838388" comment="glibc-langpack-sah-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838389" comment="glibc-langpack-sat-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838390" comment="glibc-langpack-sc-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838391" comment="glibc-langpack-sd-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838392" comment="glibc-langpack-se-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838393" comment="glibc-langpack-sgs-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838394" comment="glibc-langpack-shn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838395" comment="glibc-langpack-shs-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838396" comment="glibc-langpack-si-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838397" comment="glibc-langpack-sid-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838398" comment="glibc-langpack-sk-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838399" comment="glibc-langpack-sl-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838400" comment="glibc-langpack-sm-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838401" comment="glibc-langpack-so-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838402" comment="glibc-langpack-sq-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838403" comment="glibc-langpack-sr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838404" comment="glibc-langpack-ss-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838405" comment="glibc-langpack-st-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838406" comment="glibc-langpack-sv-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838407" comment="glibc-langpack-sw-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838408" comment="glibc-langpack-szl-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838409" comment="glibc-langpack-ta-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838410" comment="glibc-langpack-tcy-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838411" comment="glibc-langpack-te-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838412" comment="glibc-langpack-tg-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838413" comment="glibc-langpack-th-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838414" comment="glibc-langpack-the-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838415" comment="glibc-langpack-ti-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838416" comment="glibc-langpack-tig-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838417" comment="glibc-langpack-tk-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838418" comment="glibc-langpack-tl-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838419" comment="glibc-langpack-tn-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838420" comment="glibc-langpack-to-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838421" comment="glibc-langpack-tpi-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838422" comment="glibc-langpack-tr-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838423" comment="glibc-langpack-ts-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838424" comment="glibc-langpack-tt-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838425" comment="glibc-langpack-ug-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838426" comment="glibc-langpack-uk-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838427" comment="glibc-langpack-unm-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838428" comment="glibc-langpack-ur-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838429" comment="glibc-langpack-uz-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838430" comment="glibc-langpack-ve-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838431" comment="glibc-langpack-vi-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838432" comment="glibc-langpack-wa-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838433" comment="glibc-langpack-wae-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838434" comment="glibc-langpack-wal-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838435" comment="glibc-langpack-wo-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838436" comment="glibc-langpack-xh-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838437" comment="glibc-langpack-yi-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838438" comment="glibc-langpack-yo-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838439" comment="glibc-langpack-yue-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838440" comment="glibc-langpack-yuw-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838441" comment="glibc-langpack-zh-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838442" comment="glibc-langpack-zu-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838443" comment="glibc-locale-source-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838444" comment="glibc-minimal-langpack-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838445" comment="glibc-nss-devel-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838446" comment="glibc-static-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838447" comment="glibc-utils-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838448" comment="libnsl-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838449" comment="nscd-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838450" comment="nss_db-2.28-164.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838451" comment="nss_hesiod-2.28-164.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2208" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13529" ref_url="https://www.suse.com/security/cve/CVE-2020-13529/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4361.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4361.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13529/">CVE-2020-13529 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838452" comment="NetworkManager-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838453" comment="NetworkManager-adsl-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838454" comment="NetworkManager-bluetooth-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838455" comment="NetworkManager-cloud-setup-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838456" comment="NetworkManager-config-connectivity-suse-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838457" comment="NetworkManager-config-server-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838458" comment="NetworkManager-dispatcher-routing-rules-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838459" comment="NetworkManager-libnm-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838460" comment="NetworkManager-libnm-devel-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838461" comment="NetworkManager-ovs-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838462" comment="NetworkManager-ppp-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838463" comment="NetworkManager-team-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838464" comment="NetworkManager-tui-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838465" comment="NetworkManager-wifi-1.32.10-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838466" comment="NetworkManager-wwan-1.32.10-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2209" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4364.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4364.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35448">CVE-2020-35448 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20197">CVE-2021-20197 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20284">CVE-2021-20284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487">CVE-2021-3487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838467" comment="binutils-2.30-108.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838468" comment="binutils-devel-2.30-108.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2210" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4368.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4368.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838469" comment="openssh-8.0p1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838470" comment="openssh-askpass-8.0p1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838471" comment="openssh-cavs-8.0p1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838472" comment="openssh-clients-8.0p1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838473" comment="openssh-keycat-8.0p1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838474" comment="openssh-ldap-8.0p1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838475" comment="openssh-server-8.0p1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838476" comment="pam_ssh_agent_auth-0.10.3-7.10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2211" version="1" class="patch">
	<metadata>
		<title>security update for pcre (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4373.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4373.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838477" comment="pcre-8.42-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838478" comment="pcre-cpp-8.42-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838479" comment="pcre-devel-8.42-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838480" comment="pcre-static-8.42-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838481" comment="pcre-utf16-8.42-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838482" comment="pcre-utf32-8.42-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2212" version="1" class="patch">
	<metadata>
		<title>security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4374.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4374.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838483" comment="file-5.33-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838484" comment="file-devel-5.33-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838485" comment="file-libs-5.33-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838486" comment="python3-magic-5.33-20.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2213" version="1" class="patch">
	<metadata>
		<title>security update for LibRaw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="CVE-2020-24870" ref_url="https://www.suse.com/security/cve/CVE-2020-24870/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-36241" ref_url="https://www.suse.com/security/cve/CVE-2020-36241/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-28650" ref_url="https://www.suse.com/security/cve/CVE-2021-28650/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4381.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4381.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13558">CVE-2020-13558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24870/">CVE-2020-24870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24870">CVE-2020-24870 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27918">CVE-2020-27918 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29623">CVE-2020-29623 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36241/">CVE-2020-36241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36241">CVE-2020-36241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1765">CVE-2021-1765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1788">CVE-2021-1788 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1789">CVE-2021-1789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1799">CVE-2021-1799 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1801">CVE-2021-1801 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1844">CVE-2021-1844 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1870">CVE-2021-1870 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1871">CVE-2021-1871 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21775">CVE-2021-21775 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21779">CVE-2021-21779 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21806">CVE-2021-21806 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-28650/">CVE-2021-28650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28650">CVE-2021-28650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30663">CVE-2021-30663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30665">CVE-2021-30665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30682">CVE-2021-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30689">CVE-2021-30689 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30720">CVE-2021-30720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30734">CVE-2021-30734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30744">CVE-2021-30744 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30749">CVE-2021-30749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30758">CVE-2021-30758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30795">CVE-2021-30795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30797">CVE-2021-30797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30799">CVE-2021-30799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838487" comment="LibRaw-0.19.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838488" comment="LibRaw-devel-0.19.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838489" comment="accountsservice-0.6.55-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838490" comment="accountsservice-devel-0.6.55-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838491" comment="accountsservice-libs-0.6.55-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838492" comment="gdm-40.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838493" comment="gnome-autoar-0.2.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838494" comment="gnome-calculator-3.28.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838495" comment="gnome-classic-session-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838496" comment="gnome-control-center-3.28.2-28.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838497" comment="gnome-control-center-filesystem-3.28.2-28.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838498" comment="gnome-online-accounts-3.28.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838499" comment="gnome-online-accounts-devel-3.28.2-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838500" comment="gnome-session-3.28.1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838501" comment="gnome-session-kiosk-session-3.28.1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838502" comment="gnome-session-wayland-session-3.28.1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838503" comment="gnome-session-xsession-3.28.1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838504" comment="gnome-settings-daemon-3.32.0-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838505" comment="gnome-shell-3.32.2-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838506" comment="gnome-shell-extension-apps-menu-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838507" comment="gnome-shell-extension-auto-move-windows-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838508" comment="gnome-shell-extension-common-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838509" comment="gnome-shell-extension-dash-to-dock-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838510" comment="gnome-shell-extension-desktop-icons-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838511" comment="gnome-shell-extension-disable-screenshield-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838512" comment="gnome-shell-extension-drive-menu-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838513" comment="gnome-shell-extension-gesture-inhibitor-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838514" comment="gnome-shell-extension-horizontal-workspaces-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838515" comment="gnome-shell-extension-launch-new-instance-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838516" comment="gnome-shell-extension-native-window-placement-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838517" comment="gnome-shell-extension-no-hot-corner-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838518" comment="gnome-shell-extension-panel-favorites-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838519" comment="gnome-shell-extension-places-menu-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838520" comment="gnome-shell-extension-screenshot-window-sizer-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838521" comment="gnome-shell-extension-systemMonitor-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838522" comment="gnome-shell-extension-top-icons-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838523" comment="gnome-shell-extension-updates-dialog-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838524" comment="gnome-shell-extension-user-theme-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838525" comment="gnome-shell-extension-window-grouper-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838526" comment="gnome-shell-extension-window-list-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838527" comment="gnome-shell-extension-windowsNavigator-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838528" comment="gnome-shell-extension-workspace-indicator-3.32.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838529" comment="gnome-software-3.36.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838530" comment="gnome-software-devel-3.36.1-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838531" comment="gsettings-desktop-schemas-3.32.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838532" comment="gsettings-desktop-schemas-devel-3.32.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838533" comment="gtk-update-icon-cache-3.22.30-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838534" comment="gtk3-3.22.30-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838535" comment="gtk3-devel-3.22.30-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838536" comment="gtk3-immodule-xim-3.22.30-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838537" comment="mutter-3.32.2-60.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838538" comment="mutter-devel-3.32.2-60.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838539" comment="vino-3.22.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838540" comment="webkit2gtk3-2.32.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838541" comment="webkit2gtk3-devel-2.32.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838542" comment="webkit2gtk3-jsc-2.32.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838543" comment="webkit2gtk3-jsc-devel-2.32.3-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2214" version="1" class="patch">
	<metadata>
		<title>security update for json-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4382.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4382.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838544" comment="json-c-0.13.1-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838545" comment="json-c-devel-0.13.1-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838546" comment="json-c-doc-0.13.1-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2215" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4384.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4384.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838547" comment="bind-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838548" comment="bind-chroot-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838549" comment="bind-devel-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838550" comment="bind-export-devel-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838551" comment="bind-export-libs-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838552" comment="bind-libs-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838553" comment="bind-libs-lite-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838554" comment="bind-license-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838555" comment="bind-lite-devel-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838556" comment="bind-pkcs11-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838557" comment="bind-pkcs11-devel-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838558" comment="bind-pkcs11-libs-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838559" comment="bind-pkcs11-utils-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838560" comment="bind-sdb-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838561" comment="bind-sdb-chroot-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838562" comment="bind-utils-9.11.26-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838563" comment="python3-bind-9.11.26-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2216" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-28153" ref_url="https://www.suse.com/security/cve/CVE-2021-28153/" source="CVE"/>
		<reference ref_id="CVE-2021-3800" ref_url="https://www.suse.com/security/cve/CVE-2021-3800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4385.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4385.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28153/">CVE-2021-28153 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">CVE-2021-28153 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3800/">CVE-2021-3800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3800">CVE-2021-3800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838564" comment="glib2-2.56.4-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838565" comment="glib2-devel-2.56.4-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838566" comment="glib2-doc-2.56.4-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838567" comment="glib2-fam-2.56.4-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838568" comment="glib2-static-2.56.4-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838569" comment="glib2-tests-2.56.4-156.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2217" version="1" class="patch">
	<metadata>
		<title>security update for gcc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-20673" ref_url="https://www.suse.com/security/cve/CVE-2018-20673/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4386.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4386.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20673/">CVE-2018-20673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20673">CVE-2018-20673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838570" comment="cpp-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838571" comment="gcc-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838572" comment="gcc-c++-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838573" comment="gcc-gdb-plugin-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838574" comment="gcc-gfortran-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838575" comment="gcc-offload-nvptx-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838576" comment="gcc-plugin-devel-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838577" comment="libasan-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838578" comment="libatomic-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838579" comment="libatomic-static-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838580" comment="libgcc-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838581" comment="libgfortran-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838582" comment="libgomp-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838583" comment="libgomp-offload-nvptx-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838584" comment="libitm-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838585" comment="libitm-devel-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838586" comment="liblsan-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838587" comment="libquadmath-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838588" comment="libquadmath-devel-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838589" comment="libstdc++-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838590" comment="libstdc++-devel-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838591" comment="libstdc++-docs-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838592" comment="libstdc++-static-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838593" comment="libtsan-8.5.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838594" comment="libubsan-8.5.0-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2218" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16135" ref_url="https://www.suse.com/security/cve/CVE-2020-16135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4387.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4387.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16135/">CVE-2020-16135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16135">CVE-2020-16135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838595" comment="libssh-0.9.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838596" comment="libssh-config-0.9.4-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838597" comment="libssh-devel-0.9.4-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2219" version="1" class="patch">
	<metadata>
		<title>security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4393.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4393.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10001">CVE-2020-10001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838598" comment="cups-2.2.6-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838599" comment="cups-client-2.2.6-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838600" comment="cups-devel-2.2.6-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838601" comment="cups-filesystem-2.2.6-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838602" comment="cups-ipptool-2.2.6-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838603" comment="cups-libs-2.2.6-40.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838604" comment="cups-lpd-2.2.6-40.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2220" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13750" ref_url="https://www.suse.com/security/cve/CVE-2019-13750/" source="CVE"/>
		<reference ref_id="CVE-2019-13751" ref_url="https://www.suse.com/security/cve/CVE-2019-13751/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-5827" ref_url="https://www.suse.com/security/cve/CVE-2019-5827/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4396.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4396.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13750/">CVE-2019-13750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13750">CVE-2019-13750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13751/">CVE-2019-13751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13751">CVE-2019-13751 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5827/">CVE-2019-5827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5827">CVE-2019-5827 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838605" comment="lemon-3.26.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838606" comment="sqlite-3.26.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838607" comment="sqlite-devel-3.26.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838608" comment="sqlite-doc-3.26.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838609" comment="sqlite-libs-3.26.0-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2221" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4399.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4399.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838610" comment="platform-python-3.6.8-41.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838611" comment="platform-python-debug-3.6.8-41.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838612" comment="platform-python-devel-3.6.8-41.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838613" comment="python3-idle-3.6.8-41.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838614" comment="python3-libs-3.6.8-41.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838615" comment="python3-test-3.6.8-41.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838616" comment="python3-tkinter-3.6.8-41.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2222" version="1" class="patch">
	<metadata>
		<title>security update for kexec-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20269" ref_url="https://www.suse.com/security/cve/CVE-2021-20269/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4404.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4404.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20269/">CVE-2021-20269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20269">CVE-2021-20269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838617" comment="kexec-tools-2.0.20-57.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2223" version="1" class="patch">
	<metadata>
		<title>security update for libsolv (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4408.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4408.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3200">CVE-2021-3200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838618" comment="libsolv-0.7.19-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838619" comment="libsolv-devel-0.7.19-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838620" comment="libsolv-tools-0.7.19-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838621" comment="python3-solv-0.7.19-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2224" version="1" class="patch">
	<metadata>
		<title>security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4409.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4409.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838622" comment="libgcrypt-1.8.5-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838623" comment="libgcrypt-devel-1.8.5-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2225" version="1" class="patch">
	<metadata>
		<title>security update for tpm2-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3565" ref_url="https://www.suse.com/security/cve/CVE-2021-3565/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4413.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4413.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3565/">CVE-2021-3565 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3565">CVE-2021-3565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838624" comment="tpm2-tools-4.1.1-5.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2226" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4424.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4424.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838625" comment="openssl-1.1.1k-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838626" comment="openssl-devel-1.1.1k-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838627" comment="openssl-libs-1.1.1k-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838628" comment="openssl-perl-1.1.1k-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2227" version="1" class="patch">
	<metadata>
		<title>security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4426.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4426.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594">CVE-2019-17594 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595">CVE-2019-17595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838629" comment="ncurses-6.1-9.20180224.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838630" comment="ncurses-base-6.1-9.20180224.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838631" comment="ncurses-c++-libs-6.1-9.20180224.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838632" comment="ncurses-compat-libs-6.1-9.20180224.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838633" comment="ncurses-devel-6.1-9.20180224.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838634" comment="ncurses-libs-6.1-9.20180224.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838635" comment="ncurses-term-6.1-9.20180224.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2228" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4432.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4432.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838636" comment="bluez-5.56-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838637" comment="bluez-cups-5.56-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838638" comment="bluez-hid2hci-5.56-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838639" comment="bluez-libs-5.56-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838640" comment="bluez-libs-devel-5.56-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838641" comment="bluez-obexd-5.56-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2229" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20231" ref_url="https://www.suse.com/security/cve/CVE-2021-20231/" source="CVE"/>
		<reference ref_id="CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232/" source="CVE"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4451.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4451.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20231/">CVE-2021-20231 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232">CVE-2021-20232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838642" comment="gnutls-3.6.16-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838643" comment="gnutls-c++-3.6.16-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838644" comment="gnutls-dane-3.6.16-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838645" comment="gnutls-devel-3.6.16-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838646" comment="gnutls-utils-3.6.16-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838647" comment="nettle-3.4.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838648" comment="nettle-devel-3.4.1-7.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2230" version="1" class="patch">
	<metadata>
		<title>security update for python-pip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4455.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4455.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3572">CVE-2021-3572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838649" comment="platform-python-pip-9.0.3-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838650" comment="python3-pip-9.0.3-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838651" comment="python3-pip-wheel-9.0.3-20.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2231" version="1" class="patch">
	<metadata>
		<title>security update for dnf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3445" ref_url="https://www.suse.com/security/cve/CVE-2021-3445/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3445/">CVE-2021-3445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3445">CVE-2021-3445 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838652" comment="dnf-4.7.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838653" comment="dnf-automatic-4.7.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838654" comment="dnf-data-4.7.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838655" comment="dnf-plugins-core-4.0.21-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838656" comment="libdnf-0.63.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838657" comment="libdnf-devel-0.63.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838658" comment="python3-dnf-4.7.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838659" comment="python3-dnf-plugin-post-transaction-actions-4.0.21-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838660" comment="python3-dnf-plugin-versionlock-4.0.21-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838661" comment="python3-dnf-plugins-core-4.0.21-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838662" comment="python3-hawkey-0.63.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838663" comment="python3-libdnf-0.63.0-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838664" comment="yum-4.7.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838665" comment="yum-utils-4.0.21-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2232" version="1" class="patch">
	<metadata>
		<title>security update for rpm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4489.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4489.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838666" comment="python3-rpm-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838667" comment="rpm-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838668" comment="rpm-apidocs-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838669" comment="rpm-build-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838670" comment="rpm-build-libs-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838671" comment="rpm-cron-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838672" comment="rpm-devel-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838673" comment="rpm-libs-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838674" comment="rpm-plugin-fapolicyd-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838675" comment="rpm-plugin-ima-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838676" comment="rpm-plugin-prioreset-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838677" comment="rpm-plugin-selinux-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838678" comment="rpm-plugin-syslog-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838679" comment="rpm-plugin-systemd-inhibit-4.14.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838680" comment="rpm-sign-4.14.3-19.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2233" version="1" class="patch">
	<metadata>
		<title>security update for lua (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4510.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4510.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24370">CVE-2020-24370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838681" comment="lua-5.3.4-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838682" comment="lua-devel-5.3.4-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838683" comment="lua-libs-5.3.4-12.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2234" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4511.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4511.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838684" comment="curl-7.61.1-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838685" comment="libcurl-7.61.1-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838686" comment="libcurl-devel-7.61.1-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838687" comment="libcurl-minimal-7.61.1-22.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2235" version="1" class="patch">
	<metadata>
		<title>security update for libsepol (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-36084" ref_url="https://www.suse.com/security/cve/CVE-2021-36084/" source="CVE"/>
		<reference ref_id="CVE-2021-36085" ref_url="https://www.suse.com/security/cve/CVE-2021-36085/" source="CVE"/>
		<reference ref_id="CVE-2021-36086" ref_url="https://www.suse.com/security/cve/CVE-2021-36086/" source="CVE"/>
		<reference ref_id="CVE-2021-36087" ref_url="https://www.suse.com/security/cve/CVE-2021-36087/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4513.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4513.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36084/">CVE-2021-36084 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36084">CVE-2021-36084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36085/">CVE-2021-36085 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36085">CVE-2021-36085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36086/">CVE-2021-36086 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36086">CVE-2021-36086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36087/">CVE-2021-36087 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36087">CVE-2021-36087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838688" comment="libsepol-2.9-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838689" comment="libsepol-devel-2.9-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838690" comment="libsepol-static-2.9-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2236" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4517.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4517.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3778">CVE-2021-3778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3796">CVE-2021-3796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838691" comment="vim-X11-8.0.1763-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838692" comment="vim-common-8.0.1763-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838693" comment="vim-enhanced-8.0.1763-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838694" comment="vim-filesystem-8.0.1763-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838695" comment="vim-minimal-8.0.1763-16.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2237" version="1" class="patch">
	<metadata>
		<title>security update for autotrace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19004" ref_url="https://www.suse.com/security/cve/CVE-2019-19004/" source="CVE"/>
		<reference ref_id="CVE-2019-19005" ref_url="https://www.suse.com/security/cve/CVE-2019-19005/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4519.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4519.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19004/">CVE-2019-19004 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19004">CVE-2019-19004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19005/">CVE-2019-19005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19005">CVE-2019-19005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838696" comment="autotrace-0.31.1-53.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2238" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20325" ref_url="https://www.suse.com/security/cve/CVE-2021-20325/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4537.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4537.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20325/">CVE-2021-20325 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20325">CVE-2021-20325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838697" comment="httpd-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838698" comment="httpd-devel-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838699" comment="httpd-filesystem-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838700" comment="httpd-manual-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838701" comment="httpd-tools-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831132" comment="mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838702" comment="mod_ldap-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838703" comment="mod_proxy_html-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838704" comment="mod_session-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838705" comment="mod_ssl-2.4.37-43.module+el8.5.0+13064+c4b14997 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2239" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-10-gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838706" comment="gcc-toolset-10-gcc-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838707" comment="gcc-toolset-10-gcc-c++-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838708" comment="gcc-toolset-10-gcc-gdb-plugin-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838709" comment="gcc-toolset-10-gcc-gfortran-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838710" comment="gcc-toolset-10-gcc-plugin-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838711" comment="gcc-toolset-10-libasan-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838712" comment="gcc-toolset-10-libatomic-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838713" comment="gcc-toolset-10-libitm-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838714" comment="gcc-toolset-10-liblsan-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838715" comment="gcc-toolset-10-libquadmath-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838716" comment="gcc-toolset-10-libstdc++-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838717" comment="gcc-toolset-10-libstdc++-docs-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838718" comment="gcc-toolset-10-libtsan-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838719" comment="gcc-toolset-10-libubsan-devel-10.3.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838720" comment="libasan6-10.3.1-1.2.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2240" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-11-gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4586.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4586.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838721" comment="gcc-toolset-11-gcc-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838722" comment="gcc-toolset-11-gcc-c++-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838723" comment="gcc-toolset-11-gcc-gdb-plugin-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838724" comment="gcc-toolset-11-gcc-gfortran-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838725" comment="gcc-toolset-11-gcc-plugin-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838726" comment="gcc-toolset-11-libasan-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838727" comment="gcc-toolset-11-libatomic-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838728" comment="gcc-toolset-11-libgccjit-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838729" comment="gcc-toolset-11-libgccjit-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838730" comment="gcc-toolset-11-libgccjit-docs-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838731" comment="gcc-toolset-11-libitm-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838732" comment="gcc-toolset-11-liblsan-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838733" comment="gcc-toolset-11-libquadmath-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838734" comment="gcc-toolset-11-libstdc++-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838735" comment="gcc-toolset-11-libstdc++-docs-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838736" comment="gcc-toolset-11-libtsan-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838737" comment="gcc-toolset-11-libubsan-devel-11.2.1-1.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838738" comment="libasan6-11.2.1-1.2.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2241" version="1" class="patch">
	<metadata>
		<title>security update for gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4587.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4587.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838739" comment="cpp-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838740" comment="gcc-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838741" comment="gcc-c++-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838742" comment="gcc-gdb-plugin-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838743" comment="gcc-gfortran-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838744" comment="gcc-offload-nvptx-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838745" comment="gcc-plugin-devel-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838746" comment="libasan-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838747" comment="libatomic-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838748" comment="libatomic-static-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838749" comment="libgcc-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838750" comment="libgfortran-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838751" comment="libgomp-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838752" comment="libgomp-offload-nvptx-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838753" comment="libitm-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838754" comment="libitm-devel-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838755" comment="liblsan-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838756" comment="libquadmath-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838757" comment="libquadmath-devel-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838758" comment="libstdc++-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838759" comment="libstdc++-devel-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838760" comment="libstdc++-docs-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838761" comment="libstdc++-static-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838762" comment="libtsan-8.5.0-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838763" comment="libubsan-8.5.0-4.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2242" version="1" class="patch">
	<metadata>
		<title>security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4590.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4590.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838764" comment="cargo-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838765" comment="cargo-doc-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838766" comment="clippy-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838767" comment="rls-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838768" comment="rust-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838769" comment="rust-analysis-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838770" comment="rust-debugger-common-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838771" comment="rust-doc-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838772" comment="rust-gdb-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838773" comment="rust-lldb-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838774" comment="rust-src-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838775" comment="rust-std-static-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838776" comment="rust-std-static-wasm32-unknown-unknown-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838197" comment="rust-toolset-1.54.0-1.module+el8.5.0+12195+effd8a03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838777" comment="rustfmt-1.54.0-3.module+el8.5.0+13074+d655d86c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2243" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-11-annobin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838778" comment="gcc-toolset-11-annobin-annocheck-9.85-1.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838779" comment="gcc-toolset-11-annobin-docs-9.85-1.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838780" comment="gcc-toolset-11-annobin-plugin-gcc-9.85-1.el8_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2244" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-10-annobin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838781" comment="gcc-toolset-10-annobin-9.29-1.el8_5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2245" version="1" class="patch">
	<metadata>
		<title>security update for annobin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4593.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4593.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838782" comment="annobin-9.72-1.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838783" comment="annobin-annocheck-9.72-1.el8_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2246" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-11-binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4594.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4594.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838784" comment="gcc-toolset-11-binutils-2.36.1-1.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838785" comment="gcc-toolset-11-binutils-devel-2.36.1-1.el8_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2247" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838786" comment="binutils-2.30-108.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838787" comment="binutils-devel-2.30-108.el8_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2248" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41159" ref_url="https://www.suse.com/security/cve/CVE-2021-41159/" source="CVE"/>
		<reference ref_id="CVE-2021-41160" ref_url="https://www.suse.com/security/cve/CVE-2021-41160/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4622.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4622.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41159/">CVE-2021-41159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41159">CVE-2021-41159 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41160/">CVE-2021-41160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41160">CVE-2021-41160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838788" comment="freerdp-2.2.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838789" comment="freerdp-devel-2.2.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838790" comment="freerdp-libs-2.2.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838791" comment="libwinpr-2.2.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838792" comment="libwinpr-devel-2.2.0-7.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2249" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20317" ref_url="https://www.suse.com/security/cve/CVE-2021-20317/" source="CVE"/>
		<reference ref_id="CVE-2021-43267" ref_url="https://www.suse.com/security/cve/CVE-2021-43267/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4647.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4647.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20317/">CVE-2021-20317 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20317">CVE-2021-20317 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43267/">CVE-2021-43267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838793" comment="bpftool-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838794" comment="kernel-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838795" comment="kernel-abi-stablelists-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838796" comment="kernel-core-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838797" comment="kernel-cross-headers-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838798" comment="kernel-debug-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838799" comment="kernel-debug-core-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838801" comment="kernel-debug-modules-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838802" comment="kernel-debug-modules-extra-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838804" comment="kernel-doc-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838805" comment="kernel-headers-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838806" comment="kernel-modules-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838807" comment="kernel-modules-extra-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838808" comment="kernel-tools-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838809" comment="kernel-tools-libs-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838811" comment="perf-4.18.0-348.2.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838812" comment="python3-perf-4.18.0-348.2.1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2250" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-10-binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4649.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4649.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838813" comment="gcc-toolset-10-binutils-2.35-8.el8_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838814" comment="gcc-toolset-10-binutils-devel-2.35-8.el8_5.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2251" version="1" class="patch">
	<metadata>
		<title>security update for clang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4743.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4743.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838815" comment="clang-12.0.1-4.module+el8.5.0+13246+cefb5d4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838816" comment="clang-analyzer-12.0.1-4.module+el8.5.0+13246+cefb5d4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838817" comment="clang-devel-12.0.1-4.module+el8.5.0+13246+cefb5d4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838818" comment="clang-libs-12.0.1-4.module+el8.5.0+13246+cefb5d4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838819" comment="clang-resource-filesystem-12.0.1-4.module+el8.5.0+13246+cefb5d4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838820" comment="clang-tools-extra-12.0.1-4.module+el8.5.0+13246+cefb5d4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838821" comment="compiler-rt-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838822" comment="git-clang-format-12.0.1-4.module+el8.5.0+13246+cefb5d4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838823" comment="libomp-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838824" comment="libomp-devel-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838825" comment="lld-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838826" comment="lld-devel-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838827" comment="lld-libs-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838828" comment="lldb-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838829" comment="lldb-devel-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838830" comment="llvm-12.0.1-2.module+el8.5.0+12488+254d2a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838831" comment="llvm-devel-12.0.1-2.module+el8.5.0+12488+254d2a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838832" comment="llvm-doc-12.0.1-2.module+el8.5.0+12488+254d2a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838833" comment="llvm-googletest-12.0.1-2.module+el8.5.0+12488+254d2a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838834" comment="llvm-libs-12.0.1-2.module+el8.5.0+12488+254d2a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838835" comment="llvm-static-12.0.1-2.module+el8.5.0+12488+254d2a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838836" comment="llvm-test-12.0.1-2.module+el8.5.0+12488+254d2a07 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838837" comment="llvm-toolset-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838838" comment="python3-clang-12.0.1-4.module+el8.5.0+13246+cefb5d4c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838839" comment="python3-lit-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838840" comment="python3-lldb-12.0.1-1.module+el8.5.0+11871+08d0eab5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2252" version="1" class="patch">
	<metadata>
		<title>security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-42096" ref_url="https://www.suse.com/security/cve/CVE-2021-42096/" source="CVE"/>
		<reference ref_id="CVE-2021-42097" ref_url="https://www.suse.com/security/cve/CVE-2021-42097/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4826.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4826.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42096/">CVE-2021-42096 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42096">CVE-2021-42096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42097/">CVE-2021-42097 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42097">CVE-2021-42097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838841" comment="mailman-2.1.29-12.module+el8.5.0+13211+e8845b76.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2253" version="1" class="patch">
	<metadata>
		<title>security update for nss (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4903.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4903.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838842" comment="nss-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838843" comment="nss-devel-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838844" comment="nss-softokn-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838845" comment="nss-softokn-devel-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838846" comment="nss-softokn-freebl-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838847" comment="nss-softokn-freebl-devel-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838848" comment="nss-sysinit-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838849" comment="nss-tools-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838850" comment="nss-util-3.67.0-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838851" comment="nss-util-devel-3.67.0-7.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2254" version="1" class="patch">
	<metadata>
		<title>security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4916.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4916.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838852" comment="mailman-2.1.29-12.module+el8.5.0+13466+327eb9f3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2255" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4129" ref_url="https://www.suse.com/security/cve/CVE-2021-4129/" source="CVE"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5013.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5013.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4129/">CVE-2021-4129 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4129">CVE-2021-4129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838853" comment="firefox-91.4.0-1.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2256" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4129" ref_url="https://www.suse.com/security/cve/CVE-2021-4129/" source="CVE"/>
		<reference ref_id="CVE-2021-43528" ref_url="https://www.suse.com/security/cve/CVE-2021-43528/" source="CVE"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5045.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5045.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4129/">CVE-2021-4129 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4129">CVE-2021-4129 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43528/">CVE-2021-43528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43528">CVE-2021-43528 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838854" comment="thunderbird-91.4.0-2.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2257" version="1" class="patch">
	<metadata>
		<title>security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5082.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5082.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23192">CVE-2021-23192 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838855" comment="ctdb-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838856" comment="libsmbclient-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838857" comment="libsmbclient-devel-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838858" comment="libwbclient-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838859" comment="libwbclient-devel-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838860" comment="python3-samba-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838861" comment="python3-samba-test-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838862" comment="samba-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838863" comment="samba-client-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838864" comment="samba-client-libs-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838865" comment="samba-common-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838866" comment="samba-common-libs-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838867" comment="samba-common-tools-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838868" comment="samba-devel-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838869" comment="samba-krb5-printing-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838870" comment="samba-libs-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838871" comment="samba-pidl-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838872" comment="samba-test-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838873" comment="samba-test-libs-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838874" comment="samba-vfs-iouring-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838875" comment="samba-winbind-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838876" comment="samba-winbind-clients-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838877" comment="samba-winbind-krb5-locator-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838878" comment="samba-winbind-modules-4.14.5-7.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838879" comment="samba-winexe-4.14.5-7.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2258" version="1" class="patch">
	<metadata>
		<title>security update for bind-dyndb-ldap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-25719" ref_url="https://www.suse.com/security/cve/CVE-2020-25719/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25719/">CVE-2020-25719 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25719">CVE-2020-25719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009836889" comment="bind-dyndb-ldap-11.6-2.module+el8.4.0+9328+4ec4e316 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836890" comment="custodia-0.6.0-3.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838880" comment="ipa-client-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838881" comment="ipa-client-common-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838882" comment="ipa-client-epn-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838883" comment="ipa-client-samba-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838884" comment="ipa-common-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838885" comment="ipa-healthcheck-0.7-6.module+el8.5.0+11410+91a33fe4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838886" comment="ipa-python-compat-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838887" comment="ipa-selinux-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838888" comment="ipa-server-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838889" comment="ipa-server-common-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838890" comment="ipa-server-dns-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838891" comment="ipa-server-trust-ad-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836904" comment="opendnssec-2.1.7-1.module+el8.4.0+9007+5084bdd8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836905" comment="python3-custodia-0.6.0-3.module+el8.1.0+4098+f286395e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838892" comment="python3-ipaclient-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838893" comment="python3-ipalib-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838894" comment="python3-ipaserver-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838895" comment="python3-ipatests-4.9.6-10.module+el8.5.0+13587+92118e57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836911" comment="python3-kdcproxy-0.4-5.module+el8.2.0+4691+a05b2456 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838896" comment="slapi-nis-0.56.6-4.module+el8.5.0+12583+bf7ffcf6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836917" comment="softhsm-2.6.0-5.module+el8.4.0+10227+076cd560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836918" comment="softhsm-devel-2.6.0-5.module+el8.4.0+10227+076cd560 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2259" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5160.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5160.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837958" comment="delve-1.6.0-1.module+el8.5.0+10379+d6b83bd0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838897" comment="go-toolset-1.16.12-1.module+el8.5.0+13637+960c7771 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838898" comment="golang-1.16.12-1.module+el8.5.0+13637+960c7771 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838899" comment="golang-bin-1.16.12-1.module+el8.5.0+13637+960c7771 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838900" comment="golang-docs-1.16.12-1.module+el8.5.0+13637+960c7771 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838901" comment="golang-misc-1.16.12-1.module+el8.5.0+13637+960c7771 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838902" comment="golang-race-1.16.12-1.module+el8.5.0+13637+960c7771 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838903" comment="golang-src-1.16.12-1.module+el8.5.0+13637+960c7771 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838904" comment="golang-tests-1.16.12-1.module+el8.5.0+13637+960c7771 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2260" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28469" ref_url="https://www.suse.com/security/cve/CVE-2020-28469/" source="CVE"/>
		<reference ref_id="CVE-2020-7788" ref_url="https://www.suse.com/security/cve/CVE-2020-7788/" source="CVE"/>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2021-33502" ref_url="https://www.suse.com/security/cve/CVE-2021-33502/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5171.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5171.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28469/">CVE-2020-28469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28469">CVE-2020-28469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7788/">CVE-2020-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7788">CVE-2020-7788 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22959">CVE-2021-22959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22960">CVE-2021-22960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33502/">CVE-2021-33502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33502">CVE-2021-33502 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">CVE-2021-3918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838905" comment="nodejs-16.13.1-3.module+el8.5.0+13548+45d748af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838906" comment="nodejs-devel-16.13.1-3.module+el8.5.0+13548+45d748af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838907" comment="nodejs-docs-16.13.1-3.module+el8.5.0+13548+45d748af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838908" comment="nodejs-full-i18n-16.13.1-3.module+el8.5.0+13548+45d748af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838909" comment="nodejs-nodemon-2.0.15-1.module+el8.5.0+13548+45d748af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838910" comment="nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838911" comment="npm-8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2261" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5226.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5226.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838912" comment="openssl-1.1.1k-5.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838913" comment="openssl-devel-1.1.1k-5.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838914" comment="openssl-libs-1.1.1k-5.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838915" comment="openssl-perl-1.1.1k-5.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2262" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20321" ref_url="https://www.suse.com/security/cve/CVE-2021-20321/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5227.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5227.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20321/">CVE-2021-20321 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20321">CVE-2021-20321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838916" comment="bpftool-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838917" comment="kernel-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838918" comment="kernel-abi-stablelists-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838919" comment="kernel-core-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838920" comment="kernel-cross-headers-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838921" comment="kernel-debug-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838922" comment="kernel-debug-core-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838924" comment="kernel-debug-modules-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838925" comment="kernel-debug-modules-extra-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838927" comment="kernel-doc-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838928" comment="kernel-headers-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838929" comment="kernel-modules-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838930" comment="kernel-modules-extra-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838931" comment="kernel-tools-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838932" comment="kernel-tools-libs-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838934" comment="perf-4.18.0-348.7.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838935" comment="python3-perf-4.18.0-348.7.1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2263" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5235.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5235.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3677">CVE-2021-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838936" comment="pg_repack-1.4.6-3.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838937" comment="pgaudit-1.4.0-5.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838938" comment="postgres-decoderbufs-0.10.0-2.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838939" comment="postgresql-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838940" comment="postgresql-contrib-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838941" comment="postgresql-docs-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838942" comment="postgresql-plperl-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838943" comment="postgresql-plpython3-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838944" comment="postgresql-pltcl-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838945" comment="postgresql-server-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838946" comment="postgresql-server-devel-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838947" comment="postgresql-static-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838948" comment="postgresql-test-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838949" comment="postgresql-test-rpm-macros-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838950" comment="postgresql-upgrade-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838951" comment="postgresql-upgrade-devel-12.9-1.module+el8.5.0+13373+4554acc4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2264" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5236.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5236.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3677">CVE-2021-3677 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838952" comment="pg_repack-1.4.6-3.module+el8.5.0+11357+bcc62552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837247" comment="pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837248" comment="postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838953" comment="postgresql-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838954" comment="postgresql-contrib-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838955" comment="postgresql-docs-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838956" comment="postgresql-plperl-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838957" comment="postgresql-plpython3-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838958" comment="postgresql-pltcl-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838959" comment="postgresql-server-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838960" comment="postgresql-server-devel-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838961" comment="postgresql-static-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838962" comment="postgresql-test-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838963" comment="postgresql-test-rpm-macros-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838964" comment="postgresql-upgrade-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838965" comment="postgresql-upgrade-devel-13.5-1.module+el8.5.0+13344+8c0fd184 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2265" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0001.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0001.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838966" comment="grafana-7.5.9-5.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2266" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0129.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0129.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838967" comment="thunderbird-91.5.0-1.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2267" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0130.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0130.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838968" comment="firefox-91.5.0-1.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2268" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0161.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0161.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838969" comment="java-17-openjdk-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838970" comment="java-17-openjdk-demo-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838971" comment="java-17-openjdk-demo-fastdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838972" comment="java-17-openjdk-demo-slowdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838973" comment="java-17-openjdk-devel-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838974" comment="java-17-openjdk-devel-fastdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838975" comment="java-17-openjdk-devel-slowdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838976" comment="java-17-openjdk-fastdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838977" comment="java-17-openjdk-headless-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838978" comment="java-17-openjdk-headless-fastdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838979" comment="java-17-openjdk-headless-slowdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838980" comment="java-17-openjdk-javadoc-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838981" comment="java-17-openjdk-javadoc-zip-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838982" comment="java-17-openjdk-jmods-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838983" comment="java-17-openjdk-jmods-fastdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838984" comment="java-17-openjdk-jmods-slowdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838985" comment="java-17-openjdk-slowdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838986" comment="java-17-openjdk-src-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838987" comment="java-17-openjdk-src-fastdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838988" comment="java-17-openjdk-src-slowdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838989" comment="java-17-openjdk-static-libs-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838990" comment="java-17-openjdk-static-libs-fastdebug-17.0.2.0.8-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838991" comment="java-17-openjdk-static-libs-slowdebug-17.0.2.0.8-4.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2269" version="1" class="patch">
	<metadata>
		<title>security update for gegl04 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-45463" ref_url="https://www.suse.com/security/cve/CVE-2021-45463/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0177.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0177.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45463/">CVE-2021-45463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45463">CVE-2021-45463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838992" comment="gegl04-0.4.4-6.el8_5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2270" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0185.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0185.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838993" comment="java-11-openjdk-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838994" comment="java-11-openjdk-demo-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838995" comment="java-11-openjdk-demo-fastdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838996" comment="java-11-openjdk-demo-slowdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838997" comment="java-11-openjdk-devel-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838998" comment="java-11-openjdk-devel-fastdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838999" comment="java-11-openjdk-devel-slowdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839000" comment="java-11-openjdk-fastdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839001" comment="java-11-openjdk-headless-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839002" comment="java-11-openjdk-headless-fastdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839003" comment="java-11-openjdk-headless-slowdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839004" comment="java-11-openjdk-javadoc-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839005" comment="java-11-openjdk-javadoc-zip-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839006" comment="java-11-openjdk-jmods-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839007" comment="java-11-openjdk-jmods-fastdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839008" comment="java-11-openjdk-jmods-slowdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839009" comment="java-11-openjdk-slowdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839010" comment="java-11-openjdk-src-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839011" comment="java-11-openjdk-src-fastdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839012" comment="java-11-openjdk-src-slowdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839013" comment="java-11-openjdk-static-libs-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839014" comment="java-11-openjdk-static-libs-fastdebug-11.0.14.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839015" comment="java-11-openjdk-static-libs-slowdebug-11.0.14.0.9-2.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2271" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0188.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0188.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839016" comment="bpftool-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839017" comment="kernel-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839018" comment="kernel-abi-stablelists-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839019" comment="kernel-core-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839020" comment="kernel-cross-headers-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839021" comment="kernel-debug-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839022" comment="kernel-debug-core-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839024" comment="kernel-debug-modules-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839025" comment="kernel-debug-modules-extra-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839027" comment="kernel-doc-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839028" comment="kernel-headers-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839029" comment="kernel-modules-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839030" comment="kernel-modules-extra-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839031" comment="kernel-tools-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839032" comment="kernel-tools-libs-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839034" comment="perf-4.18.0-348.12.2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839035" comment="python3-perf-4.18.0-348.12.2.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2272" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23094" ref_url="https://www.suse.com/security/cve/CVE-2022-23094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0199.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0199.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23094/">CVE-2022-23094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23094">CVE-2022-23094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839036" comment="libreswan-4.4-4.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2273" version="1" class="patch">
	<metadata>
		<title>security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0267.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0267.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839037" comment="polkit-0.115-13.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839038" comment="polkit-devel-0.115-13.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839039" comment="polkit-docs-0.115-13.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839040" comment="polkit-libs-0.115-13.el8_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2274" version="1" class="patch">
	<metadata>
		<title>security update for parfait (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0290.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0290.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104">CVE-2021-4104 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23302">CVE-2022-23302 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23305">CVE-2022-23305 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23307">CVE-2022-23307 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839041" comment="parfait-0.5.4-4.module+el8.5.0+13988+de2b8c0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839042" comment="parfait-examples-0.5.4-4.module+el8.5.0+13988+de2b8c0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839043" comment="parfait-javadoc-0.5.4-4.module+el8.5.0+13988+de2b8c0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839044" comment="pcp-parfait-agent-0.5.4-4.module+el8.5.0+13988+de2b8c0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839045" comment="si-units-0.6.5-2.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839046" comment="si-units-javadoc-0.6.5-2.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839047" comment="unit-api-1.0-5.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839048" comment="unit-api-javadoc-1.0-5.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839049" comment="uom-lib-1.0.1-6.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839050" comment="uom-lib-javadoc-1.0.1-6.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839051" comment="uom-parent-1.0.3-3.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839052" comment="uom-se-1.0.4-3.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839053" comment="uom-se-javadoc-1.0.4-3.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839054" comment="uom-systems-0.7-1.module+el8+2463+615f6896 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839055" comment="uom-systems-javadoc-0.7-1.module+el8+2463+615f6896 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2275" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0307.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0307.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839056" comment="java-1.8.0-openjdk-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839057" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839058" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839059" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839060" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839061" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839062" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839063" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839064" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839065" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839066" comment="java-1.8.0-openjdk-fastdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839067" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839068" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839069" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839070" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839072" comment="java-1.8.0-openjdk-slowdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839073" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839074" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.322.b06-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839075" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.322.b06-2.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2276" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23017" ref_url="https://www.suse.com/security/cve/CVE-2021-23017/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0323.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0323.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23017/">CVE-2021-23017 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23017">CVE-2021-23017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839076" comment="nginx-1.20.1-1.module+el8.5.0+13723+ab304644 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839077" comment="nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839078" comment="nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839079" comment="nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839080" comment="nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839081" comment="nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839082" comment="nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839083" comment="nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2277" version="1" class="patch">
	<metadata>
		<title>security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0332.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0332.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839084" comment="ctdb-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839085" comment="libsmbclient-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839086" comment="libsmbclient-devel-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839087" comment="libwbclient-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839088" comment="libwbclient-devel-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839089" comment="python3-samba-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839090" comment="python3-samba-test-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839091" comment="samba-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839092" comment="samba-client-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839093" comment="samba-client-libs-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839094" comment="samba-common-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839095" comment="samba-common-libs-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839096" comment="samba-common-tools-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839097" comment="samba-devel-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839098" comment="samba-krb5-printing-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839099" comment="samba-libs-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839100" comment="samba-pidl-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839101" comment="samba-test-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839102" comment="samba-test-libs-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839103" comment="samba-vfs-iouring-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839104" comment="samba-winbind-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839105" comment="samba-winbind-clients-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839106" comment="samba-winbind-krb5-locator-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839107" comment="samba-winbind-modules-4.14.5-9.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839108" comment="samba-winexe-4.14.5-9.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2278" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28469" ref_url="https://www.suse.com/security/cve/CVE-2020-28469/" source="CVE"/>
		<reference ref_id="CVE-2020-7788" ref_url="https://www.suse.com/security/cve/CVE-2020-7788/" source="CVE"/>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2021-33502" ref_url="https://www.suse.com/security/cve/CVE-2021-33502/" source="CVE"/>
		<reference ref_id="CVE-2021-37701" ref_url="https://www.suse.com/security/cve/CVE-2021-37701/" source="CVE"/>
		<reference ref_id="CVE-2021-37712" ref_url="https://www.suse.com/security/cve/CVE-2021-37712/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28469/">CVE-2020-28469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28469">CVE-2020-28469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7788/">CVE-2020-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7788">CVE-2020-7788 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22959">CVE-2021-22959 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22960">CVE-2021-22960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33502/">CVE-2021-33502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33502">CVE-2021-33502 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37701/">CVE-2021-37701 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37701">CVE-2021-37701 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37712/">CVE-2021-37712 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37712">CVE-2021-37712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">CVE-2021-3918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839109" comment="nodejs-14.18.2-2.module+el8.5.0+13644+8d46dafd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839110" comment="nodejs-devel-14.18.2-2.module+el8.5.0+13644+8d46dafd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839111" comment="nodejs-docs-14.18.2-2.module+el8.5.0+13644+8d46dafd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839112" comment="nodejs-full-i18n-14.18.2-2.module+el8.5.0+13644+8d46dafd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839113" comment="nodejs-nodemon-2.0.15-1.module+el8.5.0+13504+a2e74d91 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839114" comment="npm-6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2279" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4192" ref_url="https://www.suse.com/security/cve/CVE-2021-4192/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0366.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0366.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872">CVE-2021-3872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3984">CVE-2021-3984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4019">CVE-2021-4019 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4192/">CVE-2021-4192 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4192">CVE-2021-4192 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">CVE-2021-4193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839115" comment="vim-X11-8.0.1763-16.el8_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839116" comment="vim-common-8.0.1763-16.el8_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839117" comment="vim-enhanced-8.0.1763-16.el8_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839118" comment="vim-filesystem-8.0.1763-16.el8_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839119" comment="vim-minimal-8.0.1763-16.el8_5.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2280" version="1" class="patch">
	<metadata>
		<title>security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3521" ref_url="https://www.suse.com/security/cve/CVE-2021-3521/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0368.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0368.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3521/">CVE-2021-3521 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3521">CVE-2021-3521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839120" comment="python3-rpm-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839121" comment="rpm-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839122" comment="rpm-apidocs-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839123" comment="rpm-build-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839124" comment="rpm-build-libs-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839125" comment="rpm-cron-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839126" comment="rpm-devel-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839127" comment="rpm-libs-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839128" comment="rpm-plugin-fapolicyd-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839129" comment="rpm-plugin-ima-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839130" comment="rpm-plugin-prioreset-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839131" comment="rpm-plugin-selinux-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839132" comment="rpm-plugin-syslog-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839133" comment="rpm-plugin-systemd-inhibit-4.14.3-19.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839134" comment="rpm-sign-4.14.3-19.el8_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2281" version="1" class="patch">
	<metadata>
		<title>security update for cryptsetup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4122" ref_url="https://www.suse.com/security/cve/CVE-2021-4122/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0370.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0370.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4122/">CVE-2021-4122 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839135" comment="cryptsetup-2.3.3-4.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839136" comment="cryptsetup-devel-2.3.3-4.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839137" comment="cryptsetup-libs-2.3.3-4.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839138" comment="cryptsetup-reencrypt-2.3.3-4.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839139" comment="integritysetup-2.3.3-4.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839140" comment="veritysetup-2.3.3-4.el8_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2282" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23959" ref_url="https://www.suse.com/security/cve/CVE-2022-23959/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0418.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0418.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23959/">CVE-2022-23959 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23959">CVE-2022-23959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839141" comment="varnish-6.0.8-1.module+el8.5.0+14089+03a0c2cc.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839142" comment="varnish-devel-6.0.8-1.module+el8.5.0+14089+03a0c2cc.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839143" comment="varnish-docs-6.0.8-1.module+el8.5.0+14089+03a0c2cc.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839144" comment="varnish-modules-0.15.0-6.module+el8.5.0+11976+0b4af72d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2283" version="1" class="patch">
	<metadata>
		<title>security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0441.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0441.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839145" comment="aide-0.16-14.el8_5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2284" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21986" ref_url="https://www.suse.com/security/cve/CVE-2022-21986/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0495.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0495.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21986/">CVE-2022-21986 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21986">CVE-2022-21986 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839146" comment="aspnetcore-runtime-5.0-5.0.14-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839147" comment="aspnetcore-targeting-pack-5.0-5.0.14-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839148" comment="dotnet-apphost-pack-5.0-5.0.14-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839149" comment="dotnet-hostfxr-5.0-5.0.14-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839150" comment="dotnet-runtime-5.0-5.0.14-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839151" comment="dotnet-sdk-5.0-5.0.211-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839152" comment="dotnet-sdk-5.0-source-built-artifacts-5.0.211-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839153" comment="dotnet-targeting-pack-5.0-5.0.14-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839154" comment="dotnet-templates-5.0-5.0.211-1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2285" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21986" ref_url="https://www.suse.com/security/cve/CVE-2022-21986/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0496.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0496.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21986/">CVE-2022-21986 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21986">CVE-2022-21986 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839155" comment="aspnetcore-runtime-6.0-6.0.2-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839156" comment="aspnetcore-targeting-pack-6.0-6.0.2-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839157" comment="dotnet-6.0.102-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839158" comment="dotnet-apphost-pack-6.0-6.0.2-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839159" comment="dotnet-host-6.0.2-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839160" comment="dotnet-hostfxr-6.0-6.0.2-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839161" comment="dotnet-runtime-6.0-6.0.2-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839162" comment="dotnet-sdk-6.0-6.0.102-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839163" comment="dotnet-targeting-pack-6.0-6.0.2-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839164" comment="dotnet-templates-6.0-6.0.102-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839165" comment="netstandard-targeting-pack-2.1-6.0.102-1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2286" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0510.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0510.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839166" comment="firefox-91.6.0-1.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2287" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0535.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0535.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839167" comment="thunderbird-91.6.0-1.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2288" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36327" ref_url="https://www.suse.com/security/cve/CVE-2020-36327/" source="CVE"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0543.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0543.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36327/">CVE-2020-36327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36327">CVE-2020-36327 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839168" comment="ruby-2.6.9-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839169" comment="ruby-devel-2.6.9-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839170" comment="ruby-doc-2.6.9-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839171" comment="ruby-libs-2.6.9-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837369" comment="rubygem-abrt-0.3.0-4.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837370" comment="rubygem-abrt-doc-0.3.0-4.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839172" comment="rubygem-bigdecimal-1.4.1-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837372" comment="rubygem-bson-4.5.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837373" comment="rubygem-bson-doc-4.5.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839173" comment="rubygem-bundler-1.17.2-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839174" comment="rubygem-did_you_mean-1.3.0-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839175" comment="rubygem-io-console-0.4.7-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839176" comment="rubygem-irb-1.0.0-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839177" comment="rubygem-json-2.1.0-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839178" comment="rubygem-minitest-5.11.3-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837380" comment="rubygem-mongo-2.8.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837381" comment="rubygem-mongo-doc-2.8.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837382" comment="rubygem-mysql2-0.5.2-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837383" comment="rubygem-mysql2-doc-0.5.2-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839179" comment="rubygem-net-telnet-0.2.0-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839180" comment="rubygem-openssl-2.1.2-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837386" comment="rubygem-pg-1.1.4-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837387" comment="rubygem-pg-doc-1.1.4-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839181" comment="rubygem-power_assert-1.1.3-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839182" comment="rubygem-psych-3.1.0-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839183" comment="rubygem-rake-12.3.3-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839184" comment="rubygem-rdoc-6.1.2.1-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839185" comment="rubygem-test-unit-3.2.9-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839186" comment="rubygem-xmlrpc-0.3.0-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839187" comment="rubygems-3.0.3.1-108.module+el8.5.0+13719+08a8ba32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839188" comment="rubygems-devel-3.0.3.1-108.module+el8.5.0+13719+08a8ba32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2289" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36327" ref_url="https://www.suse.com/security/cve/CVE-2020-36327/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0545.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0545.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36327/">CVE-2020-36327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36327">CVE-2020-36327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839189" comment="ruby-2.5.9-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839190" comment="ruby-devel-2.5.9-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839191" comment="ruby-doc-2.5.9-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839192" comment="ruby-irb-2.5.9-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839193" comment="ruby-libs-2.5.9-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837338" comment="rubygem-abrt-0.3.0-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837339" comment="rubygem-abrt-doc-0.3.0-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839194" comment="rubygem-bigdecimal-1.3.4-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837341" comment="rubygem-bson-4.3.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837342" comment="rubygem-bson-doc-4.3.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839195" comment="rubygem-bundler-1.16.1-4.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839196" comment="rubygem-bundler-doc-1.16.1-4.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839197" comment="rubygem-did_you_mean-1.2.0-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839198" comment="rubygem-io-console-0.4.6-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839199" comment="rubygem-json-2.1.0-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839200" comment="rubygem-minitest-5.10.3-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837349" comment="rubygem-mongo-2.5.1-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837350" comment="rubygem-mongo-doc-2.5.1-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837351" comment="rubygem-mysql2-0.4.10-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837352" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839201" comment="rubygem-net-telnet-0.1.1-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839202" comment="rubygem-openssl-2.1.2-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837355" comment="rubygem-pg-1.0.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837356" comment="rubygem-pg-doc-1.0.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839203" comment="rubygem-power_assert-1.1.1-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839204" comment="rubygem-psych-3.0.2-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839205" comment="rubygem-rake-12.3.3-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839206" comment="rubygem-rdoc-6.0.1.1-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839207" comment="rubygem-test-unit-3.2.7-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839208" comment="rubygem-xmlrpc-0.3.0-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839209" comment="rubygems-2.7.6.3-107.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839210" comment="rubygems-devel-2.7.6.3-107.module+el8.5.0+13840+ec418553 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2290" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-22815" ref_url="https://www.suse.com/security/cve/CVE-2022-22815/" source="CVE"/>
		<reference ref_id="CVE-2022-22816" ref_url="https://www.suse.com/security/cve/CVE-2022-22816/" source="CVE"/>
		<reference ref_id="CVE-2022-22817" ref_url="https://www.suse.com/security/cve/CVE-2022-22817/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22815/">CVE-2022-22815 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22815">CVE-2022-22815 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22816/">CVE-2022-22816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22816">CVE-2022-22816 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22817/">CVE-2022-22817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22817">CVE-2022-22817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839211" comment="python3-pillow-5.1.1-18.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839212" comment="python3-pillow-devel-5.1.1-18.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839213" comment="python3-pillow-doc-5.1.1-18.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839214" comment="python3-pillow-tk-5.1.1-18.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2291" version="1" class="patch">
	<metadata>
		<title>security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0658.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0658.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839215" comment="cyrus-sasl-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839216" comment="cyrus-sasl-devel-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839217" comment="cyrus-sasl-gs2-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839218" comment="cyrus-sasl-gssapi-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839219" comment="cyrus-sasl-ldap-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839220" comment="cyrus-sasl-lib-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839221" comment="cyrus-sasl-md5-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839222" comment="cyrus-sasl-ntlm-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839223" comment="cyrus-sasl-plain-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839224" comment="cyrus-sasl-scram-2.1.27-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839225" comment="cyrus-sasl-sql-2.1.27-6.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2292" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0672.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0672.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839226" comment="ruby-2.5.9-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839227" comment="ruby-devel-2.5.9-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839228" comment="ruby-doc-2.5.9-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839229" comment="ruby-irb-2.5.9-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839230" comment="ruby-libs-2.5.9-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837338" comment="rubygem-abrt-0.3.0-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837339" comment="rubygem-abrt-doc-0.3.0-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839231" comment="rubygem-bigdecimal-1.3.4-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837341" comment="rubygem-bson-4.3.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837342" comment="rubygem-bson-doc-4.3.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839195" comment="rubygem-bundler-1.16.1-4.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839196" comment="rubygem-bundler-doc-1.16.1-4.module+el8.5.0+13840+ec418553 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839232" comment="rubygem-did_you_mean-1.2.0-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839233" comment="rubygem-io-console-0.4.6-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839234" comment="rubygem-json-2.1.0-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839235" comment="rubygem-minitest-5.10.3-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837349" comment="rubygem-mongo-2.5.1-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837350" comment="rubygem-mongo-doc-2.5.1-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837351" comment="rubygem-mysql2-0.4.10-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837352" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839236" comment="rubygem-net-telnet-0.1.1-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839237" comment="rubygem-openssl-2.1.2-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837355" comment="rubygem-pg-1.0.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837356" comment="rubygem-pg-doc-1.0.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839238" comment="rubygem-power_assert-1.1.1-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839239" comment="rubygem-psych-3.0.2-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839240" comment="rubygem-rake-12.3.3-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839241" comment="rubygem-rdoc-6.0.1.1-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839242" comment="rubygem-test-unit-3.2.7-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839243" comment="rubygem-xmlrpc-0.3.0-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839244" comment="rubygems-2.7.6.3-109.module+el8.5.0+14275+d9c243ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839245" comment="rubygems-devel-2.7.6.3-109.module+el8.5.0+14275+d9c243ca is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2293" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0818.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0818.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839246" comment="firefox-91.7.0-3.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2294" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0825.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0825.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4154">CVE-2021-4154 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839247" comment="bpftool-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839248" comment="kernel-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839249" comment="kernel-abi-stablelists-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839250" comment="kernel-core-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839251" comment="kernel-cross-headers-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839252" comment="kernel-debug-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839253" comment="kernel-debug-core-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839255" comment="kernel-debug-modules-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839256" comment="kernel-debug-modules-extra-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839258" comment="kernel-doc-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839259" comment="kernel-headers-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839260" comment="kernel-modules-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839261" comment="kernel-modules-extra-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839262" comment="kernel-tools-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839263" comment="kernel-tools-libs-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839265" comment="perf-4.18.0-348.20.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839266" comment="python3-perf-4.18.0-348.20.1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2295" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24464" ref_url="https://www.suse.com/security/cve/CVE-2022-24464/" source="CVE"/>
		<reference ref_id="CVE-2022-24512" ref_url="https://www.suse.com/security/cve/CVE-2022-24512/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0826.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0826.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24464/">CVE-2022-24464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24464">CVE-2022-24464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24512/">CVE-2022-24512 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24512">CVE-2022-24512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839267" comment="aspnetcore-runtime-6.0-6.0.3-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839268" comment="aspnetcore-targeting-pack-6.0-6.0.3-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839269" comment="dotnet-6.0.103-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839270" comment="dotnet-apphost-pack-6.0-6.0.3-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839271" comment="dotnet-host-6.0.3-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839272" comment="dotnet-hostfxr-6.0-6.0.3-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839273" comment="dotnet-runtime-6.0-6.0.3-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839274" comment="dotnet-sdk-6.0-6.0.103-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839275" comment="dotnet-targeting-pack-6.0-6.0.3-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839276" comment="dotnet-templates-6.0-6.0.103-4.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839277" comment="netstandard-targeting-pack-2.1-6.0.103-4.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2296" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<reference ref_id="CVE-2022-24464" ref_url="https://www.suse.com/security/cve/CVE-2022-24464/" source="CVE"/>
		<reference ref_id="CVE-2022-24512" ref_url="https://www.suse.com/security/cve/CVE-2022-24512/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24464/">CVE-2022-24464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24464">CVE-2022-24464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24512/">CVE-2022-24512 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24512">CVE-2022-24512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839278" comment="aspnetcore-runtime-3.1-3.1.23-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839279" comment="aspnetcore-targeting-pack-3.1-3.1.23-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839280" comment="dotnet-apphost-pack-3.1-3.1.23-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839281" comment="dotnet-hostfxr-3.1-3.1.23-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839282" comment="dotnet-runtime-3.1-3.1.23-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839283" comment="dotnet-sdk-3.1-3.1.417-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839284" comment="dotnet-sdk-3.1-source-built-artifacts-3.1.417-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839285" comment="dotnet-targeting-pack-3.1-3.1.23-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839286" comment="dotnet-templates-3.1-3.1.417-1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2297" version="1" class="patch">
	<metadata>
		<title>security update for dotnet5.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<reference ref_id="CVE-2022-24464" ref_url="https://www.suse.com/security/cve/CVE-2022-24464/" source="CVE"/>
		<reference ref_id="CVE-2022-24512" ref_url="https://www.suse.com/security/cve/CVE-2022-24512/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0830.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0830.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24464/">CVE-2022-24464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24464">CVE-2022-24464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24512/">CVE-2022-24512 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24512">CVE-2022-24512 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839287" comment="aspnetcore-runtime-5.0-5.0.15-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839288" comment="aspnetcore-targeting-pack-5.0-5.0.15-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839289" comment="dotnet-apphost-pack-5.0-5.0.15-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839290" comment="dotnet-hostfxr-5.0-5.0.15-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839291" comment="dotnet-runtime-5.0-5.0.15-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839292" comment="dotnet-sdk-5.0-5.0.212-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839293" comment="dotnet-sdk-5.0-source-built-artifacts-5.0.212-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839294" comment="dotnet-targeting-pack-5.0-5.0.15-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839295" comment="dotnet-templates-5.0-5.0.212-1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2298" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0566" ref_url="https://www.suse.com/security/cve/CVE-2022-0566/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0845.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0845.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0566/">CVE-2022-0566 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0566">CVE-2022-0566 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839296" comment="thunderbird-91.7.0-2.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2299" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4091" ref_url="https://www.suse.com/security/cve/CVE-2021-4091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0889.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0889.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4091/">CVE-2021-4091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4091">CVE-2021-4091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839297" comment="389-ds-base-1.4.3.23-14.module+el8.5.0+14377+c731dc97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839298" comment="389-ds-base-devel-1.4.3.23-14.module+el8.5.0+14377+c731dc97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839299" comment="389-ds-base-legacy-tools-1.4.3.23-14.module+el8.5.0+14377+c731dc97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839300" comment="389-ds-base-libs-1.4.3.23-14.module+el8.5.0+14377+c731dc97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839301" comment="389-ds-base-snmp-1.4.3.23-14.module+el8.5.0+14377+c731dc97 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839302" comment="python3-lib389-1.4.3.23-14.module+el8.5.0+14377+c731dc97 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2300" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0891.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0891.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839303" comment="httpd-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839304" comment="httpd-devel-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839305" comment="httpd-filesystem-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839306" comment="httpd-manual-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839307" comment="httpd-tools-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831132" comment="mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839308" comment="mod_ldap-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839309" comment="mod_proxy_html-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839310" comment="mod_session-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839311" comment="mod_ssl-2.4.37-43.module+el8.5.0+14370+51c6d843.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2301" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23177" ref_url="https://www.suse.com/security/cve/CVE-2021-23177/" source="CVE"/>
		<reference ref_id="CVE-2021-31566" ref_url="https://www.suse.com/security/cve/CVE-2021-31566/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0892.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0892.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-23177/">CVE-2021-23177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23177">CVE-2021-23177 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-31566/">CVE-2021-31566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31566">CVE-2021-31566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839312" comment="bsdtar-3.3.3-3.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839313" comment="libarchive-3.3.3-3.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839314" comment="libarchive-devel-3.3.3-3.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2302" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0261" ref_url="https://www.suse.com/security/cve/CVE-2022-0261/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0359" ref_url="https://www.suse.com/security/cve/CVE-2022-0359/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0392" ref_url="https://www.suse.com/security/cve/CVE-2022-0392/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0894.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0894.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0261/">CVE-2022-0261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0261">CVE-2022-0261 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0359/">CVE-2022-0359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0359">CVE-2022-0359 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0392/">CVE-2022-0392 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0392">CVE-2022-0392 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839315" comment="vim-X11-8.0.1763-16.el8_5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839316" comment="vim-common-8.0.1763-16.el8_5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839317" comment="vim-enhanced-8.0.1763-16.el8_5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839318" comment="vim-filesystem-8.0.1763-16.el8_5.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839319" comment="vim-minimal-8.0.1763-16.el8_5.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2303" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0896.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0896.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839320" comment="compat-libpthread-nonshared-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839321" comment="glibc-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839322" comment="glibc-all-langpacks-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839323" comment="glibc-benchtests-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839324" comment="glibc-common-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839325" comment="glibc-devel-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839326" comment="glibc-headers-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839327" comment="glibc-langpack-aa-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839328" comment="glibc-langpack-af-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839329" comment="glibc-langpack-agr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839330" comment="glibc-langpack-ak-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839331" comment="glibc-langpack-am-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839332" comment="glibc-langpack-an-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839333" comment="glibc-langpack-anp-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839334" comment="glibc-langpack-ar-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839335" comment="glibc-langpack-as-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839336" comment="glibc-langpack-ast-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839337" comment="glibc-langpack-ayc-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839338" comment="glibc-langpack-az-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839339" comment="glibc-langpack-be-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839340" comment="glibc-langpack-bem-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839341" comment="glibc-langpack-ber-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839342" comment="glibc-langpack-bg-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839343" comment="glibc-langpack-bhb-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839344" comment="glibc-langpack-bho-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839345" comment="glibc-langpack-bi-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839346" comment="glibc-langpack-bn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839347" comment="glibc-langpack-bo-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839348" comment="glibc-langpack-br-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839349" comment="glibc-langpack-brx-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839350" comment="glibc-langpack-bs-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839351" comment="glibc-langpack-byn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839352" comment="glibc-langpack-ca-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839353" comment="glibc-langpack-ce-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839354" comment="glibc-langpack-chr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839355" comment="glibc-langpack-cmn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839356" comment="glibc-langpack-crh-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839357" comment="glibc-langpack-cs-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839358" comment="glibc-langpack-csb-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839359" comment="glibc-langpack-cv-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839360" comment="glibc-langpack-cy-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839361" comment="glibc-langpack-da-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839362" comment="glibc-langpack-de-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839363" comment="glibc-langpack-doi-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839364" comment="glibc-langpack-dsb-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839365" comment="glibc-langpack-dv-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839366" comment="glibc-langpack-dz-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839367" comment="glibc-langpack-el-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839368" comment="glibc-langpack-en-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839369" comment="glibc-langpack-eo-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839370" comment="glibc-langpack-es-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839371" comment="glibc-langpack-et-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839372" comment="glibc-langpack-eu-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839373" comment="glibc-langpack-fa-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839374" comment="glibc-langpack-ff-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839375" comment="glibc-langpack-fi-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839376" comment="glibc-langpack-fil-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839377" comment="glibc-langpack-fo-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839378" comment="glibc-langpack-fr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839379" comment="glibc-langpack-fur-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839380" comment="glibc-langpack-fy-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839381" comment="glibc-langpack-ga-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839382" comment="glibc-langpack-gd-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839383" comment="glibc-langpack-gez-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839384" comment="glibc-langpack-gl-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839385" comment="glibc-langpack-gu-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839386" comment="glibc-langpack-gv-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839387" comment="glibc-langpack-ha-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839388" comment="glibc-langpack-hak-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839389" comment="glibc-langpack-he-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839390" comment="glibc-langpack-hi-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839391" comment="glibc-langpack-hif-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839392" comment="glibc-langpack-hne-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839393" comment="glibc-langpack-hr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839394" comment="glibc-langpack-hsb-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839395" comment="glibc-langpack-ht-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839396" comment="glibc-langpack-hu-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839397" comment="glibc-langpack-hy-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839398" comment="glibc-langpack-ia-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839399" comment="glibc-langpack-id-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839400" comment="glibc-langpack-ig-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839401" comment="glibc-langpack-ik-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839402" comment="glibc-langpack-is-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839403" comment="glibc-langpack-it-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839404" comment="glibc-langpack-iu-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839405" comment="glibc-langpack-ja-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839406" comment="glibc-langpack-ka-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839407" comment="glibc-langpack-kab-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839408" comment="glibc-langpack-kk-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839409" comment="glibc-langpack-kl-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839410" comment="glibc-langpack-km-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839411" comment="glibc-langpack-kn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839412" comment="glibc-langpack-ko-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839413" comment="glibc-langpack-kok-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839414" comment="glibc-langpack-ks-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839415" comment="glibc-langpack-ku-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839416" comment="glibc-langpack-kw-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839417" comment="glibc-langpack-ky-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839418" comment="glibc-langpack-lb-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839419" comment="glibc-langpack-lg-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839420" comment="glibc-langpack-li-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839421" comment="glibc-langpack-lij-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839422" comment="glibc-langpack-ln-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839423" comment="glibc-langpack-lo-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839424" comment="glibc-langpack-lt-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839425" comment="glibc-langpack-lv-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839426" comment="glibc-langpack-lzh-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839427" comment="glibc-langpack-mag-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839428" comment="glibc-langpack-mai-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839429" comment="glibc-langpack-mfe-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839430" comment="glibc-langpack-mg-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839431" comment="glibc-langpack-mhr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839432" comment="glibc-langpack-mi-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839433" comment="glibc-langpack-miq-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839434" comment="glibc-langpack-mjw-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839435" comment="glibc-langpack-mk-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839436" comment="glibc-langpack-ml-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839437" comment="glibc-langpack-mn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839438" comment="glibc-langpack-mni-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839439" comment="glibc-langpack-mr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839440" comment="glibc-langpack-ms-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839441" comment="glibc-langpack-mt-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839442" comment="glibc-langpack-my-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839443" comment="glibc-langpack-nan-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839444" comment="glibc-langpack-nb-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839445" comment="glibc-langpack-nds-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839446" comment="glibc-langpack-ne-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839447" comment="glibc-langpack-nhn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839448" comment="glibc-langpack-niu-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839449" comment="glibc-langpack-nl-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839450" comment="glibc-langpack-nn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839451" comment="glibc-langpack-nr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839452" comment="glibc-langpack-nso-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839453" comment="glibc-langpack-oc-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839454" comment="glibc-langpack-om-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839455" comment="glibc-langpack-or-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839456" comment="glibc-langpack-os-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839457" comment="glibc-langpack-pa-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839458" comment="glibc-langpack-pap-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839459" comment="glibc-langpack-pl-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839460" comment="glibc-langpack-ps-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839461" comment="glibc-langpack-pt-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839462" comment="glibc-langpack-quz-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839463" comment="glibc-langpack-raj-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839464" comment="glibc-langpack-ro-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839465" comment="glibc-langpack-ru-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839466" comment="glibc-langpack-rw-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839467" comment="glibc-langpack-sa-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839468" comment="glibc-langpack-sah-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839469" comment="glibc-langpack-sat-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839470" comment="glibc-langpack-sc-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839471" comment="glibc-langpack-sd-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839472" comment="glibc-langpack-se-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839473" comment="glibc-langpack-sgs-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839474" comment="glibc-langpack-shn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839475" comment="glibc-langpack-shs-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839476" comment="glibc-langpack-si-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839477" comment="glibc-langpack-sid-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839478" comment="glibc-langpack-sk-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839479" comment="glibc-langpack-sl-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839480" comment="glibc-langpack-sm-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839481" comment="glibc-langpack-so-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839482" comment="glibc-langpack-sq-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839483" comment="glibc-langpack-sr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839484" comment="glibc-langpack-ss-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839485" comment="glibc-langpack-st-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839486" comment="glibc-langpack-sv-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839487" comment="glibc-langpack-sw-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839488" comment="glibc-langpack-szl-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839489" comment="glibc-langpack-ta-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839490" comment="glibc-langpack-tcy-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839491" comment="glibc-langpack-te-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839492" comment="glibc-langpack-tg-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839493" comment="glibc-langpack-th-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839494" comment="glibc-langpack-the-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839495" comment="glibc-langpack-ti-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839496" comment="glibc-langpack-tig-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839497" comment="glibc-langpack-tk-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839498" comment="glibc-langpack-tl-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839499" comment="glibc-langpack-tn-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839500" comment="glibc-langpack-to-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839501" comment="glibc-langpack-tpi-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839502" comment="glibc-langpack-tr-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839503" comment="glibc-langpack-ts-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839504" comment="glibc-langpack-tt-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839505" comment="glibc-langpack-ug-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839506" comment="glibc-langpack-uk-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839507" comment="glibc-langpack-unm-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839508" comment="glibc-langpack-ur-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839509" comment="glibc-langpack-uz-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839510" comment="glibc-langpack-ve-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839511" comment="glibc-langpack-vi-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839512" comment="glibc-langpack-wa-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839513" comment="glibc-langpack-wae-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839514" comment="glibc-langpack-wal-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839515" comment="glibc-langpack-wo-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839516" comment="glibc-langpack-xh-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839517" comment="glibc-langpack-yi-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839518" comment="glibc-langpack-yo-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839519" comment="glibc-langpack-yue-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839520" comment="glibc-langpack-yuw-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839521" comment="glibc-langpack-zh-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839522" comment="glibc-langpack-zu-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839523" comment="glibc-locale-source-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839524" comment="glibc-minimal-langpack-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839525" comment="glibc-nss-devel-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839526" comment="glibc-static-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839527" comment="glibc-utils-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839528" comment="libnsl-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839529" comment="nscd-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839530" comment="nss_db-2.28-164.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839531" comment="nss_hesiod-2.28-164.el8_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2304" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0899.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0899.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23308">CVE-2022-23308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839532" comment="libxml2-2.9.7-12.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839533" comment="libxml2-devel-2.9.7-12.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839534" comment="python3-libxml2-2.9.7-12.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2305" version="1" class="patch">
	<metadata>
		<title>security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839535" comment="expat-2.2.5-4.el8_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839536" comment="expat-devel-2.2.5-4.el8_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2306" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839537" comment="httpd-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839538" comment="httpd-devel-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839539" comment="httpd-filesystem-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839540" comment="httpd-manual-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839541" comment="httpd-tools-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831132" comment="mod_http2-1.15.7-3.module+el8.4.0+8625+d397f3da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839542" comment="mod_ldap-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839543" comment="mod_proxy_html-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839544" comment="mod_session-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839545" comment="mod_ssl-2.4.37-43.module+el8.5.0+14530+6f259f31.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2307" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1065.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1065.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839546" comment="openssl-1.1.1k-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839547" comment="openssl-devel-1.1.1k-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839548" comment="openssl-libs-1.1.1k-6.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839549" comment="openssl-perl-1.1.1k-6.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2308" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1287.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1287.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839550" comment="firefox-91.8.0-1.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2309" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-1197" ref_url="https://www.suse.com/security/cve/CVE-2022-1197/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1301.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1301.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1197/">CVE-2022-1197 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1197">CVE-2022-1197 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839551" comment="thunderbird-91.8.0-1.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2310" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1442.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1442.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839552" comment="java-11-openjdk-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839553" comment="java-11-openjdk-demo-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839554" comment="java-11-openjdk-demo-fastdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839555" comment="java-11-openjdk-demo-slowdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839556" comment="java-11-openjdk-devel-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839557" comment="java-11-openjdk-devel-fastdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839558" comment="java-11-openjdk-devel-slowdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839559" comment="java-11-openjdk-fastdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839560" comment="java-11-openjdk-headless-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839561" comment="java-11-openjdk-headless-fastdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839562" comment="java-11-openjdk-headless-slowdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839563" comment="java-11-openjdk-javadoc-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839564" comment="java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839565" comment="java-11-openjdk-jmods-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839566" comment="java-11-openjdk-jmods-fastdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839567" comment="java-11-openjdk-jmods-slowdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839568" comment="java-11-openjdk-slowdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839569" comment="java-11-openjdk-src-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839570" comment="java-11-openjdk-src-fastdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839571" comment="java-11-openjdk-src-slowdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839572" comment="java-11-openjdk-static-libs-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839573" comment="java-11-openjdk-static-libs-fastdebug-11.0.15.0.9-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839574" comment="java-11-openjdk-static-libs-slowdebug-11.0.15.0.9-2.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2311" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1445.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1445.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839575" comment="java-17-openjdk-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839576" comment="java-17-openjdk-demo-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839577" comment="java-17-openjdk-demo-fastdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839578" comment="java-17-openjdk-demo-slowdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839579" comment="java-17-openjdk-devel-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839580" comment="java-17-openjdk-devel-fastdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839581" comment="java-17-openjdk-devel-slowdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839582" comment="java-17-openjdk-fastdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839583" comment="java-17-openjdk-headless-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839584" comment="java-17-openjdk-headless-fastdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839585" comment="java-17-openjdk-headless-slowdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839586" comment="java-17-openjdk-javadoc-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839587" comment="java-17-openjdk-javadoc-zip-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839588" comment="java-17-openjdk-jmods-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839589" comment="java-17-openjdk-jmods-fastdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839590" comment="java-17-openjdk-jmods-slowdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839591" comment="java-17-openjdk-slowdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839592" comment="java-17-openjdk-src-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839593" comment="java-17-openjdk-src-fastdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839594" comment="java-17-openjdk-src-slowdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839595" comment="java-17-openjdk-static-libs-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839596" comment="java-17-openjdk-static-libs-fastdebug-17.0.3.0.6-2.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839597" comment="java-17-openjdk-static-libs-slowdebug-17.0.3.0.6-2.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2312" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1491.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1491.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839598" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839599" comment="java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839600" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839601" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839602" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839603" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839604" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839605" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839606" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839607" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839608" comment="java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839609" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839610" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839611" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839612" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839613" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839614" comment="java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839615" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839616" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839617" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2313" version="1" class="patch">
	<metadata>
		<title>security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1537.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1537.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839618" comment="gzip-1.9-13.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2314" version="1" class="patch">
	<metadata>
		<title>security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4115" ref_url="https://www.suse.com/security/cve/CVE-2021-4115/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1546.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1546.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4115/">CVE-2021-4115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839619" comment="polkit-0.115-13.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839620" comment="polkit-devel-0.115-13.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839621" comment="polkit-docs-0.115-13.el8_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839622" comment="polkit-libs-0.115-13.el8_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2315" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4028" ref_url="https://www.suse.com/security/cve/CVE-2021-4028/" source="CVE"/>
		<reference ref_id="CVE-2022-25636" ref_url="https://www.suse.com/security/cve/CVE-2022-25636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1550.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1550.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4028/">CVE-2021-4028 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4028">CVE-2021-4028 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25636/">CVE-2022-25636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839623" comment="bpftool-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839624" comment="kernel-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839625" comment="kernel-abi-stablelists-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839626" comment="kernel-core-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839627" comment="kernel-cross-headers-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839628" comment="kernel-debug-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839629" comment="kernel-debug-core-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839631" comment="kernel-debug-modules-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839632" comment="kernel-debug-modules-extra-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839634" comment="kernel-doc-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839635" comment="kernel-headers-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839636" comment="kernel-modules-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839637" comment="kernel-modules-extra-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839638" comment="kernel-tools-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839639" comment="kernel-tools-libs-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839641" comment="perf-4.18.0-348.23.1.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839642" comment="python3-perf-4.18.0-348.23.1.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2316" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1154" ref_url="https://www.suse.com/security/cve/CVE-2022-1154/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1552.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1552.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1154/">CVE-2022-1154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839643" comment="vim-X11-8.0.1763-16.el8_5.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839644" comment="vim-common-8.0.1763-16.el8_5.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839645" comment="vim-enhanced-8.0.1763-16.el8_5.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839646" comment="vim-filesystem-8.0.1763-16.el8_5.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839647" comment="vim-minimal-8.0.1763-16.el8_5.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2317" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<reference ref_id="CVE-2021-35604" ref_url="https://www.suse.com/security/cve/CVE-2021-35604/" source="CVE"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46662" ref_url="https://www.suse.com/security/cve/CVE-2021-46662/" source="CVE"/>
		<reference ref_id="CVE-2021-46666" ref_url="https://www.suse.com/security/cve/CVE-2021-46666/" source="CVE"/>
		<reference ref_id="CVE-2021-46667" ref_url="https://www.suse.com/security/cve/CVE-2021-46667/" source="CVE"/>
		<reference ref_id="CVE-2022-21451" ref_url="https://www.suse.com/security/cve/CVE-2022-21451/" source="CVE"/>
		<reference ref_id="CVE-2022-27385" ref_url="https://www.suse.com/security/cve/CVE-2022-27385/" source="CVE"/>
		<reference ref_id="CVE-2022-31621" ref_url="https://www.suse.com/security/cve/CVE-2022-31621/" source="CVE"/>
		<reference ref_id="CVE-2022-31624" ref_url="https://www.suse.com/security/cve/CVE-2022-31624/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1556.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1556.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2154">CVE-2021-2154 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2166">CVE-2021-2166 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2372">CVE-2021-2372 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2389">CVE-2021-2389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-35604/">CVE-2021-35604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35604">CVE-2021-35604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46657">CVE-2021-46657 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46658">CVE-2021-46658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46662/">CVE-2021-46662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">CVE-2021-46662 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46666/">CVE-2021-46666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">CVE-2021-46666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46667/">CVE-2021-46667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">CVE-2021-46667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21451/">CVE-2022-21451 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21451">CVE-2022-21451 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27385/">CVE-2022-27385 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27385">CVE-2022-27385 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31621/">CVE-2022-31621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31621">CVE-2022-31621 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31624/">CVE-2022-31624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31624">CVE-2022-31624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830834" comment="Judy-1.0.5-18.module+el8+2765+cfa4f87b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839648" comment="galera-25.3.34-4.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839649" comment="mariadb-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839650" comment="mariadb-backup-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839651" comment="mariadb-common-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839652" comment="mariadb-devel-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839653" comment="mariadb-embedded-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839654" comment="mariadb-embedded-devel-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839655" comment="mariadb-errmsg-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839656" comment="mariadb-gssapi-server-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839657" comment="mariadb-oqgraph-engine-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839658" comment="mariadb-server-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839659" comment="mariadb-server-galera-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839660" comment="mariadb-server-utils-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839661" comment="mariadb-test-10.3.32-2.module+el8.5.0+14124+14ced695 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2318" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<reference ref_id="CVE-2021-35604" ref_url="https://www.suse.com/security/cve/CVE-2021-35604/" source="CVE"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46662" ref_url="https://www.suse.com/security/cve/CVE-2021-46662/" source="CVE"/>
		<reference ref_id="CVE-2021-46666" ref_url="https://www.suse.com/security/cve/CVE-2021-46666/" source="CVE"/>
		<reference ref_id="CVE-2021-46667" ref_url="https://www.suse.com/security/cve/CVE-2021-46667/" source="CVE"/>
		<reference ref_id="CVE-2022-21451" ref_url="https://www.suse.com/security/cve/CVE-2022-21451/" source="CVE"/>
		<reference ref_id="CVE-2022-27385" ref_url="https://www.suse.com/security/cve/CVE-2022-27385/" source="CVE"/>
		<reference ref_id="CVE-2022-31621" ref_url="https://www.suse.com/security/cve/CVE-2022-31621/" source="CVE"/>
		<reference ref_id="CVE-2022-31624" ref_url="https://www.suse.com/security/cve/CVE-2022-31624/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1557.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1557.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2154">CVE-2021-2154 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2166">CVE-2021-2166 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2372">CVE-2021-2372 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2389">CVE-2021-2389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-35604/">CVE-2021-35604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35604">CVE-2021-35604 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46657">CVE-2021-46657 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46658">CVE-2021-46658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46662/">CVE-2021-46662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46662">CVE-2021-46662 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46666/">CVE-2021-46666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46666">CVE-2021-46666 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46667/">CVE-2021-46667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46667">CVE-2021-46667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21451/">CVE-2022-21451 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21451">CVE-2022-21451 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27385/">CVE-2022-27385 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27385">CVE-2022-27385 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31621/">CVE-2022-31621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31621">CVE-2022-31621 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31624/">CVE-2022-31624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31624">CVE-2022-31624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839662" comment="Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839663" comment="galera-26.4.9-4.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839664" comment="mariadb-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839665" comment="mariadb-backup-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839666" comment="mariadb-common-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839667" comment="mariadb-devel-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839668" comment="mariadb-embedded-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839669" comment="mariadb-embedded-devel-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839670" comment="mariadb-errmsg-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839671" comment="mariadb-gssapi-server-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839672" comment="mariadb-oqgraph-engine-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839673" comment="mariadb-pam-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839674" comment="mariadb-server-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839675" comment="mariadb-server-galera-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839676" comment="mariadb-server-utils-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839677" comment="mariadb-test-10.5.13-1.module+el8.5.0+14125+d11efe18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2319" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27649" ref_url="https://www.suse.com/security/cve/CVE-2022-27649/" source="CVE"/>
		<reference ref_id="CVE-2022-27651" ref_url="https://www.suse.com/security/cve/CVE-2022-27651/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1565.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1565.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27649/">CVE-2022-27649 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27649">CVE-2022-27649 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27651/">CVE-2022-27651 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27651">CVE-2022-27651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839678" comment="buildah-1.19.9-2.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839679" comment="buildah-tests-1.19.9-2.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839680" comment="cockpit-podman-29-2.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839681" comment="conmon-2.0.26-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839682" comment="container-selinux-2.167.0-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839683" comment="containernetworking-plugins-0.9.1-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839684" comment="containers-common-1.2.4-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839685" comment="crit-3.15-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839686" comment="criu-3.15-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839687" comment="crun-0.18-2.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839688" comment="fuse-overlayfs-1.4.0-2.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839689" comment="libslirp-4.3.1-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839690" comment="libslirp-devel-4.3.1-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839691" comment="oci-seccomp-bpf-hook-1.2.0-3.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839692" comment="podman-3.0.1-8.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839693" comment="podman-catatonit-3.0.1-8.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839694" comment="podman-docker-3.0.1-8.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839695" comment="podman-plugins-3.0.1-8.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839696" comment="podman-remote-3.0.1-8.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839697" comment="podman-tests-3.0.1-8.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839698" comment="python3-criu-3.15-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839699" comment="runc-1.0.0-73.rc95.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839700" comment="skopeo-1.2.4-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839701" comment="skopeo-tests-1.2.4-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839702" comment="slirp4netns-1.1.8-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839703" comment="toolbox-0.0.99.3-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839704" comment="toolbox-tests-0.0.99.3-1.module+el8.5.0+14784+8c48f0fc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839705" comment="udica-0.2.4-1.module+el8.5.0+14784+8c48f0fc is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2320" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27649" ref_url="https://www.suse.com/security/cve/CVE-2022-27649/" source="CVE"/>
		<reference ref_id="CVE-2022-27651" ref_url="https://www.suse.com/security/cve/CVE-2022-27651/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1566.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1566.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27649/">CVE-2022-27649 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27649">CVE-2022-27649 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27651/">CVE-2022-27651 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27651">CVE-2022-27651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839706" comment="buildah-1.11.6-10.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839707" comment="buildah-tests-1.11.6-10.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839708" comment="cockpit-podman-11-1.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839709" comment="conmon-2.0.15-1.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839710" comment="container-selinux-2.130.0-1.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839711" comment="containernetworking-plugins-0.8.3-4.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839712" comment="containers-common-0.1.41-4.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839713" comment="crit-3.12-9.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839714" comment="criu-3.12-9.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839715" comment="fuse-overlayfs-0.7.8-1.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839716" comment="podman-1.6.4-28.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839717" comment="podman-docker-1.6.4-28.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839718" comment="podman-remote-1.6.4-28.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839719" comment="podman-tests-1.6.4-28.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839720" comment="python-podman-api-1.2.0-0.2.gitd0a45fe.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839721" comment="python3-criu-3.12-9.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839722" comment="runc-1.0.0-66.rc10.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839723" comment="skopeo-0.1.41-4.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839724" comment="skopeo-tests-0.1.41-4.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839725" comment="slirp4netns-0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839726" comment="toolbox-0.0.7-1.module+el8.5.0+14796+e4386a39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839727" comment="udica-0.2.1-2.module+el8.5.0+14796+e4386a39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2321" version="1" class="patch">
	<metadata>
		<title>security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1642.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1642.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839728" comment="zlib-1.2.11-18.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839729" comment="zlib-devel-1.2.11-18.el8_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839730" comment="zlib-static-1.2.11-18.el8_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2322" version="1" class="patch">
	<metadata>
		<title>security update for xmlrpc-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839731" comment="xmlrpc-c-1.51.0-5.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839732" comment="xmlrpc-c-c++-1.51.0-5.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839733" comment="xmlrpc-c-client-1.51.0-5.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839734" comment="xmlrpc-c-client++-1.51.0-5.el8_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839735" comment="xmlrpc-c-devel-1.51.0-5.el8_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2323" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1705.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1705.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839736" comment="firefox-91.9.0-1.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2324" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1520" ref_url="https://www.suse.com/security/cve/CVE-2022-1520/" source="CVE"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29913" ref_url="https://www.suse.com/security/cve/CVE-2022-29913/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1730.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1730.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1520/">CVE-2022-1520 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1520">CVE-2022-1520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29913/">CVE-2022-29913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29913">CVE-2022-29913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839737" comment="thunderbird-91.9.0-3.el8_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2325" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28851" ref_url="https://www.suse.com/security/cve/CVE-2020-28851/" source="CVE"/>
		<reference ref_id="CVE-2022-1227" ref_url="https://www.suse.com/security/cve/CVE-2022-1227/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-27649" ref_url="https://www.suse.com/security/cve/CVE-2022-27649/" source="CVE"/>
		<reference ref_id="CVE-2022-27650" ref_url="https://www.suse.com/security/cve/CVE-2022-27650/" source="CVE"/>
		<reference ref_id="CVE-2022-27651" ref_url="https://www.suse.com/security/cve/CVE-2022-27651/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1762.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1762.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28851/">CVE-2020-28851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28851">CVE-2020-28851 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1227/">CVE-2022-1227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1227">CVE-2022-1227 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27649/">CVE-2022-27649 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27649">CVE-2022-27649 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27650/">CVE-2022-27650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27650">CVE-2022-27650 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27651/">CVE-2022-27651 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27651">CVE-2022-27651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839738" comment="aardvark-dns-1.0.1-27.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839739" comment="buildah-1.24.2-4.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839740" comment="buildah-tests-1.24.2-4.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839741" comment="cockpit-podman-43-1.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839742" comment="conmon-2.1.0-1.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839743" comment="container-selinux-2.179.1-1.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839744" comment="containernetworking-plugins-1.0.1-2.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839745" comment="containers-common-1-27.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839746" comment="crit-3.15-3.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839747" comment="criu-3.15-3.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839748" comment="criu-devel-3.15-3.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839749" comment="criu-libs-3.15-3.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839750" comment="crun-1.4.4-1.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839751" comment="fuse-overlayfs-1.8.2-1.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839752" comment="libslirp-4.4.0-1.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839753" comment="libslirp-devel-4.4.0-1.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839754" comment="netavark-1.0.1-27.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839755" comment="oci-seccomp-bpf-hook-1.2.3-3.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839756" comment="podman-4.0.2-6.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839757" comment="podman-catatonit-4.0.2-6.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839758" comment="podman-docker-4.0.2-6.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839759" comment="podman-gvproxy-4.0.2-6.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839760" comment="podman-plugins-4.0.2-6.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839761" comment="podman-remote-4.0.2-6.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839762" comment="podman-tests-4.0.2-6.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839763" comment="python3-criu-3.15-3.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839764" comment="python3-podman-4.0.0-1.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839765" comment="runc-1.0.3-2.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839766" comment="skopeo-1.6.1-2.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839767" comment="skopeo-tests-1.6.1-2.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839768" comment="slirp4netns-1.1.8-2.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839769" comment="toolbox-0.0.99.3-0.4.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839770" comment="toolbox-tests-0.0.99.3-0.4.module+el8.6.0+14673+621cb8be is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839771" comment="udica-0.2.6-2.module+el8.6.0+14673+621cb8be is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2326" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1777.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1777.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30809">CVE-2021-30809 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30818">CVE-2021-30818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30823">CVE-2021-30823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30836">CVE-2021-30836 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30846">CVE-2021-30846 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30848">CVE-2021-30848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30849">CVE-2021-30849 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30851">CVE-2021-30851 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30884">CVE-2021-30884 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30887">CVE-2021-30887 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30888">CVE-2021-30888 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30889">CVE-2021-30889 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30890">CVE-2021-30890 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30897">CVE-2021-30897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30934">CVE-2021-30934 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30936">CVE-2021-30936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30951">CVE-2021-30951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30952">CVE-2021-30952 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30953">CVE-2021-30953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30954">CVE-2021-30954 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30984">CVE-2021-30984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45481">CVE-2021-45481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45482">CVE-2021-45482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45483">CVE-2021-45483 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22589">CVE-2022-22589 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22590">CVE-2022-22590 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22592">CVE-2022-22592 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22594">CVE-2022-22594 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22620">CVE-2022-22620 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22637">CVE-2022-22637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839772" comment="webkit2gtk3-2.34.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839773" comment="webkit2gtk3-devel-2.34.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839774" comment="webkit2gtk3-jsc-2.34.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839775" comment="webkit2gtk3-jsc-devel-2.34.6-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2327" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-43813" ref_url="https://www.suse.com/security/cve/CVE-2021-43813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1781.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1781.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43813/">CVE-2021-43813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43813">CVE-2021-43813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839776" comment="grafana-7.5.11-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2328" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1792.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1792.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43860">CVE-2021-43860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839777" comment="flatpak-1.8.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839778" comment="flatpak-devel-1.8.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839779" comment="flatpak-libs-1.8.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839780" comment="flatpak-selinux-1.8.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839781" comment="flatpak-session-helper-1.8.7-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2329" version="1" class="patch">
	<metadata>
		<title>security update for cockpit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27650" ref_url="https://www.suse.com/security/cve/CVE-2022-27650/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1793.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1793.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27650/">CVE-2022-27650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27650">CVE-2022-27650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839782" comment="buildah-1.19.9-3.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839783" comment="buildah-tests-1.19.9-3.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839784" comment="cockpit-podman-29-2.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839785" comment="conmon-2.0.26-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839786" comment="container-selinux-2.178.0-2.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839787" comment="containernetworking-plugins-0.9.1-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839788" comment="containers-common-1.2.4-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839789" comment="crit-3.15-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839790" comment="criu-3.15-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839791" comment="crun-0.18-3.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839792" comment="fuse-overlayfs-1.4.0-2.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839793" comment="libslirp-4.3.1-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839794" comment="libslirp-devel-4.3.1-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839795" comment="oci-seccomp-bpf-hook-1.2.0-3.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839796" comment="podman-3.0.1-8.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839797" comment="podman-catatonit-3.0.1-8.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839798" comment="podman-docker-3.0.1-8.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839799" comment="podman-plugins-3.0.1-8.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839800" comment="podman-remote-3.0.1-8.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839801" comment="podman-tests-3.0.1-8.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839802" comment="python3-criu-3.15-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839803" comment="runc-1.0.0-73.rc95.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839804" comment="skopeo-1.2.4-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839805" comment="skopeo-tests-1.2.4-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839806" comment="slirp4netns-1.1.8-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839807" comment="toolbox-0.0.99.3-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839808" comment="toolbox-tests-0.0.99.3-1.module+el8.6.0+14694+4f5132e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839809" comment="udica-0.2.4-1.module+el8.6.0+14694+4f5132e0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2330" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38593" ref_url="https://www.suse.com/security/cve/CVE-2021-38593/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1796.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1796.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38593/">CVE-2021-38593 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38593">CVE-2021-38593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839810" comment="qt5-qtbase-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839811" comment="qt5-qtbase-common-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839812" comment="qt5-qtbase-devel-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839813" comment="qt5-qtbase-examples-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839814" comment="qt5-qtbase-gui-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839815" comment="qt5-qtbase-mysql-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839816" comment="qt5-qtbase-odbc-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839817" comment="qt5-qtbase-postgresql-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839818" comment="qt5-qtbase-private-devel-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839819" comment="qt5-qtbase-static-5.15.2-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2331" version="1" class="patch">
	<metadata>
		<title>security update for compat-exiv2-026 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-18898" ref_url="https://www.suse.com/security/cve/CVE-2020-18898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1797.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1797.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18898/">CVE-2020-18898 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18898">CVE-2020-18898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839820" comment="compat-exiv2-026-0.26-7.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2332" version="1" class="patch">
	<metadata>
		<title>security update for gfbgraph (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-39358" ref_url="https://www.suse.com/security/cve/CVE-2021-39358/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1801.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1801.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39358/">CVE-2021-39358 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39358">CVE-2021-39358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839821" comment="gfbgraph-0.2.4-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2333" version="1" class="patch">
	<metadata>
		<title>security update for aspell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1808.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1808.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25051">CVE-2019-25051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839822" comment="aspell-0.60.6.1-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839823" comment="aspell-devel-0.60.6.1-22.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2334" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1810.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1810.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19131">CVE-2020-19131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839824" comment="libtiff-4.0.9-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839825" comment="libtiff-devel-4.0.9-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839826" comment="libtiff-tools-4.0.9-21.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2335" version="1" class="patch">
	<metadata>
		<title>security update for gnome-shell (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1814.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1814.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17489">CVE-2020-17489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839827" comment="gnome-shell-3.32.2-44.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2336" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<reference ref_id="CVE-2021-39293" ref_url="https://www.suse.com/security/cve/CVE-2021-39293/" source="CVE"/>
		<reference ref_id="CVE-2021-41771" ref_url="https://www.suse.com/security/cve/CVE-2021-41771/" source="CVE"/>
		<reference ref_id="CVE-2021-41772" ref_url="https://www.suse.com/security/cve/CVE-2021-41772/" source="CVE"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1819.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1819.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39293/">CVE-2021-39293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39293">CVE-2021-39293 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41771/">CVE-2021-41771 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41772/">CVE-2021-41772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839828" comment="delve-1.7.2-1.module+el8.6.0+12972+ebab5911 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839829" comment="go-toolset-1.17.7-1.module+el8.6.0+14297+32a15e19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839830" comment="golang-1.17.7-1.module+el8.6.0+14297+32a15e19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839831" comment="golang-bin-1.17.7-1.module+el8.6.0+14297+32a15e19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839832" comment="golang-docs-1.17.7-1.module+el8.6.0+14297+32a15e19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839833" comment="golang-misc-1.17.7-1.module+el8.6.0+14297+32a15e19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839834" comment="golang-race-1.17.7-1.module+el8.6.0+14297+32a15e19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839835" comment="golang-src-1.17.7-1.module+el8.6.0+14297+32a15e19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839836" comment="golang-tests-1.17.7-1.module+el8.6.0+14297+32a15e19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2337" version="1" class="patch">
	<metadata>
		<title>security update for udisks2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3802" ref_url="https://www.suse.com/security/cve/CVE-2021-3802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1820.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1820.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3802/">CVE-2021-3802 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3802">CVE-2021-3802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839837" comment="libudisks2-2.9.0-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839838" comment="libudisks2-devel-2.9.0-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839839" comment="udisks2-2.9.0-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839840" comment="udisks2-iscsi-2.9.0-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839841" comment="udisks2-lsm-2.9.0-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839842" comment="udisks2-lvm2-2.9.0-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2338" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1821.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1821.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4189">CVE-2021-4189 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837903" comment="babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837904" comment="python-nose-docs-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835513" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839843" comment="python2-2.7.18-10.module+el8.6.0+14191+7fdd52cd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837906" comment="python2-babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836757" comment="python2-backports-1.0-16.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836758" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837907" comment="python2-bson-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839844" comment="python2-debug-2.7.18-10.module+el8.6.0+14191+7fdd52cd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839845" comment="python2-devel-2.7.18-10.module+el8.6.0+14191+7fdd52cd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837910" comment="python2-jinja2-2.10-9.module+el8.5.0+10541+706bb066 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839846" comment="python2-libs-2.7.18-10.module+el8.6.0+14191+7fdd52cd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839847" comment="python2-lxml-4.2.3-6.module+el8.6.0+13959+8e368262 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837913" comment="python2-nose-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836763" comment="python2-numpy-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836764" comment="python2-numpy-doc-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836765" comment="python2-numpy-f2py-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839848" comment="python2-pip-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839849" comment="python2-pip-wheel-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837914" comment="python2-pygments-2.2.0-22.module+el8.5.0+10788+a4cea9e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837915" comment="python2-pymongo-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837916" comment="python2-pymongo-gridfs-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837917" comment="python2-scipy-1.0.0-21.module+el8.5.0+10858+05337455 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836766" comment="python2-setuptools-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836767" comment="python2-setuptools-wheel-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836768" comment="python2-six-1.11.0-6.module+el8.4.0+9287+299307c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835522" comment="python2-sqlalchemy-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839850" comment="python2-test-2.7.18-10.module+el8.6.0+14191+7fdd52cd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839851" comment="python2-tkinter-2.7.18-10.module+el8.6.0+14191+7fdd52cd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839852" comment="python2-tools-2.7.18-10.module+el8.6.0+14191+7fdd52cd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836772" comment="python2-urllib3-1.24.2-3.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837921" comment="python2-virtualenv-15.1.0-21.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837922" comment="python2-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837923" comment="python2-wheel-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2339" version="1" class="patch">
	<metadata>
		<title>security update for cjose (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32786" ref_url="https://www.suse.com/security/cve/CVE-2021-32786/" source="CVE"/>
		<reference ref_id="CVE-2021-32791" ref_url="https://www.suse.com/security/cve/CVE-2021-32791/" source="CVE"/>
		<reference ref_id="CVE-2021-32792" ref_url="https://www.suse.com/security/cve/CVE-2021-32792/" source="CVE"/>
		<reference ref_id="CVE-2021-39191" ref_url="https://www.suse.com/security/cve/CVE-2021-39191/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1823.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1823.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32786/">CVE-2021-32786 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32786">CVE-2021-32786 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32791/">CVE-2021-32791 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32791">CVE-2021-32791 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32792/">CVE-2021-32792 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32792">CVE-2021-32792 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-39191/">CVE-2021-39191 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39191">CVE-2021-39191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839853" comment="cjose-0.6.1-2.module+el8+2454+f890a43a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839854" comment="cjose-devel-0.6.1-2.module+el8+2454+f890a43a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839855" comment="mod_auth_openidc-2.3.7-11.module+el8.6.0+14082+b6f23e95 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2340" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1830.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1830.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23214">CVE-2021-23214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839856" comment="postgresql-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839857" comment="postgresql-contrib-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839858" comment="postgresql-docs-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839859" comment="postgresql-plperl-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839860" comment="postgresql-plpython3-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839861" comment="postgresql-pltcl-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839862" comment="postgresql-server-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839863" comment="postgresql-server-devel-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839864" comment="postgresql-static-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839865" comment="postgresql-test-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839866" comment="postgresql-test-rpm-macros-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839867" comment="postgresql-upgrade-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839868" comment="postgresql-upgrade-devel-10.19-1.module+el8.6.0+13642+78853f5a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2341" version="1" class="patch">
	<metadata>
		<title>security update for exiv2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-18898" ref_url="https://www.suse.com/security/cve/CVE-2020-18898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18898/">CVE-2020-18898 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18898">CVE-2020-18898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839869" comment="exiv2-0.27.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839870" comment="exiv2-devel-0.27.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839871" comment="exiv2-doc-0.27.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839872" comment="exiv2-libs-0.27.5-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2342" version="1" class="patch">
	<metadata>
		<title>security update for jss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4213" ref_url="https://www.suse.com/security/cve/CVE-2021-4213/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1851.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1851.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4213/">CVE-2021-4213 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4213">CVE-2021-4213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839873" comment="jss-4.9.3-1.module+el8.6.0+14244+60d461b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839874" comment="jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839875" comment="ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839876" comment="ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839877" comment="pki-acme-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839878" comment="pki-base-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839879" comment="pki-base-java-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839880" comment="pki-ca-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839881" comment="pki-kra-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839882" comment="pki-server-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839883" comment="pki-symkey-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839884" comment="pki-tools-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839885" comment="python3-pki-10.12.0-2.module+el8.6.0+14115+8b467244 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839886" comment="tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2343" version="1" class="patch">
	<metadata>
		<title>security update for aopalliance (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13956" ref_url="https://www.suse.com/security/cve/CVE-2020-13956/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1860.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1860.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13956/">CVE-2020-13956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13956">CVE-2020-13956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831201" comment="aopalliance-1.0-20.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831202" comment="apache-commons-cli-1.4-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831203" comment="apache-commons-codec-1.13-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831204" comment="apache-commons-io-2.6-6.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831205" comment="apache-commons-lang3-3.9-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831206" comment="atinject-1-31.20100611svn86.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831207" comment="cdi-api-2.0.1-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831208" comment="geronimo-annotation-1.0-26.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831209" comment="google-guice-4.2.2-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831210" comment="guava-28.1-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831211" comment="httpcomponents-client-4.5.10-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831212" comment="httpcomponents-core-4.4.12-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831213" comment="jansi-1.18-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831214" comment="jcl-over-slf4j-1.7.28-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831215" comment="jsoup-1.12.1-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831216" comment="jsr-305-0-0.25.20130910svn.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831217" comment="maven-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831218" comment="maven-lib-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831219" comment="maven-openjdk11-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831220" comment="maven-openjdk17-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831221" comment="maven-openjdk8-3.6.2-7.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831222" comment="maven-resolver-1.4.1-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839887" comment="maven-shared-utils-3.2.1-0.4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831224" comment="maven-wagon-3.3.4-2.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831225" comment="plexus-cipher-1.7-17.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831226" comment="plexus-classworlds-2.6.0-4.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831227" comment="plexus-containers-component-annotations-2.1.0-2.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831228" comment="plexus-interpolation-1.26-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831229" comment="plexus-sec-dispatcher-1.4-29.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831230" comment="plexus-utils-3.3.0-3.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831231" comment="sisu-0.3.4-2.module+el8.6.0+13337+afcb49ec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831232" comment="slf4j-1.7.28-3.module+el8.6.0+13337+afcb49ec is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2344" version="1" class="patch">
	<metadata>
		<title>security update for aopalliance (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13956" ref_url="https://www.suse.com/security/cve/CVE-2020-13956/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1861.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1861.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13956/">CVE-2020-13956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13956">CVE-2020-13956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009831159" comment="aopalliance-1.0-17.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831160" comment="apache-commons-cli-1.4-4.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831161" comment="apache-commons-codec-1.11-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831162" comment="apache-commons-io-2.6-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831163" comment="apache-commons-lang3-3.7-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831164" comment="apache-commons-logging-1.2-13.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831165" comment="atinject-1-28.20100611svn86.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831166" comment="cdi-api-1.2-8.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831167" comment="geronimo-annotation-1.0-23.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831168" comment="glassfish-el-api-3.0.1-0.7.b08.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831169" comment="google-guice-4.1-11.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831170" comment="guava20-20.0-8.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831171" comment="hawtjni-runtime-1.16-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831172" comment="httpcomponents-client-4.5.5-5.module+el8.6.0+13298+7b5243c0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831173" comment="httpcomponents-core-4.4.10-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831174" comment="jansi-1.17.1-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831175" comment="jansi-native-1.7-7.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831176" comment="jboss-interceptors-1.2-api-1.0.0-8.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831177" comment="jcl-over-slf4j-1.7.25-4.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831178" comment="jsoup-1.11.3-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831179" comment="maven-3.5.4-5.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831180" comment="maven-lib-3.5.4-5.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831181" comment="maven-resolver-api-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831182" comment="maven-resolver-connector-basic-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831183" comment="maven-resolver-impl-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831184" comment="maven-resolver-spi-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831185" comment="maven-resolver-transport-wagon-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831186" comment="maven-resolver-util-1.1.1-2.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839888" comment="maven-shared-utils-3.2.1-0.1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831188" comment="maven-wagon-file-3.1.0-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831189" comment="maven-wagon-http-3.1.0-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831190" comment="maven-wagon-http-shared-3.1.0-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831191" comment="maven-wagon-provider-api-3.1.0-1.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831192" comment="plexus-cipher-1.7-14.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831193" comment="plexus-classworlds-2.5.2-9.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831194" comment="plexus-containers-component-annotations-1.7.1-8.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831195" comment="plexus-interpolation-1.22-9.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831196" comment="plexus-sec-dispatcher-1.4-26.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831197" comment="plexus-utils-3.1.0-3.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831198" comment="sisu-inject-0.3.3-6.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831199" comment="sisu-plexus-0.3.3-6.module+el8+2452+b359bfcd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831200" comment="slf4j-1.7.25-4.module+el8+2452+b359bfcd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2345" version="1" class="patch">
	<metadata>
		<title>security update for libpq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1891.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1891.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23222">CVE-2021-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839889" comment="libpq-13.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839890" comment="libpq-devel-13.5-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2346" version="1" class="patch">
	<metadata>
		<title>security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1894.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1894.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21658">CVE-2022-21658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839891" comment="cargo-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839892" comment="cargo-doc-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839893" comment="clippy-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839894" comment="rls-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839895" comment="rust-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839896" comment="rust-analysis-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839897" comment="rust-debugger-common-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839898" comment="rust-doc-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839899" comment="rust-gdb-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839900" comment="rust-lldb-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839901" comment="rust-src-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839902" comment="rust-std-static-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839903" comment="rust-std-static-wasm32-unknown-unknown-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839904" comment="rust-std-static-wasm32-wasi-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839905" comment="rust-toolset-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839906" comment="rustfmt-1.58.1-1.module+el8.6.0+14021+586eff1a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2347" version="1" class="patch">
	<metadata>
		<title>security update for fapolicyd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1117" ref_url="https://www.suse.com/security/cve/CVE-2022-1117/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1898.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1898.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1117/">CVE-2022-1117 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1117">CVE-2022-1117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839907" comment="fapolicyd-1.1-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839908" comment="fapolicyd-selinux-1.1-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2348" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-33193" ref_url="https://www.suse.com/security/cve/CVE-2021-33193/" source="CVE"/>
		<reference ref_id="CVE-2021-36160" ref_url="https://www.suse.com/security/cve/CVE-2021-36160/" source="CVE"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1915.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1915.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33193/">CVE-2021-33193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33193">CVE-2021-33193 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36160/">CVE-2021-36160 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36160">CVE-2021-36160 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44224">CVE-2021-44224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839909" comment="httpd-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839910" comment="httpd-devel-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839911" comment="httpd-filesystem-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839912" comment="httpd-manual-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839913" comment="httpd-tools-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839914" comment="mod_http2-1.15.7-5.module+el8.6.0+13996+01710940 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839915" comment="mod_ldap-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839916" comment="mod_proxy_html-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839917" comment="mod_session-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839918" comment="mod_ssl-2.4.37-47.module+el8.6.0+14529+083145da.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2349" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1917.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1917.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4010">CVE-2021-4010 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839919" comment="xorg-x11-server-Xdmx-1.20.11-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839920" comment="xorg-x11-server-Xephyr-1.20.11-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839921" comment="xorg-x11-server-Xnest-1.20.11-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839922" comment="xorg-x11-server-Xorg-1.20.11-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839923" comment="xorg-x11-server-Xvfb-1.20.11-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839924" comment="xorg-x11-server-Xwayland-21.1.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839925" comment="xorg-x11-server-common-1.20.11-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839926" comment="xorg-x11-server-devel-1.20.11-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839927" comment="xorg-x11-server-source-1.20.11-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2350" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-45930" ref_url="https://www.suse.com/security/cve/CVE-2021-45930/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1920.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1920.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45930/">CVE-2021-45930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45930">CVE-2021-45930 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839928" comment="qt5-qtsvg-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839929" comment="qt5-qtsvg-devel-5.15.2-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839930" comment="qt5-qtsvg-examples-5.15.2-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2351" version="1" class="patch">
	<metadata>
		<title>security update for keepalived (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44225" ref_url="https://www.suse.com/security/cve/CVE-2021-44225/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1930.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1930.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-44225/">CVE-2021-44225 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44225">CVE-2021-44225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839931" comment="keepalived-2.1.5-8.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2352" version="1" class="patch">
	<metadata>
		<title>security update for python-lxml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1932.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1932.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43818">CVE-2021-43818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839932" comment="python3-lxml-4.2.3-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2353" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_mellon (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1934.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1934.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3639">CVE-2021-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839933" comment="mod_auth_mellon-0.14.0-12.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839934" comment="mod_auth_mellon-diagnostics-0.14.0-12.el8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2354" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703/" source="CVE"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1935.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1935.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21703">CVE-2021-21703 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21705">CVE-2021-21705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838070" comment="apcu-panel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838071" comment="libzip-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838072" comment="libzip-devel-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838073" comment="libzip-tools-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839935" comment="php-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839936" comment="php-bcmath-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839937" comment="php-cli-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839938" comment="php-common-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839939" comment="php-dba-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839940" comment="php-dbg-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839941" comment="php-devel-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839942" comment="php-embedded-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839943" comment="php-enchant-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839944" comment="php-ffi-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839945" comment="php-fpm-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839946" comment="php-gd-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839947" comment="php-gmp-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839948" comment="php-intl-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839949" comment="php-json-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839950" comment="php-ldap-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839951" comment="php-mbstring-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839952" comment="php-mysqlnd-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839953" comment="php-odbc-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839954" comment="php-opcache-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839955" comment="php-pdo-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838095" comment="php-pear-1.10.12-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838096" comment="php-pecl-apcu-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838097" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838098" comment="php-pecl-rrd-2.0.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838099" comment="php-pecl-xdebug-2.9.5-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838100" comment="php-pecl-zip-1.18.2-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839956" comment="php-pgsql-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839957" comment="php-process-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839958" comment="php-snmp-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839959" comment="php-soap-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839960" comment="php-xml-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839961" comment="php-xmlrpc-7.4.19-2.module+el8.6.0+13953+0a59ce9f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2355" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-28116" ref_url="https://www.suse.com/security/cve/CVE-2021-28116/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1939.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1939.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28116/">CVE-2021-28116 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28116">CVE-2021-28116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832711" comment="libecap-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832712" comment="libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839962" comment="squid-4.15-3.module+el8.6.0+14176+9782b8ab is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2356" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33515" ref_url="https://www.suse.com/security/cve/CVE-2021-33515/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1950.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1950.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33515/">CVE-2021-33515 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33515">CVE-2021-33515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839963" comment="dovecot-2.3.16-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839964" comment="dovecot-devel-2.3.16-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839965" comment="dovecot-mysql-2.3.16-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839966" comment="dovecot-pgsql-2.3.16-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839967" comment="dovecot-pigeonhole-2.3.16-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2357" version="1" class="patch">
	<metadata>
		<title>security update for cairo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-35492" ref_url="https://www.suse.com/security/cve/CVE-2020-35492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1961.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1961.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35492/">CVE-2020-35492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35492">CVE-2020-35492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839968" comment="cairo-1.15.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839969" comment="cairo-devel-1.15.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839970" comment="cairo-gobject-1.15.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839971" comment="cairo-gobject-devel-1.15.12-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839972" comment="pixman-0.38.4-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839973" comment="pixman-devel-0.38.4-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2358" version="1" class="patch">
	<metadata>
		<title>security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1964.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1964.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39272">CVE-2021-39272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839974" comment="fetchmail-6.4.24-1.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2359" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1968.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1968.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4156">CVE-2021-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839975" comment="libsndfile-1.0.28-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839976" comment="libsndfile-devel-1.0.28-12.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2360" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1986.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1986.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4189">CVE-2021-4189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839977" comment="platform-python-3.6.8-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839978" comment="platform-python-debug-3.6.8-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839979" comment="platform-python-devel-3.6.8-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839980" comment="python3-idle-3.6.8-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839981" comment="python3-libs-3.6.8-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839982" comment="python3-test-3.6.8-45.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839983" comment="python3-tkinter-3.6.8-45.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2361" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3773" ref_url="https://www.suse.com/security/cve/CVE-2021-3773/" source="CVE"/>
		<reference ref_id="CVE-2021-3923" ref_url="https://www.suse.com/security/cve/CVE-2021-3923/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4037" ref_url="https://www.suse.com/security/cve/CVE-2021-4037/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4093" ref_url="https://www.suse.com/security/cve/CVE-2021-4093/" source="CVE"/>
		<reference ref_id="CVE-2021-4157" ref_url="https://www.suse.com/security/cve/CVE-2021-4157/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4203" ref_url="https://www.suse.com/security/cve/CVE-2021-4203/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2021-47076" ref_url="https://www.suse.com/security/cve/CVE-2021-47076/" source="CVE"/>
		<reference ref_id="CVE-2021-47178" ref_url="https://www.suse.com/security/cve/CVE-2021-47178/" source="CVE"/>
		<reference ref_id="CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203/" source="CVE"/>
		<reference ref_id="CVE-2021-47301" ref_url="https://www.suse.com/security/cve/CVE-2021-47301/" source="CVE"/>
		<reference ref_id="CVE-2021-47435" ref_url="https://www.suse.com/security/cve/CVE-2021-47435/" source="CVE"/>
		<reference ref_id="CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498/" source="CVE"/>
		<reference ref_id="CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501/" source="CVE"/>
		<reference ref_id="CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544/" source="CVE"/>
		<reference ref_id="CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556/" source="CVE"/>
		<reference ref_id="CVE-2021-47590" ref_url="https://www.suse.com/security/cve/CVE-2021-47590/" source="CVE"/>
		<reference ref_id="CVE-2021-47614" ref_url="https://www.suse.com/security/cve/CVE-2021-47614/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0286" ref_url="https://www.suse.com/security/cve/CVE-2022-0286/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-3105" ref_url="https://www.suse.com/security/cve/CVE-2022-3105/" source="CVE"/>
		<reference ref_id="CVE-2022-3106" ref_url="https://www.suse.com/security/cve/CVE-2022-3106/" source="CVE"/>
		<reference ref_id="CVE-2022-3108" ref_url="https://www.suse.com/security/cve/CVE-2022-3108/" source="CVE"/>
		<reference ref_id="CVE-2022-48771" ref_url="https://www.suse.com/security/cve/CVE-2022-48771/" source="CVE"/>
		<reference ref_id="CVE-2022-48904" ref_url="https://www.suse.com/security/cve/CVE-2022-48904/" source="CVE"/>
		<reference ref_id="CVE-2022-49227" ref_url="https://www.suse.com/security/cve/CVE-2022-49227/" source="CVE"/>
		<reference ref_id="CVE-2022-50131" ref_url="https://www.suse.com/security/cve/CVE-2022-50131/" source="CVE"/>
		<reference ref_id="CVE-2022-50475" ref_url="https://www.suse.com/security/cve/CVE-2022-50475/" source="CVE"/>
		<reference ref_id="CVE-2022-50510" ref_url="https://www.suse.com/security/cve/CVE-2022-50510/" source="CVE"/>
		<reference ref_id="CVE-2022-50536" ref_url="https://www.suse.com/security/cve/CVE-2022-50536/" source="CVE"/>
		<reference ref_id="CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459/" source="CVE"/>
		<reference ref_id="CVE-2023-53570" ref_url="https://www.suse.com/security/cve/CVE-2023-53570/" source="CVE"/>
		<reference ref_id="CVE-2023-53649" ref_url="https://www.suse.com/security/cve/CVE-2023-53649/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1988.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1988.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0941">CVE-2021-0941 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21781">CVE-2021-21781 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3612">CVE-2021-3612 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3669">CVE-2021-3669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3743">CVE-2021-3743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3759">CVE-2021-3759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3773/">CVE-2021-3773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3773">CVE-2021-3773 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3923/">CVE-2021-3923 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3923">CVE-2021-3923 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4037/">CVE-2021-4037 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4037">CVE-2021-4037 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4093/">CVE-2021-4093 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4093">CVE-2021-4093 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4157/">CVE-2021-4157 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4157">CVE-2021-4157 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4203/">CVE-2021-4203 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4203">CVE-2021-4203 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44733">CVE-2021-44733 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">CVE-2021-45485 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">CVE-2021-45486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47076/">CVE-2021-47076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47076">CVE-2021-47076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47178/">CVE-2021-47178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47178">CVE-2021-47178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47301/">CVE-2021-47301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47301">CVE-2021-47301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47435/">CVE-2021-47435 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47435">CVE-2021-47435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47590/">CVE-2021-47590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47590">CVE-2021-47590 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47614/">CVE-2021-47614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47614">CVE-2021-47614 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0286/">CVE-2022-0286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0286">CVE-2022-0286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0322">CVE-2022-0322 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0850">CVE-2022-0850 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3105/">CVE-2022-3105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3105">CVE-2022-3105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3106/">CVE-2022-3106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3106">CVE-2022-3106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3108/">CVE-2022-3108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3108">CVE-2022-3108 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48771/">CVE-2022-48771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48771">CVE-2022-48771 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48904/">CVE-2022-48904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48904">CVE-2022-48904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49227/">CVE-2022-49227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49227">CVE-2022-49227 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50131/">CVE-2022-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50131">CVE-2022-50131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50475/">CVE-2022-50475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50475">CVE-2022-50475 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50510/">CVE-2022-50510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50510">CVE-2022-50510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50536/">CVE-2022-50536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50536">CVE-2022-50536 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53570/">CVE-2023-53570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53570">CVE-2023-53570 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53649/">CVE-2023-53649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53649">CVE-2023-53649 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839984" comment="bpftool-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839985" comment="kernel-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839986" comment="kernel-abi-stablelists-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839987" comment="kernel-core-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839988" comment="kernel-cross-headers-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839989" comment="kernel-debug-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839990" comment="kernel-debug-core-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839992" comment="kernel-debug-modules-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839993" comment="kernel-debug-modules-extra-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839995" comment="kernel-doc-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839996" comment="kernel-headers-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839997" comment="kernel-modules-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839998" comment="kernel-modules-extra-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839999" comment="kernel-tools-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840000" comment="kernel-tools-libs-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840002" comment="perf-4.18.0-372.9.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840003" comment="python3-perf-4.18.0-372.9.1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2362" version="1" class="patch">
	<metadata>
		<title>security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1991.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1991.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840004" comment="cpio-2.12-11.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2363" version="1" class="patch">
	<metadata>
		<title>security update for cockpit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3660" ref_url="https://www.suse.com/security/cve/CVE-2021-3660/" source="CVE"/>
		<reference ref_id="CVE-2021-3698" ref_url="https://www.suse.com/security/cve/CVE-2021-3698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3660/">CVE-2021-3660 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3660">CVE-2021-3660 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3698/">CVE-2021-3698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3698">CVE-2021-3698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840005" comment="cockpit-264.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840006" comment="cockpit-bridge-264.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840007" comment="cockpit-doc-264.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840008" comment="cockpit-system-264.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840009" comment="cockpit-ws-264.1-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2364" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2013.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2013.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840010" comment="openssh-8.0p1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840011" comment="openssh-askpass-8.0p1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840012" comment="openssh-cavs-8.0p1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840013" comment="openssh-clients-8.0p1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840014" comment="openssh-keycat-8.0p1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840015" comment="openssh-ldap-8.0p1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840016" comment="openssh-server-8.0p1-13.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840017" comment="pam_ssh_agent_auth-0.10.3-7.13.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2365" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3634" ref_url="https://www.suse.com/security/cve/CVE-2021-3634/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2031.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2031.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3634/">CVE-2021-3634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3634">CVE-2021-3634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840018" comment="libssh-0.9.6-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840019" comment="libssh-config-0.9.6-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840020" comment="libssh-devel-0.9.6-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2366" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2043.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2043.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3672">CVE-2021-3672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840021" comment="c-ares-1.13.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840022" comment="c-ares-devel-1.13.0-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2367" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-20316" ref_url="https://www.suse.com/security/cve/CVE-2021-20316/" source="CVE"/>
		<reference ref_id="CVE-2021-44141" ref_url="https://www.suse.com/security/cve/CVE-2021-44141/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2074.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2074.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20316/">CVE-2021-20316 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20316">CVE-2021-20316 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44141/">CVE-2021-44141 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44141">CVE-2021-44141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840023" comment="ctdb-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840024" comment="libsmbclient-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840025" comment="libsmbclient-devel-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840026" comment="libwbclient-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840027" comment="libwbclient-devel-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840028" comment="python3-samba-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840029" comment="python3-samba-test-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840030" comment="samba-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840031" comment="samba-client-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840032" comment="samba-client-libs-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840033" comment="samba-common-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840034" comment="samba-common-libs-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840035" comment="samba-common-tools-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840036" comment="samba-devel-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840037" comment="samba-krb5-printing-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840038" comment="samba-libs-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840039" comment="samba-pidl-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840040" comment="samba-test-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840041" comment="samba-test-libs-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840042" comment="samba-vfs-iouring-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840043" comment="samba-winbind-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840044" comment="samba-winbind-clients-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840045" comment="samba-winbind-krb5-locator-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840046" comment="samba-winbind-modules-4.15.5-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840047" comment="samba-winexe-4.15.5-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2368" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41229" ref_url="https://www.suse.com/security/cve/CVE-2021-41229/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2081.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2081.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41229/">CVE-2021-41229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41229">CVE-2021-41229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840048" comment="bluez-5.56-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840049" comment="bluez-cups-5.56-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840050" comment="bluez-hid2hci-5.56-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840051" comment="bluez-libs-5.56-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840052" comment="bluez-libs-devel-5.56-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840053" comment="bluez-obexd-5.56-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2369" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2092.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2092.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219">CVE-2021-25219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840054" comment="bind-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840055" comment="bind-chroot-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840056" comment="bind-devel-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840057" comment="bind-export-devel-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840058" comment="bind-export-libs-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840059" comment="bind-libs-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840060" comment="bind-libs-lite-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840061" comment="bind-license-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840062" comment="bind-lite-devel-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840063" comment="bind-pkcs11-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840064" comment="bind-pkcs11-devel-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840065" comment="bind-pkcs11-libs-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840066" comment="bind-pkcs11-utils-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840067" comment="bind-sdb-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840068" comment="bind-sdb-chroot-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840069" comment="bind-utils-9.11.36-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840070" comment="python3-bind-9.11.36-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2370" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3981" ref_url="https://www.suse.com/security/cve/CVE-2021-3981/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3981/">CVE-2021-3981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840071" comment="grub2-common-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840072" comment="grub2-efi-ia32-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840073" comment="grub2-efi-ia32-cdboot-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840074" comment="grub2-efi-ia32-modules-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840075" comment="grub2-efi-x64-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840076" comment="grub2-efi-x64-cdboot-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840077" comment="grub2-efi-x64-modules-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840078" comment="grub2-pc-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840079" comment="grub2-pc-modules-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840080" comment="grub2-tools-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840081" comment="grub2-tools-efi-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840082" comment="grub2-tools-extra-2.02-123.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840083" comment="grub2-tools-minimal-2.02-123.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2371" version="1" class="patch">
	<metadata>
		<title>security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2120.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2120.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45444">CVE-2021-45444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840084" comment="zsh-5.5.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840085" comment="zsh-html-5.5.1-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2372" version="1" class="patch">
	<metadata>
		<title>security update for lynx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-38165" ref_url="https://www.suse.com/security/cve/CVE-2021-38165/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2129.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2129.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38165/">CVE-2021-38165 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38165">CVE-2021-38165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840086" comment="lynx-2.8.9-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2373" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1227" ref_url="https://www.suse.com/security/cve/CVE-2022-1227/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1227/">CVE-2022-1227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1227">CVE-2022-1227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840087" comment="buildah-1.19.9-3.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840088" comment="buildah-tests-1.19.9-3.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840089" comment="cockpit-podman-29-2.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840090" comment="conmon-2.0.26-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840091" comment="container-selinux-2.178.0-2.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840092" comment="containernetworking-plugins-0.9.1-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840093" comment="containers-common-1.2.4-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840094" comment="crit-3.15-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840095" comment="criu-3.15-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840096" comment="crun-0.18-3.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840097" comment="fuse-overlayfs-1.4.0-2.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840098" comment="libslirp-4.3.1-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840099" comment="libslirp-devel-4.3.1-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840100" comment="oci-seccomp-bpf-hook-1.2.0-3.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840101" comment="podman-3.0.1-9.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840102" comment="podman-catatonit-3.0.1-9.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840103" comment="podman-docker-3.0.1-9.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840104" comment="podman-plugins-3.0.1-9.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840105" comment="podman-remote-3.0.1-9.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840106" comment="podman-tests-3.0.1-9.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840107" comment="python3-criu-3.15-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840108" comment="runc-1.0.0-73.rc95.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840109" comment="skopeo-1.2.4-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840110" comment="skopeo-tests-1.2.4-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840111" comment="slirp4netns-1.1.8-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840112" comment="toolbox-0.0.99.3-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840113" comment="toolbox-tests-0.0.99.3-1.module+el8.6.0+14874+64436299 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840114" comment="udica-0.2.4-1.module+el8.6.0+14874+64436299 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2374" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23267" ref_url="https://www.suse.com/security/cve/CVE-2022-23267/" source="CVE"/>
		<reference ref_id="CVE-2022-29117" ref_url="https://www.suse.com/security/cve/CVE-2022-29117/" source="CVE"/>
		<reference ref_id="CVE-2022-29145" ref_url="https://www.suse.com/security/cve/CVE-2022-29145/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2199.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2199.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23267/">CVE-2022-23267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23267">CVE-2022-23267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29117/">CVE-2022-29117 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29117">CVE-2022-29117 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29145/">CVE-2022-29145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29145">CVE-2022-29145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840115" comment="aspnetcore-runtime-6.0-6.0.5-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840116" comment="aspnetcore-targeting-pack-6.0-6.0.5-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840117" comment="dotnet-6.0.105-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840118" comment="dotnet-apphost-pack-6.0-6.0.5-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840119" comment="dotnet-host-6.0.5-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840120" comment="dotnet-hostfxr-6.0-6.0.5-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840121" comment="dotnet-runtime-6.0-6.0.5-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840122" comment="dotnet-sdk-6.0-6.0.105-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031212" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840123" comment="dotnet-targeting-pack-6.0-6.0.5-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840124" comment="dotnet-templates-6.0-6.0.105-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840125" comment="netstandard-targeting-pack-2.1-6.0.105-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2375" version="1" class="patch">
	<metadata>
		<title>security update for dotnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23267" ref_url="https://www.suse.com/security/cve/CVE-2022-23267/" source="CVE"/>
		<reference ref_id="CVE-2022-29117" ref_url="https://www.suse.com/security/cve/CVE-2022-29117/" source="CVE"/>
		<reference ref_id="CVE-2022-29145" ref_url="https://www.suse.com/security/cve/CVE-2022-29145/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2200.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2200.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23267/">CVE-2022-23267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23267">CVE-2022-23267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29117/">CVE-2022-29117 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29117">CVE-2022-29117 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29145/">CVE-2022-29145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29145">CVE-2022-29145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840126" comment="aspnetcore-runtime-5.0-5.0.17-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840127" comment="aspnetcore-targeting-pack-5.0-5.0.17-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840128" comment="dotnet-apphost-pack-5.0-5.0.17-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840129" comment="dotnet-hostfxr-5.0-5.0.17-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840130" comment="dotnet-runtime-5.0-5.0.17-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840131" comment="dotnet-sdk-5.0-5.0.214-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037344" comment="dotnet-sdk-5.0-source-built-artifacts-5.0.214-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840132" comment="dotnet-targeting-pack-5.0-5.0.17-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840133" comment="dotnet-templates-5.0-5.0.214-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2376" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840134" comment="rsync-3.1.3-14.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840135" comment="rsync-daemon-3.1.3-14.el8_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2377" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23267" ref_url="https://www.suse.com/security/cve/CVE-2022-23267/" source="CVE"/>
		<reference ref_id="CVE-2022-29117" ref_url="https://www.suse.com/security/cve/CVE-2022-29117/" source="CVE"/>
		<reference ref_id="CVE-2022-29145" ref_url="https://www.suse.com/security/cve/CVE-2022-29145/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2202.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2202.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23267/">CVE-2022-23267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23267">CVE-2022-23267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29117/">CVE-2022-29117 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29117">CVE-2022-29117 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29145/">CVE-2022-29145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29145">CVE-2022-29145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840136" comment="aspnetcore-runtime-3.1-3.1.25-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840137" comment="aspnetcore-targeting-pack-3.1-3.1.25-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840138" comment="dotnet-apphost-pack-3.1-3.1.25-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840139" comment="dotnet-hostfxr-3.1-3.1.25-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840140" comment="dotnet-runtime-3.1-3.1.25-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840141" comment="dotnet-sdk-3.1-3.1.419-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840142" comment="dotnet-sdk-3.1-source-built-artifacts-3.1.419-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840143" comment="dotnet-targeting-pack-3.1-3.1.25-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840144" comment="dotnet-templates-3.1-3.1.419-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2378" version="1" class="patch">
	<metadata>
		<title>security update for libserf (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2234.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2234.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24070">CVE-2022-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009835629" comment="libserf-1.3.9-9.module+el8.3.0+6671+2675c974 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840145" comment="mod_dav_svn-1.10.2-5.module+el8.6.0+15157+188c9801 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840146" comment="subversion-1.10.2-5.module+el8.6.0+15157+188c9801 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840147" comment="subversion-devel-1.10.2-5.module+el8.6.0+15157+188c9801 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840148" comment="subversion-gnome-1.10.2-5.module+el8.6.0+15157+188c9801 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840149" comment="subversion-javahl-1.10.2-5.module+el8.6.0+15157+188c9801 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840150" comment="subversion-libs-1.10.2-5.module+el8.6.0+15157+188c9801 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840151" comment="subversion-perl-1.10.2-5.module+el8.6.0+15157+188c9801 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840152" comment="subversion-tools-1.10.2-5.module+el8.6.0+15157+188c9801 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835638" comment="utf8proc-2.1.1-5.module+el8.3.0+6671+2675c974 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2379" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-29970" ref_url="https://www.suse.com/security/cve/CVE-2022-29970/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4661.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4661.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29970/">CVE-2022-29970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29970">CVE-2022-29970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840153" comment="pcs-0.10.12-6.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840154" comment="pcs-snmp-0.10.12-6.el8_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2380" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4769.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4769.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840155" comment="thunderbird-91.9.1-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2381" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4776.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4776.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840156" comment="firefox-91.9.1-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2382" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-43616" ref_url="https://www.suse.com/security/cve/CVE-2021-43616/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4796.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4796.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43616/">CVE-2021-43616 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43616">CVE-2021-43616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840157" comment="nodejs-16.14.0-4.module+el8.6.0+15294+54b291d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840158" comment="nodejs-devel-16.14.0-4.module+el8.6.0+15294+54b291d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840159" comment="nodejs-docs-16.14.0-4.module+el8.6.0+15294+54b291d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840160" comment="nodejs-full-i18n-16.14.0-4.module+el8.6.0+15294+54b291d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840161" comment="nodejs-nodemon-2.0.15-1.module+el8.6.0+15294+54b291d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838910" comment="nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840162" comment="npm-8.3.1-1.16.14.0.4.module+el8.6.0+15294+54b291d2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2383" version="1" class="patch">
	<metadata>
		<title>security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4799.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4799.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840163" comment="rsyslog-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840164" comment="rsyslog-crypto-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840165" comment="rsyslog-doc-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840166" comment="rsyslog-elasticsearch-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840167" comment="rsyslog-gnutls-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840168" comment="rsyslog-gssapi-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840169" comment="rsyslog-kafka-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840170" comment="rsyslog-mmaudit-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840171" comment="rsyslog-mmfields-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840172" comment="rsyslog-mmjsonparse-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840173" comment="rsyslog-mmkubernetes-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840174" comment="rsyslog-mmnormalize-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840175" comment="rsyslog-mmsnmptrapd-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840176" comment="rsyslog-mysql-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840177" comment="rsyslog-omamqp1-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840178" comment="rsyslog-openssl-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840179" comment="rsyslog-pgsql-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840180" comment="rsyslog-relp-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840181" comment="rsyslog-snmp-8.2102.0-7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840182" comment="rsyslog-udpspoof-8.2102.0-7.el8_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2384" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4805.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4805.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840183" comment="postgresql-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840184" comment="postgresql-contrib-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840185" comment="postgresql-docs-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840186" comment="postgresql-plperl-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840187" comment="postgresql-plpython3-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840188" comment="postgresql-pltcl-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840189" comment="postgresql-server-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840190" comment="postgresql-server-devel-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840191" comment="postgresql-static-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840192" comment="postgresql-test-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840193" comment="postgresql-test-rpm-macros-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840194" comment="postgresql-upgrade-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840195" comment="postgresql-upgrade-devel-10.21-2.module+el8.6.0+15342+53518fac is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2385" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4807.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4807.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838936" comment="pg_repack-1.4.6-3.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838937" comment="pgaudit-1.4.0-5.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838938" comment="postgres-decoderbufs-0.10.0-2.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840196" comment="postgresql-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840197" comment="postgresql-contrib-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840198" comment="postgresql-docs-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840199" comment="postgresql-plperl-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840200" comment="postgresql-plpython3-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840201" comment="postgresql-pltcl-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840202" comment="postgresql-server-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840203" comment="postgresql-server-devel-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840204" comment="postgresql-static-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840205" comment="postgresql-test-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840206" comment="postgresql-test-rpm-macros-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840207" comment="postgresql-upgrade-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840208" comment="postgresql-upgrade-devel-12.11-2.module+el8.6.0+15345+1dd8d6b8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2386" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4855.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4855.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838952" comment="pg_repack-1.4.6-3.module+el8.5.0+11357+bcc62552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837247" comment="pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837248" comment="postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840209" comment="postgresql-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840210" comment="postgresql-contrib-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840211" comment="postgresql-docs-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840212" comment="postgresql-plperl-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840213" comment="postgresql-plpython3-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840214" comment="postgresql-pltcl-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840215" comment="postgresql-server-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840216" comment="postgresql-server-devel-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840217" comment="postgresql-static-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840218" comment="postgresql-test-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840219" comment="postgresql-test-rpm-macros-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840220" comment="postgresql-upgrade-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840221" comment="postgresql-upgrade-devel-13.7-2.module+el8.6.0+15347+b8eabcef is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2387" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4872.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4872.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840222" comment="firefox-91.10.0-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2388" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1834" ref_url="https://www.suse.com/security/cve/CVE-2022-1834/" source="CVE"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4887.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4887.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1834/">CVE-2022-1834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1834">CVE-2022-1834 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840223" comment="thunderbird-91.10.0-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2389" version="1" class="patch">
	<metadata>
		<title>security update for libserf (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4941.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4941.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24070">CVE-2022-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840224" comment="libserf-1.3.9-9.module+el8.4.0+8637+d3bad2c2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840225" comment="mod_dav_svn-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840226" comment="python3-subversion-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840227" comment="subversion-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840228" comment="subversion-devel-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840229" comment="subversion-gnome-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840230" comment="subversion-javahl-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840231" comment="subversion-libs-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840232" comment="subversion-perl-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840233" comment="subversion-tools-1.14.1-2.module+el8.6.0+15201+2f551d15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840234" comment="utf8proc-2.1.1-5.module+el8.4.0+8637+d3bad2c2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2390" version="1" class="patch">
	<metadata>
		<title>security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4991.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4991.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840235" comment="xz-5.2.4-4.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840236" comment="xz-devel-5.2.4-4.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840237" comment="xz-libs-5.2.4-4.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840238" comment="xz-lzma-compat-5.2.4-4.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2391" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-30184" ref_url="https://www.suse.com/security/cve/CVE-2022-30184/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-30184/">CVE-2022-30184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30184">CVE-2022-30184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840239" comment="aspnetcore-runtime-6.0-6.0.6-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840240" comment="aspnetcore-targeting-pack-6.0-6.0.6-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840241" comment="dotnet-6.0.106-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840242" comment="dotnet-apphost-pack-6.0-6.0.6-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840243" comment="dotnet-host-6.0.6-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840244" comment="dotnet-hostfxr-6.0-6.0.6-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840245" comment="dotnet-runtime-6.0-6.0.6-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840246" comment="dotnet-sdk-6.0-6.0.106-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840247" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.106-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840248" comment="dotnet-targeting-pack-6.0-6.0.6-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840249" comment="dotnet-templates-6.0-6.0.106-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840250" comment="netstandard-targeting-pack-2.1-6.0.106-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2392" version="1" class="patch">
	<metadata>
		<title>security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-26691" ref_url="https://www.suse.com/security/cve/CVE-2022-26691/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5056.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5056.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26691/">CVE-2022-26691 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26691">CVE-2022-26691 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840251" comment="cups-2.2.6-45.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840252" comment="cups-client-2.2.6-45.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840253" comment="cups-devel-2.2.6-45.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840254" comment="cups-filesystem-2.2.6-45.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840255" comment="cups-ipptool-2.2.6-45.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840256" comment="cups-libs-2.2.6-45.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840257" comment="cups-lpd-2.2.6-45.el8_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2393" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-30184" ref_url="https://www.suse.com/security/cve/CVE-2022-30184/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5061.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5061.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-30184/">CVE-2022-30184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30184">CVE-2022-30184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840258" comment="aspnetcore-runtime-3.1-3.1.26-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840259" comment="aspnetcore-targeting-pack-3.1-3.1.26-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840260" comment="dotnet-apphost-pack-3.1-3.1.26-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840261" comment="dotnet-hostfxr-3.1-3.1.26-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840262" comment="dotnet-runtime-3.1-3.1.26-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840263" comment="dotnet-sdk-3.1-3.1.420-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840264" comment="dotnet-sdk-3.1-source-built-artifacts-3.1.420-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840265" comment="dotnet-targeting-pack-3.1-3.1.26-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840266" comment="dotnet-templates-3.1-3.1.420-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2394" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13950" ref_url="https://www.suse.com/security/cve/CVE-2020-13950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13950/">CVE-2020-13950 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13950">CVE-2020-13950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840267" comment="httpd-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840268" comment="httpd-devel-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840269" comment="httpd-filesystem-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840270" comment="httpd-manual-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840271" comment="httpd-tools-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839914" comment="mod_http2-1.15.7-5.module+el8.6.0+13996+01710940 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840272" comment="mod_ldap-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840273" comment="mod_proxy_html-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840274" comment="mod_session-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840275" comment="mod_ssl-2.4.37-47.module+el8.6.0+15654+427eba2e.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2395" version="1" class="patch">
	<metadata>
		<title>security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-40528" ref_url="https://www.suse.com/security/cve/CVE-2021-40528/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5311.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5311.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40528/">CVE-2021-40528 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40528">CVE-2021-40528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840276" comment="libgcrypt-1.8.5-7.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840277" comment="libgcrypt-devel-1.8.5-7.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2396" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576/" source="CVE"/>
		<reference ref_id="CVE-2022-27774" ref_url="https://www.suse.com/security/cve/CVE-2022-27774/" source="CVE"/>
		<reference ref_id="CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776/" source="CVE"/>
		<reference ref_id="CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5313.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5313.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27774/">CVE-2022-27774 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840278" comment="curl-7.61.1-22.el8_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840279" comment="libcurl-7.61.1-22.el8_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840280" comment="libcurl-devel-7.61.1-22.el8_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840281" comment="libcurl-minimal-7.61.1-22.el8_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2397" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5314.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5314.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840282" comment="expat-2.2.5-8.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840283" comment="expat-devel-2.2.5-8.el8_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2398" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5316.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5316.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840284" comment="bpftool-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840285" comment="kernel-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840286" comment="kernel-abi-stablelists-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840287" comment="kernel-core-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840288" comment="kernel-cross-headers-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840289" comment="kernel-debug-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840290" comment="kernel-debug-core-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840292" comment="kernel-debug-modules-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840293" comment="kernel-debug-modules-extra-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840295" comment="kernel-doc-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840296" comment="kernel-headers-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840297" comment="kernel-modules-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840298" comment="kernel-modules-extra-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840299" comment="kernel-tools-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840300" comment="kernel-tools-libs-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840302" comment="perf-4.18.0-372.13.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840303" comment="python3-perf-4.18.0-372.13.1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2399" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5317.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5317.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840304" comment="libxml2-2.9.7-13.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840305" comment="libxml2-devel-2.9.7-13.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840306" comment="python3-libxml2-2.9.7-13.el8_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2400" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1621" ref_url="https://www.suse.com/security/cve/CVE-2022-1621/" source="CVE"/>
		<reference ref_id="CVE-2022-1629" ref_url="https://www.suse.com/security/cve/CVE-2022-1629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5319.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5319.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1621/">CVE-2022-1621 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1629/">CVE-2022-1629 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840307" comment="vim-X11-8.0.1763-19.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840308" comment="vim-common-8.0.1763-19.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840309" comment="vim-enhanced-8.0.1763-19.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840310" comment="vim-filesystem-8.0.1763-19.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840311" comment="vim-minimal-8.0.1763-19.el8_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2401" version="1" class="patch">
	<metadata>
		<title>security update for compat-openssl10 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5326.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5326.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840312" comment="compat-openssl10-1.0.2o-4.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2402" version="1" class="patch">
	<metadata>
		<title>security update for libinput (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5331.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5331.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1215">CVE-2022-1215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840313" comment="libinput-1.16.3-3.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840314" comment="libinput-devel-1.16.3-3.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840315" comment="libinput-utils-1.16.3-3.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2403" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675/" source="CVE"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327/" source="CVE"/>
		<reference ref_id="CVE-2022-29526" ref_url="https://www.suse.com/security/cve/CVE-2022-29526/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29526/">CVE-2022-29526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839828" comment="delve-1.7.2-1.module+el8.6.0+12972+ebab5911 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840316" comment="go-toolset-1.17.10-1.module+el8.6.0+15486+6d4da7db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840317" comment="golang-1.17.10-1.module+el8.6.0+15486+6d4da7db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840318" comment="golang-bin-1.17.10-1.module+el8.6.0+15486+6d4da7db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840319" comment="golang-docs-1.17.10-1.module+el8.6.0+15486+6d4da7db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840320" comment="golang-misc-1.17.10-1.module+el8.6.0+15486+6d4da7db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840321" comment="golang-race-1.17.10-1.module+el8.6.0+15486+6d4da7db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840322" comment="golang-src-1.17.10-1.module+el8.6.0+15486+6d4da7db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840323" comment="golang-tests-1.17.10-1.module+el8.6.0+15486+6d4da7db is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2404" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840324" comment="ruby-2.6.10-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840325" comment="ruby-devel-2.6.10-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840326" comment="ruby-doc-2.6.10-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840327" comment="ruby-libs-2.6.10-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837369" comment="rubygem-abrt-0.3.0-4.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837370" comment="rubygem-abrt-doc-0.3.0-4.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840328" comment="rubygem-bigdecimal-1.4.1-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837372" comment="rubygem-bson-4.5.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837373" comment="rubygem-bson-doc-4.5.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840329" comment="rubygem-bundler-1.17.2-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840330" comment="rubygem-did_you_mean-1.3.0-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840331" comment="rubygem-io-console-0.4.7-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840332" comment="rubygem-irb-1.0.0-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840333" comment="rubygem-json-2.1.0-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840334" comment="rubygem-minitest-5.11.3-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837380" comment="rubygem-mongo-2.8.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837381" comment="rubygem-mongo-doc-2.8.0-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837382" comment="rubygem-mysql2-0.5.2-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837383" comment="rubygem-mysql2-doc-0.5.2-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840335" comment="rubygem-net-telnet-0.2.0-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840336" comment="rubygem-openssl-2.1.2-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837386" comment="rubygem-pg-1.1.4-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837387" comment="rubygem-pg-doc-1.1.4-1.module+el8.1.0+3653+beb38eb0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840337" comment="rubygem-power_assert-1.1.3-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840338" comment="rubygem-psych-3.1.0-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840339" comment="rubygem-rake-12.3.3-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840340" comment="rubygem-rdoc-6.1.2.1-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840341" comment="rubygem-test-unit-3.2.9-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840342" comment="rubygem-xmlrpc-0.3.0-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840343" comment="rubygems-3.0.3.1-109.module+el8.6.0+15475+c55337b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840344" comment="rubygems-devel-3.0.3.1-109.module+el8.6.0+15475+c55337b4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2405" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-31626" ref_url="https://www.suse.com/security/cve/CVE-2022-31626/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5467.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5467.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31626/">CVE-2022-31626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31626">CVE-2022-31626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838070" comment="apcu-panel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838071" comment="libzip-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838072" comment="libzip-devel-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838073" comment="libzip-tools-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840345" comment="php-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840346" comment="php-bcmath-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840347" comment="php-cli-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840348" comment="php-common-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840349" comment="php-dba-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840350" comment="php-dbg-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840351" comment="php-devel-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840352" comment="php-embedded-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840353" comment="php-enchant-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840354" comment="php-ffi-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840355" comment="php-fpm-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840356" comment="php-gd-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840357" comment="php-gmp-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840358" comment="php-intl-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840359" comment="php-json-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840360" comment="php-ldap-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840361" comment="php-mbstring-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840362" comment="php-mysqlnd-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840363" comment="php-odbc-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840364" comment="php-opcache-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840365" comment="php-pdo-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838095" comment="php-pear-1.10.12-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838096" comment="php-pecl-apcu-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838097" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838098" comment="php-pecl-rrd-2.0.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838099" comment="php-pecl-xdebug-2.9.5-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838100" comment="php-pecl-zip-1.18.2-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840366" comment="php-pgsql-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840367" comment="php-process-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840368" comment="php-snmp-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840369" comment="php-soap-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840370" comment="php-xml-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840371" comment="php-xmlrpc-7.4.19-3.module+el8.6.0+15726+994cde98 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2406" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-31626" ref_url="https://www.suse.com/security/cve/CVE-2022-31626/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5468.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5468.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31626/">CVE-2022-31626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31626">CVE-2022-31626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840372" comment="apcu-panel-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840373" comment="libzip-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840374" comment="libzip-devel-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840375" comment="libzip-tools-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840376" comment="php-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840377" comment="php-bcmath-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840378" comment="php-cli-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840379" comment="php-common-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840380" comment="php-dba-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840381" comment="php-dbg-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840382" comment="php-devel-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840383" comment="php-embedded-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840384" comment="php-enchant-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840385" comment="php-ffi-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840386" comment="php-fpm-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840387" comment="php-gd-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840388" comment="php-gmp-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840389" comment="php-intl-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840390" comment="php-ldap-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840391" comment="php-mbstring-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840392" comment="php-mysqlnd-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840393" comment="php-odbc-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840394" comment="php-opcache-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840395" comment="php-pdo-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840396" comment="php-pear-1.10.13-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840397" comment="php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840398" comment="php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840399" comment="php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840400" comment="php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840401" comment="php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840402" comment="php-pgsql-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840403" comment="php-process-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840404" comment="php-snmp-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840405" comment="php-soap-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840406" comment="php-xml-8.0.13-3.module+el8.6.0+15725+0c79e7c4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2407" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5469.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5469.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840407" comment="firefox-91.11.0-2.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2408" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2226" ref_url="https://www.suse.com/security/cve/CVE-2022-2226/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5470.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5470.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2226/">CVE-2022-2226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2226">CVE-2022-2226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840408" comment="thunderbird-91.11.0-2.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2409" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5526.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5526.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832711" comment="libecap-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832712" comment="libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840409" comment="squid-4.15-3.module+el8.6.0+15801+8fa20c64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2410" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-49044" ref_url="https://www.suse.com/security/cve/CVE-2022-49044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5564.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5564.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49044/">CVE-2022-49044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49044">CVE-2022-49044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840410" comment="bpftool-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840411" comment="kernel-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840412" comment="kernel-abi-stablelists-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840413" comment="kernel-core-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840414" comment="kernel-cross-headers-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840415" comment="kernel-debug-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840416" comment="kernel-debug-core-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840418" comment="kernel-debug-modules-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840419" comment="kernel-debug-modules-extra-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840421" comment="kernel-doc-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840422" comment="kernel-headers-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840423" comment="kernel-modules-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840424" comment="kernel-modules-extra-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840425" comment="kernel-tools-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840426" comment="kernel-tools-libs-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840428" comment="perf-4.18.0-372.16.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840429" comment="python3-perf-4.18.0-372.16.1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2411" version="1" class="patch">
	<metadata>
		<title>security update for pandoc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24724" ref_url="https://www.suse.com/security/cve/CVE-2022-24724/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5597.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5597.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24724/">CVE-2022-24724 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24724">CVE-2022-24724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840430" comment="pandoc-2.0.6-6.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840431" comment="pandoc-common-2.0.6-6.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2412" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5683.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5683.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840432" comment="java-11-openjdk-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840433" comment="java-11-openjdk-demo-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840434" comment="java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840435" comment="java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840436" comment="java-11-openjdk-devel-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840437" comment="java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840438" comment="java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840439" comment="java-11-openjdk-fastdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840440" comment="java-11-openjdk-headless-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840441" comment="java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840442" comment="java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840443" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840444" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840445" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840446" comment="java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840447" comment="java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840448" comment="java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840449" comment="java-11-openjdk-src-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840450" comment="java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840451" comment="java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840452" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840453" comment="java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840454" comment="java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2413" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5696.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5696.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840455" comment="java-1.8.0-openjdk-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840456" comment="java-1.8.0-openjdk-accessibility-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840457" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840458" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840459" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840460" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840461" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840462" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840463" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840464" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840465" comment="java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840466" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840467" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840468" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840469" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840470" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840471" comment="java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840472" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840473" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840474" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-2.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2414" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5717.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5717.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31107">CVE-2022-31107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840475" comment="grafana-7.5.11-3.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2415" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5726.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5726.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840476" comment="java-17-openjdk-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840477" comment="java-17-openjdk-demo-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840478" comment="java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840479" comment="java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840480" comment="java-17-openjdk-devel-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840481" comment="java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840482" comment="java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840483" comment="java-17-openjdk-fastdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840484" comment="java-17-openjdk-headless-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840485" comment="java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840486" comment="java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840487" comment="java-17-openjdk-javadoc-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840488" comment="java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840489" comment="java-17-openjdk-jmods-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840490" comment="java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840491" comment="java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840492" comment="java-17-openjdk-slowdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840493" comment="java-17-openjdk-src-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840494" comment="java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840495" comment="java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840496" comment="java-17-openjdk-static-libs-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840497" comment="java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840498" comment="java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2416" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5774.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5774.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840499" comment="thunderbird-91.12.0-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2417" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5775.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5775.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839828" comment="delve-1.7.2-1.module+el8.6.0+12972+ebab5911 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840500" comment="go-toolset-1.17.12-1.module+el8.6.0+16014+a372c00b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840501" comment="golang-1.17.12-1.module+el8.6.0+16014+a372c00b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840502" comment="golang-bin-1.17.12-1.module+el8.6.0+16014+a372c00b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840503" comment="golang-docs-1.17.12-1.module+el8.6.0+16014+a372c00b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840504" comment="golang-misc-1.17.12-1.module+el8.6.0+16014+a372c00b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840505" comment="golang-race-1.17.12-1.module+el8.6.0+16014+a372c00b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840506" comment="golang-src-1.17.12-1.module+el8.6.0+16014+a372c00b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840507" comment="golang-tests-1.17.12-1.module+el8.6.0+16014+a372c00b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2418" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5777.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5777.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840508" comment="firefox-91.12.0-2.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2419" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5779.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5779.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840509" comment="ruby-2.5.9-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840510" comment="ruby-devel-2.5.9-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840511" comment="ruby-doc-2.5.9-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840512" comment="ruby-irb-2.5.9-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840513" comment="ruby-libs-2.5.9-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837338" comment="rubygem-abrt-0.3.0-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837339" comment="rubygem-abrt-doc-0.3.0-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840514" comment="rubygem-bigdecimal-1.3.4-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837341" comment="rubygem-bson-4.3.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837342" comment="rubygem-bson-doc-4.3.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840515" comment="rubygem-bundler-1.16.1-4.module+el8.6.0+14229+2452087f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840516" comment="rubygem-bundler-doc-1.16.1-4.module+el8.6.0+14229+2452087f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840517" comment="rubygem-did_you_mean-1.2.0-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840518" comment="rubygem-io-console-0.4.6-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840519" comment="rubygem-json-2.1.0-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840520" comment="rubygem-minitest-5.10.3-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837349" comment="rubygem-mongo-2.5.1-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837350" comment="rubygem-mongo-doc-2.5.1-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837351" comment="rubygem-mysql2-0.4.10-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837352" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840521" comment="rubygem-net-telnet-0.1.1-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840522" comment="rubygem-openssl-2.1.2-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837355" comment="rubygem-pg-1.0.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837356" comment="rubygem-pg-doc-1.0.0-2.module+el8.1.0+3656+f80bfa1d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840523" comment="rubygem-power_assert-1.1.1-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840524" comment="rubygem-psych-3.0.2-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840525" comment="rubygem-rake-12.3.3-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840526" comment="rubygem-rdoc-6.0.1.1-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840527" comment="rubygem-test-unit-3.2.7-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840528" comment="rubygem-xmlrpc-0.3.0-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840529" comment="rubygems-2.7.6.3-110.module+el8.6.0+15956+aa803fc1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840530" comment="rubygems-devel-2.7.6.3-110.module+el8.6.0+15956+aa803fc1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2420" version="1" class="patch">
	<metadata>
		<title>security update for pcre2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840531" comment="pcre2-10.32-3.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840532" comment="pcre2-devel-10.32-3.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840533" comment="pcre2-tools-10.32-3.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840534" comment="pcre2-utf16-10.32-3.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840535" comment="pcre2-utf32-10.32-3.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2421" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785/" source="CVE"/>
		<reference ref_id="CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897/" source="CVE"/>
		<reference ref_id="CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5813.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5813.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840536" comment="vim-X11-8.0.1763-19.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840537" comment="vim-common-8.0.1763-19.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840538" comment="vim-enhanced-8.0.1763-19.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840539" comment="vim-filesystem-8.0.1763-19.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840540" comment="vim-minimal-8.0.1763-19.el8_6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2422" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292/" source="CVE"/>
		<reference ref_id="CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068/" source="CVE"/>
		<reference ref_id="CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5818.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5818.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2097">CVE-2022-2097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840541" comment="openssl-1.1.1k-7.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840542" comment="openssl-devel-1.1.1k-7.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840543" comment="openssl-libs-1.1.1k-7.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840544" comment="openssl-perl-1.1.1k-7.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2423" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012/" source="CVE"/>
		<reference ref_id="CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250/" source="CVE"/>
		<reference ref_id="CVE-2022-49541" ref_url="https://www.suse.com/security/cve/CVE-2022-49541/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5819.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5819.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49541/">CVE-2022-49541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49541">CVE-2022-49541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840545" comment="bpftool-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840546" comment="kernel-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840547" comment="kernel-abi-stablelists-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840548" comment="kernel-core-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840549" comment="kernel-cross-headers-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840550" comment="kernel-debug-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840551" comment="kernel-debug-core-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840553" comment="kernel-debug-modules-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840554" comment="kernel-debug-modules-extra-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840556" comment="kernel-doc-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840557" comment="kernel-headers-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840558" comment="kernel-modules-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840559" comment="kernel-modules-extra-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840560" comment="kernel-tools-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840561" comment="kernel-tools-libs-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840563" comment="perf-4.18.0-372.19.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840564" comment="python3-perf-4.18.0-372.19.1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2424" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5823.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5823.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0918">CVE-2022-0918 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0996">CVE-2022-0996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840565" comment="389-ds-base-1.4.3.28-7.module+el8.6.0+15293+4900ec12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840566" comment="389-ds-base-devel-1.4.3.28-7.module+el8.6.0+15293+4900ec12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840567" comment="389-ds-base-legacy-tools-1.4.3.28-7.module+el8.6.0+15293+4900ec12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840568" comment="389-ds-base-libs-1.4.3.28-7.module+el8.6.0+15293+4900ec12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840569" comment="389-ds-base-snmp-1.4.3.28-7.module+el8.6.0+15293+4900ec12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840570" comment="python3-lib389-1.4.3.28-7.module+el8.6.0+15293+4900ec12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2425" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2021-46669" ref_url="https://www.suse.com/security/cve/CVE-2021-46669/" source="CVE"/>
		<reference ref_id="CVE-2022-21595" ref_url="https://www.suse.com/security/cve/CVE-2022-21595/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="CVE-2022-27376" ref_url="https://www.suse.com/security/cve/CVE-2022-27376/" source="CVE"/>
		<reference ref_id="CVE-2022-27377" ref_url="https://www.suse.com/security/cve/CVE-2022-27377/" source="CVE"/>
		<reference ref_id="CVE-2022-27378" ref_url="https://www.suse.com/security/cve/CVE-2022-27378/" source="CVE"/>
		<reference ref_id="CVE-2022-27379" ref_url="https://www.suse.com/security/cve/CVE-2022-27379/" source="CVE"/>
		<reference ref_id="CVE-2022-27380" ref_url="https://www.suse.com/security/cve/CVE-2022-27380/" source="CVE"/>
		<reference ref_id="CVE-2022-27381" ref_url="https://www.suse.com/security/cve/CVE-2022-27381/" source="CVE"/>
		<reference ref_id="CVE-2022-27382" ref_url="https://www.suse.com/security/cve/CVE-2022-27382/" source="CVE"/>
		<reference ref_id="CVE-2022-27383" ref_url="https://www.suse.com/security/cve/CVE-2022-27383/" source="CVE"/>
		<reference ref_id="CVE-2022-27384" ref_url="https://www.suse.com/security/cve/CVE-2022-27384/" source="CVE"/>
		<reference ref_id="CVE-2022-27386" ref_url="https://www.suse.com/security/cve/CVE-2022-27386/" source="CVE"/>
		<reference ref_id="CVE-2022-27387" ref_url="https://www.suse.com/security/cve/CVE-2022-27387/" source="CVE"/>
		<reference ref_id="CVE-2022-27444" ref_url="https://www.suse.com/security/cve/CVE-2022-27444/" source="CVE"/>
		<reference ref_id="CVE-2022-27445" ref_url="https://www.suse.com/security/cve/CVE-2022-27445/" source="CVE"/>
		<reference ref_id="CVE-2022-27446" ref_url="https://www.suse.com/security/cve/CVE-2022-27446/" source="CVE"/>
		<reference ref_id="CVE-2022-27447" ref_url="https://www.suse.com/security/cve/CVE-2022-27447/" source="CVE"/>
		<reference ref_id="CVE-2022-27448" ref_url="https://www.suse.com/security/cve/CVE-2022-27448/" source="CVE"/>
		<reference ref_id="CVE-2022-27449" ref_url="https://www.suse.com/security/cve/CVE-2022-27449/" source="CVE"/>
		<reference ref_id="CVE-2022-27451" ref_url="https://www.suse.com/security/cve/CVE-2022-27451/" source="CVE"/>
		<reference ref_id="CVE-2022-27452" ref_url="https://www.suse.com/security/cve/CVE-2022-27452/" source="CVE"/>
		<reference ref_id="CVE-2022-27455" ref_url="https://www.suse.com/security/cve/CVE-2022-27455/" source="CVE"/>
		<reference ref_id="CVE-2022-27456" ref_url="https://www.suse.com/security/cve/CVE-2022-27456/" source="CVE"/>
		<reference ref_id="CVE-2022-27457" ref_url="https://www.suse.com/security/cve/CVE-2022-27457/" source="CVE"/>
		<reference ref_id="CVE-2022-27458" ref_url="https://www.suse.com/security/cve/CVE-2022-27458/" source="CVE"/>
		<reference ref_id="CVE-2022-31622" ref_url="https://www.suse.com/security/cve/CVE-2022-31622/" source="CVE"/>
		<reference ref_id="CVE-2022-31623" ref_url="https://www.suse.com/security/cve/CVE-2022-31623/" source="CVE"/>
		<reference ref_id="CVE-2022-32083" ref_url="https://www.suse.com/security/cve/CVE-2022-32083/" source="CVE"/>
		<reference ref_id="CVE-2022-32085" ref_url="https://www.suse.com/security/cve/CVE-2022-32085/" source="CVE"/>
		<reference ref_id="CVE-2022-32086" ref_url="https://www.suse.com/security/cve/CVE-2022-32086/" source="CVE"/>
		<reference ref_id="CVE-2022-32087" ref_url="https://www.suse.com/security/cve/CVE-2022-32087/" source="CVE"/>
		<reference ref_id="CVE-2022-32088" ref_url="https://www.suse.com/security/cve/CVE-2022-32088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5826.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5826.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46659">CVE-2021-46659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46661">CVE-2021-46661 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46663">CVE-2021-46663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46664">CVE-2021-46664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46665">CVE-2021-46665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46668">CVE-2021-46668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46669/">CVE-2021-46669 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">CVE-2021-46669 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21595/">CVE-2022-21595 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21595">CVE-2022-21595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24048">CVE-2022-24048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24050">CVE-2022-24050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24051">CVE-2022-24051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24052">CVE-2022-24052 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27376/">CVE-2022-27376 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27376">CVE-2022-27376 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27377/">CVE-2022-27377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27377">CVE-2022-27377 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27378/">CVE-2022-27378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27378">CVE-2022-27378 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27379/">CVE-2022-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27379">CVE-2022-27379 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27380/">CVE-2022-27380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27380">CVE-2022-27380 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27381/">CVE-2022-27381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27381">CVE-2022-27381 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27382/">CVE-2022-27382 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27382">CVE-2022-27382 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27383/">CVE-2022-27383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27383">CVE-2022-27383 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27384/">CVE-2022-27384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27384">CVE-2022-27384 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27386/">CVE-2022-27386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27386">CVE-2022-27386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27387/">CVE-2022-27387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27387">CVE-2022-27387 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27444/">CVE-2022-27444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27444">CVE-2022-27444 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27445/">CVE-2022-27445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27445">CVE-2022-27445 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27446/">CVE-2022-27446 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27446">CVE-2022-27446 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27447/">CVE-2022-27447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27447">CVE-2022-27447 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27448/">CVE-2022-27448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27448">CVE-2022-27448 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27449/">CVE-2022-27449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27449">CVE-2022-27449 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27451/">CVE-2022-27451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27451">CVE-2022-27451 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27452/">CVE-2022-27452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27452">CVE-2022-27452 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27455/">CVE-2022-27455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27455">CVE-2022-27455 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27456/">CVE-2022-27456 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27456">CVE-2022-27456 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27457/">CVE-2022-27457 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27457">CVE-2022-27457 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27458/">CVE-2022-27458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27458">CVE-2022-27458 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31622/">CVE-2022-31622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31622">CVE-2022-31622 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31623/">CVE-2022-31623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31623">CVE-2022-31623 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32083/">CVE-2022-32083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32083">CVE-2022-32083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32085/">CVE-2022-32085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32085">CVE-2022-32085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32086/">CVE-2022-32086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32086">CVE-2022-32086 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32087/">CVE-2022-32087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32087">CVE-2022-32087 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32088/">CVE-2022-32088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32088">CVE-2022-32088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839662" comment="Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840571" comment="galera-26.4.11-1.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840572" comment="mariadb-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840573" comment="mariadb-backup-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840574" comment="mariadb-common-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840575" comment="mariadb-devel-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840576" comment="mariadb-embedded-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840577" comment="mariadb-embedded-devel-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840578" comment="mariadb-errmsg-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840579" comment="mariadb-gssapi-server-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840580" comment="mariadb-oqgraph-engine-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840581" comment="mariadb-pam-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840582" comment="mariadb-server-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840583" comment="mariadb-server-galera-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840584" comment="mariadb-server-utils-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840585" comment="mariadb-test-10.5.16-2.module+el8.6.0+15639+405b7427 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2426" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1650" ref_url="https://www.suse.com/security/cve/CVE-2022-1650/" source="CVE"/>
		<reference ref_id="CVE-2022-34716" ref_url="https://www.suse.com/security/cve/CVE-2022-34716/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6057.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6057.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1650/">CVE-2022-1650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1650">CVE-2022-1650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34716/">CVE-2022-34716 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34716">CVE-2022-34716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840586" comment="aspnetcore-runtime-3.1-3.1.28-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840587" comment="aspnetcore-targeting-pack-3.1-3.1.28-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840588" comment="dotnet-apphost-pack-3.1-3.1.28-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840589" comment="dotnet-hostfxr-3.1-3.1.28-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840590" comment="dotnet-runtime-3.1-3.1.28-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840591" comment="dotnet-sdk-3.1-3.1.422-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840592" comment="dotnet-sdk-3.1-source-built-artifacts-3.1.422-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840593" comment="dotnet-targeting-pack-3.1-3.1.28-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840594" comment="dotnet-templates-3.1-3.1.422-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2427" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-34716" ref_url="https://www.suse.com/security/cve/CVE-2022-34716/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6058.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6058.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34716/">CVE-2022-34716 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34716">CVE-2022-34716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840595" comment="aspnetcore-runtime-6.0-6.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840596" comment="aspnetcore-targeting-pack-6.0-6.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840597" comment="dotnet-6.0.108-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840598" comment="dotnet-apphost-pack-6.0-6.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840599" comment="dotnet-host-6.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840600" comment="dotnet-hostfxr-6.0-6.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840601" comment="dotnet-runtime-6.0-6.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840602" comment="dotnet-sdk-6.0-6.0.108-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840603" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840604" comment="dotnet-targeting-pack-6.0-6.0.8-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840605" comment="dotnet-templates-6.0-6.0.108-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840606" comment="netstandard-targeting-pack-2.1-6.0.108-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2428" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6158.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6158.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31625">CVE-2022-31625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838070" comment="apcu-panel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838071" comment="libzip-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838072" comment="libzip-devel-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838073" comment="libzip-tools-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840607" comment="php-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840608" comment="php-bcmath-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840609" comment="php-cli-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840610" comment="php-common-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840611" comment="php-dba-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840612" comment="php-dbg-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840613" comment="php-devel-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840614" comment="php-embedded-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840615" comment="php-enchant-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840616" comment="php-ffi-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840617" comment="php-fpm-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840618" comment="php-gd-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840619" comment="php-gmp-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840620" comment="php-intl-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840621" comment="php-json-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840622" comment="php-ldap-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840623" comment="php-mbstring-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840624" comment="php-mysqlnd-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840625" comment="php-odbc-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840626" comment="php-opcache-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840627" comment="php-pdo-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838095" comment="php-pear-1.10.12-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838096" comment="php-pecl-apcu-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838097" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838098" comment="php-pecl-rrd-2.0.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838099" comment="php-pecl-xdebug-2.9.5-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838100" comment="php-pecl-zip-1.18.2-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840628" comment="php-pgsql-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840629" comment="php-process-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840630" comment="php-snmp-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840631" comment="php-soap-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840632" comment="php-xml-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840633" comment="php-xmlrpc-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2429" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32206" ref_url="https://www.suse.com/security/cve/CVE-2022-32206/" source="CVE"/>
		<reference ref_id="CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6159.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6159.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32206/">CVE-2022-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840634" comment="curl-7.61.1-22.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840635" comment="libcurl-7.61.1-22.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840636" comment="libcurl-devel-7.61.1-22.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840637" comment="libcurl-minimal-7.61.1-22.el8_6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2430" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6164.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6164.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840638" comment="thunderbird-91.13.0-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2431" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6175.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6175.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840639" comment="firefox-91.13.0-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2432" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6180.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6180.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840640" comment="rsync-3.1.3-14.el8_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840641" comment="rsync-daemon-3.1.3-14.el8_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2433" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2526" ref_url="https://www.suse.com/security/cve/CVE-2022-2526/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6206.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6206.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2526/">CVE-2022-2526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2526">CVE-2022-2526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840642" comment="systemd-239-58.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840643" comment="systemd-container-239-58.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840644" comment="systemd-devel-239-58.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840645" comment="systemd-journal-remote-239-58.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840646" comment="systemd-libs-239-58.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840647" comment="systemd-pam-239-58.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840648" comment="systemd-tests-239-58.el8_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840649" comment="systemd-udev-239-58.el8_6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2434" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2735" ref_url="https://www.suse.com/security/cve/CVE-2022-2735/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6314.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6314.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2735/">CVE-2022-2735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2735">CVE-2022-2735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840650" comment="pcs-0.10.12-6.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840651" comment="pcs-snmp-0.10.12-6.el8_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2435" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6357.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6357.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840652" comment="open-vm-tools-11.3.5-1.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840653" comment="open-vm-tools-desktop-11.3.5-1.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840654" comment="open-vm-tools-sdmp-11.3.5-1.el8_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2436" version="1" class="patch">
	<metadata>
		<title>security update for booth (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2553" ref_url="https://www.suse.com/security/cve/CVE-2022-2553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6439.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6439.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2553/">CVE-2022-2553 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2553">CVE-2022-2553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840655" comment="booth-1.0-199.1.ac1d34c.git.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840656" comment="booth-arbitrator-1.0-199.1.ac1d34c.git.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840657" comment="booth-core-1.0-199.1.ac1d34c.git.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840658" comment="booth-site-1.0-199.1.ac1d34c.git.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840659" comment="booth-test-1.0-199.1.ac1d34c.git.el8_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2437" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2021-46669" ref_url="https://www.suse.com/security/cve/CVE-2021-46669/" source="CVE"/>
		<reference ref_id="CVE-2022-21427" ref_url="https://www.suse.com/security/cve/CVE-2022-21427/" source="CVE"/>
		<reference ref_id="CVE-2022-21595" ref_url="https://www.suse.com/security/cve/CVE-2022-21595/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="CVE-2022-27376" ref_url="https://www.suse.com/security/cve/CVE-2022-27376/" source="CVE"/>
		<reference ref_id="CVE-2022-27377" ref_url="https://www.suse.com/security/cve/CVE-2022-27377/" source="CVE"/>
		<reference ref_id="CVE-2022-27378" ref_url="https://www.suse.com/security/cve/CVE-2022-27378/" source="CVE"/>
		<reference ref_id="CVE-2022-27379" ref_url="https://www.suse.com/security/cve/CVE-2022-27379/" source="CVE"/>
		<reference ref_id="CVE-2022-27380" ref_url="https://www.suse.com/security/cve/CVE-2022-27380/" source="CVE"/>
		<reference ref_id="CVE-2022-27381" ref_url="https://www.suse.com/security/cve/CVE-2022-27381/" source="CVE"/>
		<reference ref_id="CVE-2022-27383" ref_url="https://www.suse.com/security/cve/CVE-2022-27383/" source="CVE"/>
		<reference ref_id="CVE-2022-27384" ref_url="https://www.suse.com/security/cve/CVE-2022-27384/" source="CVE"/>
		<reference ref_id="CVE-2022-27386" ref_url="https://www.suse.com/security/cve/CVE-2022-27386/" source="CVE"/>
		<reference ref_id="CVE-2022-27387" ref_url="https://www.suse.com/security/cve/CVE-2022-27387/" source="CVE"/>
		<reference ref_id="CVE-2022-27445" ref_url="https://www.suse.com/security/cve/CVE-2022-27445/" source="CVE"/>
		<reference ref_id="CVE-2022-27447" ref_url="https://www.suse.com/security/cve/CVE-2022-27447/" source="CVE"/>
		<reference ref_id="CVE-2022-27448" ref_url="https://www.suse.com/security/cve/CVE-2022-27448/" source="CVE"/>
		<reference ref_id="CVE-2022-27449" ref_url="https://www.suse.com/security/cve/CVE-2022-27449/" source="CVE"/>
		<reference ref_id="CVE-2022-27452" ref_url="https://www.suse.com/security/cve/CVE-2022-27452/" source="CVE"/>
		<reference ref_id="CVE-2022-27456" ref_url="https://www.suse.com/security/cve/CVE-2022-27456/" source="CVE"/>
		<reference ref_id="CVE-2022-27458" ref_url="https://www.suse.com/security/cve/CVE-2022-27458/" source="CVE"/>
		<reference ref_id="CVE-2022-31622" ref_url="https://www.suse.com/security/cve/CVE-2022-31622/" source="CVE"/>
		<reference ref_id="CVE-2022-31623" ref_url="https://www.suse.com/security/cve/CVE-2022-31623/" source="CVE"/>
		<reference ref_id="CVE-2022-32083" ref_url="https://www.suse.com/security/cve/CVE-2022-32083/" source="CVE"/>
		<reference ref_id="CVE-2022-32085" ref_url="https://www.suse.com/security/cve/CVE-2022-32085/" source="CVE"/>
		<reference ref_id="CVE-2022-32087" ref_url="https://www.suse.com/security/cve/CVE-2022-32087/" source="CVE"/>
		<reference ref_id="CVE-2022-32088" ref_url="https://www.suse.com/security/cve/CVE-2022-32088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6443.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6443.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46659">CVE-2021-46659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46661">CVE-2021-46661 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46663">CVE-2021-46663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46664">CVE-2021-46664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46665">CVE-2021-46665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46668">CVE-2021-46668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46669/">CVE-2021-46669 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">CVE-2021-46669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21427/">CVE-2022-21427 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21427">CVE-2022-21427 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21595/">CVE-2022-21595 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21595">CVE-2022-21595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24048">CVE-2022-24048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24050">CVE-2022-24050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24051">CVE-2022-24051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24052">CVE-2022-24052 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27376/">CVE-2022-27376 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27376">CVE-2022-27376 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27377/">CVE-2022-27377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27377">CVE-2022-27377 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27378/">CVE-2022-27378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27378">CVE-2022-27378 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27379/">CVE-2022-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27379">CVE-2022-27379 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27380/">CVE-2022-27380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27380">CVE-2022-27380 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27381/">CVE-2022-27381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27381">CVE-2022-27381 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27383/">CVE-2022-27383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27383">CVE-2022-27383 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27384/">CVE-2022-27384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27384">CVE-2022-27384 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27386/">CVE-2022-27386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27386">CVE-2022-27386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27387/">CVE-2022-27387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27387">CVE-2022-27387 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27445/">CVE-2022-27445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27445">CVE-2022-27445 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27447/">CVE-2022-27447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27447">CVE-2022-27447 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27448/">CVE-2022-27448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27448">CVE-2022-27448 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27449/">CVE-2022-27449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27449">CVE-2022-27449 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27452/">CVE-2022-27452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27452">CVE-2022-27452 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27456/">CVE-2022-27456 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27456">CVE-2022-27456 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27458/">CVE-2022-27458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27458">CVE-2022-27458 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31622/">CVE-2022-31622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31622">CVE-2022-31622 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31623/">CVE-2022-31623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31623">CVE-2022-31623 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32083/">CVE-2022-32083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32083">CVE-2022-32083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32085/">CVE-2022-32085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32085">CVE-2022-32085 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32087/">CVE-2022-32087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32087">CVE-2022-32087 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32088/">CVE-2022-32088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32088">CVE-2022-32088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830834" comment="Judy-1.0.5-18.module+el8+2765+cfa4f87b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840660" comment="galera-25.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840661" comment="mariadb-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840662" comment="mariadb-backup-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840663" comment="mariadb-common-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840664" comment="mariadb-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840665" comment="mariadb-embedded-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840666" comment="mariadb-embedded-devel-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840667" comment="mariadb-errmsg-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840668" comment="mariadb-gssapi-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840669" comment="mariadb-oqgraph-engine-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840670" comment="mariadb-server-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840671" comment="mariadb-server-galera-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840672" comment="mariadb-server-utils-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840673" comment="mariadb-test-10.3.35-1.module+el8.6.0+15949+4ba4ec26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2438" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6447.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6447.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840674" comment="ruby-2.7.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840675" comment="ruby-default-gems-2.7.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840676" comment="ruby-devel-2.7.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840677" comment="ruby-doc-2.7.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840678" comment="ruby-libs-2.7.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837307" comment="rubygem-abrt-0.4.0-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837308" comment="rubygem-abrt-doc-0.4.0-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840679" comment="rubygem-bigdecimal-2.0.0-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837310" comment="rubygem-bson-4.8.1-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837311" comment="rubygem-bson-doc-4.8.1-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840680" comment="rubygem-bundler-2.2.24-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840681" comment="rubygem-io-console-0.5.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840682" comment="rubygem-irb-1.2.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840683" comment="rubygem-json-2.3.0-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840684" comment="rubygem-minitest-5.13.0-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837317" comment="rubygem-mongo-2.11.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837318" comment="rubygem-mongo-doc-2.11.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837319" comment="rubygem-mysql2-0.5.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837320" comment="rubygem-mysql2-doc-0.5.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840685" comment="rubygem-net-telnet-0.2.0-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840686" comment="rubygem-openssl-2.1.3-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837323" comment="rubygem-pg-1.2.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837324" comment="rubygem-pg-doc-1.2.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840687" comment="rubygem-power_assert-1.1.7-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840688" comment="rubygem-psych-3.1.0-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840689" comment="rubygem-rake-13.0.1-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840690" comment="rubygem-rdoc-6.2.1.1-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840691" comment="rubygem-test-unit-3.3.4-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840692" comment="rubygem-xmlrpc-0.3.0-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840693" comment="rubygems-3.1.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840694" comment="rubygems-devel-3.1.6-138.module+el8.6.0+16148+54b2ba8f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2439" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="CVE-2022-33987" ref_url="https://www.suse.com/security/cve/CVE-2022-33987/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6448.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6448.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32212">CVE-2022-32212 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32214">CVE-2022-32214 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32215">CVE-2022-32215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-33987/">CVE-2022-33987 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33987">CVE-2022-33987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840695" comment="nodejs-14.20.0-2.module+el8.6.0+16231+7c1b33d9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840696" comment="nodejs-devel-14.20.0-2.module+el8.6.0+16231+7c1b33d9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840697" comment="nodejs-docs-14.20.0-2.module+el8.6.0+16231+7c1b33d9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840698" comment="nodejs-full-i18n-14.20.0-2.module+el8.6.0+16231+7c1b33d9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840699" comment="nodejs-nodemon-2.0.19-2.module+el8.6.0+16231+7c1b33d9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840700" comment="npm-6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2440" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="CVE-2022-33987" ref_url="https://www.suse.com/security/cve/CVE-2022-33987/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6449.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6449.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32212">CVE-2022-32212 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32214">CVE-2022-32214 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32215">CVE-2022-32215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-33987/">CVE-2022-33987 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33987">CVE-2022-33987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840701" comment="nodejs-16.16.0-3.module+el8.6.0+16248+76b0e185 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840702" comment="nodejs-devel-16.16.0-3.module+el8.6.0+16248+76b0e185 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840703" comment="nodejs-docs-16.16.0-3.module+el8.6.0+16248+76b0e185 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840704" comment="nodejs-full-i18n-16.16.0-3.module+el8.6.0+16248+76b0e185 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840705" comment="nodejs-nodemon-2.0.19-2.module+el8.6.0+16240+7ca51420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838910" comment="nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840706" comment="npm-8.11.0-1.16.16.0.3.module+el8.6.0+16248+76b0e185 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2441" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2021-41819" ref_url="https://www.suse.com/security/cve/CVE-2021-41819/" source="CVE"/>
		<reference ref_id="CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6450.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6450.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41819/">CVE-2021-41819 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41819">CVE-2021-41819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840707" comment="ruby-3.0.4-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840708" comment="ruby-default-gems-3.0.4-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840709" comment="ruby-devel-3.0.4-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840710" comment="ruby-doc-3.0.4-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840711" comment="ruby-libs-3.0.4-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840712" comment="rubygem-abrt-0.4.0-1.module+el8.5.0+11580+845038eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840713" comment="rubygem-abrt-doc-0.4.0-1.module+el8.5.0+11580+845038eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840714" comment="rubygem-bigdecimal-3.0.0-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840715" comment="rubygem-bundler-2.2.33-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840716" comment="rubygem-io-console-0.5.7-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840717" comment="rubygem-irb-1.3.5-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840718" comment="rubygem-json-2.5.1-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840719" comment="rubygem-minitest-5.14.2-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840720" comment="rubygem-mysql2-0.5.3-1.module+el8.5.0+11580+845038eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840721" comment="rubygem-mysql2-doc-0.5.3-1.module+el8.5.0+11580+845038eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840722" comment="rubygem-pg-1.2.3-1.module+el8.5.0+11580+845038eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840723" comment="rubygem-pg-doc-1.2.3-1.module+el8.5.0+11580+845038eb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840724" comment="rubygem-power_assert-1.2.0-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840725" comment="rubygem-psych-3.3.2-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840726" comment="rubygem-rake-13.0.3-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840727" comment="rubygem-rbs-1.4.0-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840728" comment="rubygem-rdoc-6.3.3-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840729" comment="rubygem-rexml-3.2.5-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840730" comment="rubygem-rss-0.2.9-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840731" comment="rubygem-test-unit-3.3.7-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840732" comment="rubygem-typeprof-0.15.2-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840733" comment="rubygems-3.2.33-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840734" comment="rubygems-devel-3.2.33-141.module+el8.6.0+16311+3e5e17e9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2442" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6457.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6457.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0391">CVE-2022-0391 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840735" comment="platform-python-3.6.8-47.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840736" comment="platform-python-debug-3.6.8-47.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840737" comment="platform-python-devel-3.6.8-47.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840738" comment="python3-idle-3.6.8-47.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840739" comment="python3-libs-3.6.8-47.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840740" comment="python3-test-3.6.8-47.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840741" comment="python3-tkinter-3.6.8-47.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2443" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2022-49557" ref_url="https://www.suse.com/security/cve/CVE-2022-49557/" source="CVE"/>
		<reference ref_id="CVE-2022-49722" ref_url="https://www.suse.com/security/cve/CVE-2022-49722/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6460.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6460.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49557/">CVE-2022-49557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49557">CVE-2022-49557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49722/">CVE-2022-49722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49722">CVE-2022-49722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840742" comment="bpftool-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840743" comment="kernel-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840744" comment="kernel-abi-stablelists-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840745" comment="kernel-core-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840746" comment="kernel-cross-headers-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840747" comment="kernel-debug-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840748" comment="kernel-debug-core-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840750" comment="kernel-debug-modules-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840751" comment="kernel-debug-modules-extra-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840753" comment="kernel-doc-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840754" comment="kernel-headers-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840755" comment="kernel-modules-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840756" comment="kernel-modules-extra-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840757" comment="kernel-tools-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840758" comment="kernel-tools-libs-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840760" comment="perf-4.18.0-372.26.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840761" comment="python3-perf-4.18.0-372.26.1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2444" version="1" class="patch">
	<metadata>
		<title>security update for gnupg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6463.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6463.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840762" comment="gnupg2-2.2.20-3.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840763" comment="gnupg2-smime-2.2.20-3.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2445" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-38013" ref_url="https://www.suse.com/security/cve/CVE-2022-38013/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6523.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6523.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38013/">CVE-2022-38013 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38013">CVE-2022-38013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840764" comment="aspnetcore-runtime-3.1-3.1.29-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840765" comment="aspnetcore-targeting-pack-3.1-3.1.29-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840766" comment="dotnet-apphost-pack-3.1-3.1.29-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840767" comment="dotnet-hostfxr-3.1-3.1.29-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840768" comment="dotnet-runtime-3.1-3.1.29-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840769" comment="dotnet-sdk-3.1-3.1.423-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840770" comment="dotnet-sdk-3.1-source-built-artifacts-3.1.423-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840771" comment="dotnet-targeting-pack-3.1-3.1.29-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840772" comment="dotnet-templates-3.1-3.1.423-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2446" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-38013" ref_url="https://www.suse.com/security/cve/CVE-2022-38013/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6539.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6539.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38013/">CVE-2022-38013 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38013">CVE-2022-38013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840773" comment="aspnetcore-runtime-6.0-6.0.9-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840774" comment="aspnetcore-targeting-pack-6.0-6.0.9-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840775" comment="dotnet-6.0.109-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840776" comment="dotnet-apphost-pack-6.0-6.0.9-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840777" comment="dotnet-host-6.0.9-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840778" comment="dotnet-hostfxr-6.0-6.0.9-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840779" comment="dotnet-runtime-6.0-6.0.9-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840780" comment="dotnet-sdk-6.0-6.0.109-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840781" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840782" comment="dotnet-targeting-pack-6.0-6.0.9-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840783" comment="dotnet-templates-6.0-6.0.109-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840784" comment="netstandard-targeting-pack-2.1-6.0.109-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2447" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32893" ref_url="https://www.suse.com/security/cve/CVE-2022-32893/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6540.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6540.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32893/">CVE-2022-32893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32893">CVE-2022-32893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840785" comment="webkit2gtk3-2.36.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840786" comment="webkit2gtk3-devel-2.36.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840787" comment="webkit2gtk3-jsc-2.36.7-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840788" comment="webkit2gtk3-jsc-devel-2.36.7-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2448" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28948" ref_url="https://www.suse.com/security/cve/CVE-2020-28948/" source="CVE"/>
		<reference ref_id="CVE-2020-28949" ref_url="https://www.suse.com/security/cve/CVE-2020-28949/" source="CVE"/>
		<reference ref_id="CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6542.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6542.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28948/">CVE-2020-28948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28948">CVE-2020-28948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28949/">CVE-2020-28949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28949">CVE-2020-28949 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36193">CVE-2020-36193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838070" comment="apcu-panel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838071" comment="libzip-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838072" comment="libzip-devel-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838073" comment="libzip-tools-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840607" comment="php-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840608" comment="php-bcmath-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840609" comment="php-cli-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840610" comment="php-common-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840611" comment="php-dba-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840612" comment="php-dbg-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840613" comment="php-devel-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840614" comment="php-embedded-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840615" comment="php-enchant-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840616" comment="php-ffi-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840617" comment="php-fpm-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840618" comment="php-gd-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840619" comment="php-gmp-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840620" comment="php-intl-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840621" comment="php-json-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840622" comment="php-ldap-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840623" comment="php-mbstring-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840624" comment="php-mysqlnd-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840625" comment="php-odbc-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840626" comment="php-opcache-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840627" comment="php-pdo-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840789" comment="php-pear-1.10.13-1.module+el8.6.0+16577+0788886f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838096" comment="php-pecl-apcu-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838097" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838098" comment="php-pecl-rrd-2.0.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838099" comment="php-pecl-xdebug-2.9.5-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838100" comment="php-pecl-zip-1.18.2-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840628" comment="php-pgsql-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840629" comment="php-process-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840630" comment="php-snmp-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840631" comment="php-soap-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840632" comment="php-xml-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840633" comment="php-xmlrpc-7.4.19-4.module+el8.6.0+16316+906f6c6d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2449" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3266">CVE-2022-3266 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840790" comment="firefox-102.3.0-6.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2450" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3032" ref_url="https://www.suse.com/security/cve/CVE-2022-3032/" source="CVE"/>
		<reference ref_id="CVE-2022-3033" ref_url="https://www.suse.com/security/cve/CVE-2022-3033/" source="CVE"/>
		<reference ref_id="CVE-2022-3034" ref_url="https://www.suse.com/security/cve/CVE-2022-3034/" source="CVE"/>
		<reference ref_id="CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266/" source="CVE"/>
		<reference ref_id="CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6708.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6708.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3032/">CVE-2022-3032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3032">CVE-2022-3032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3033/">CVE-2022-3033 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3033">CVE-2022-3033 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3034/">CVE-2022-3034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3034">CVE-2022-3034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3266">CVE-2022-3266 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36059">CVE-2022-36059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840791" comment="thunderbird-102.3.0-3.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2451" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6775.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6775.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009832711" comment="libecap-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832712" comment="libecap-devel-1.0.1-2.module+el8.1.0+4044+36416a77 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840792" comment="squid-4.15-3.module+el8.6.0+16749+7b6feaf0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2452" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<reference ref_id="CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6778.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6778.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840793" comment="bind-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840794" comment="bind-chroot-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840795" comment="bind-devel-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840796" comment="bind-export-devel-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840797" comment="bind-export-libs-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840798" comment="bind-libs-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840799" comment="bind-libs-lite-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840800" comment="bind-license-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840801" comment="bind-lite-devel-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840802" comment="bind-pkcs11-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840803" comment="bind-pkcs11-devel-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840804" comment="bind-pkcs11-libs-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840805" comment="bind-pkcs11-utils-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840806" comment="bind-sdb-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840807" comment="bind-sdb-chroot-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840808" comment="bind-utils-9.11.36-3.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840809" comment="python3-bind-9.11.36-3.el8_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2453" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3080" ref_url="https://www.suse.com/security/cve/CVE-2022-3080/" source="CVE"/>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<reference ref_id="CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6781.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6781.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3080/">CVE-2022-3080 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3080">CVE-2022-3080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840810" comment="bind9.16-9.16.23-0.7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840811" comment="bind9.16-chroot-9.16.23-0.7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840812" comment="bind9.16-devel-9.16.23-0.7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840813" comment="bind9.16-dnssec-utils-9.16.23-0.7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840814" comment="bind9.16-doc-9.16.23-0.7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840815" comment="bind9.16-libs-9.16.23-0.7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840816" comment="bind9.16-license-9.16.23-0.7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840817" comment="bind9.16-utils-9.16.23-0.7.el8_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840818" comment="python3-bind9.16-9.16.23-0.7.el8_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2454" version="1" class="patch">
	<metadata>
		<title>security update for prometheus-jmx-exporter (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-25857" ref_url="https://www.suse.com/security/cve/CVE-2022-25857/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6820.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6820.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25857/">CVE-2022-25857 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25857">CVE-2022-25857 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840819" comment="prometheus-jmx-exporter-0.12.0-8.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840820" comment="prometheus-jmx-exporter-openjdk11-0.12.0-8.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2455" version="1" class="patch">
	<metadata>
		<title>security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6878.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6878.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840821" comment="expat-2.2.5-8.el8_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840822" comment="expat-devel-2.2.5-8.el8_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2456" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41032" ref_url="https://www.suse.com/security/cve/CVE-2022-41032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6911.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6911.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41032/">CVE-2022-41032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41032">CVE-2022-41032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840823" comment="aspnetcore-runtime-6.0-6.0.10-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840824" comment="aspnetcore-targeting-pack-6.0-6.0.10-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840825" comment="dotnet-6.0.110-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840826" comment="dotnet-apphost-pack-6.0-6.0.10-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840827" comment="dotnet-host-6.0.10-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840828" comment="dotnet-hostfxr-6.0-6.0.10-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840829" comment="dotnet-runtime-6.0-6.0.10-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840830" comment="dotnet-sdk-6.0-6.0.110-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840831" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840832" comment="dotnet-targeting-pack-6.0-6.0.10-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840833" comment="dotnet-templates-6.0-6.0.110-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840834" comment="netstandard-targeting-pack-2.1-6.0.110-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2457" version="1" class="patch">
	<metadata>
		<title>security update for dotnet3.1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41032" ref_url="https://www.suse.com/security/cve/CVE-2022-41032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6912.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6912.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41032/">CVE-2022-41032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41032">CVE-2022-41032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840835" comment="aspnetcore-runtime-3.1-3.1.30-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840836" comment="aspnetcore-targeting-pack-3.1-3.1.30-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840837" comment="dotnet-apphost-pack-3.1-3.1.30-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840838" comment="dotnet-hostfxr-3.1-3.1.30-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840839" comment="dotnet-runtime-3.1-3.1.30-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840840" comment="dotnet-sdk-3.1-3.1.424-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840841" comment="dotnet-sdk-3.1-source-built-artifacts-3.1.424-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840842" comment="dotnet-targeting-pack-3.1-3.1.30-1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840843" comment="dotnet-templates-3.1-3.1.424-1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2458" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-35255" ref_url="https://www.suse.com/security/cve/CVE-2022-35255/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6964.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6964.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35255/">CVE-2022-35255 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35255">CVE-2022-35255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840844" comment="nodejs-16.17.1-1.module+el8.6.0+16848+a483195a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840845" comment="nodejs-devel-16.17.1-1.module+el8.6.0+16848+a483195a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840846" comment="nodejs-docs-16.17.1-1.module+el8.6.0+16848+a483195a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840847" comment="nodejs-full-i18n-16.17.1-1.module+el8.6.0+16848+a483195a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840705" comment="nodejs-nodemon-2.0.19-2.module+el8.6.0+16240+7ca51420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838910" comment="nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840848" comment="npm-8.15.0-1.16.17.1.1.module+el8.6.0+16848+a483195a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2459" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7000.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7000.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840849" comment="java-17-openjdk-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840850" comment="java-17-openjdk-demo-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840851" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840852" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840853" comment="java-17-openjdk-devel-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840854" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840855" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840856" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840857" comment="java-17-openjdk-headless-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840858" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840859" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840860" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840861" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840862" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840863" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840864" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840865" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840866" comment="java-17-openjdk-src-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840867" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840868" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840869" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840870" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840871" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2460" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7006.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7006.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840872" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840873" comment="java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840874" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840875" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840876" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840877" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840878" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840879" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840880" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840881" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840882" comment="java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840883" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840884" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840885" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840886" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840887" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840888" comment="java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840889" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840890" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840891" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2461" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7012.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7012.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840892" comment="java-11-openjdk-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840893" comment="java-11-openjdk-demo-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840894" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840895" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840896" comment="java-11-openjdk-devel-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840897" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840898" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840899" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840900" comment="java-11-openjdk-headless-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840901" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840902" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840903" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840904" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840905" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840906" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840907" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840908" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840909" comment="java-11-openjdk-src-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840910" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840911" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840912" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840913" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840914" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2462" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7023.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7023.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840915" comment="thunderbird-102.3.0-4.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2463" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840916" comment="firefox-102.3.0-7.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2464" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7070.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7070.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840917" comment="firefox-102.4.0-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2465" version="1" class="patch">
	<metadata>
		<title>security update for libksba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7089.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7089.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840918" comment="libksba-1.3.5-8.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840919" comment="libksba-devel-1.3.5-8.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2466" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2509" ref_url="https://www.suse.com/security/cve/CVE-2022-2509/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7105.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7105.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2509/">CVE-2022-2509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840920" comment="gnutls-3.6.16-5.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840921" comment="gnutls-c++-3.6.16-5.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840922" comment="gnutls-dane-3.6.16-5.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840923" comment="gnutls-devel-3.6.16-5.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840924" comment="gnutls-utils-3.6.16-5.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2467" version="1" class="patch">
	<metadata>
		<title>security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7106.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7106.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840925" comment="zlib-1.2.11-19.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840926" comment="zlib-devel-1.2.11-19.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840927" comment="zlib-static-1.2.11-19.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2468" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-35525" ref_url="https://www.suse.com/security/cve/CVE-2020-35525/" source="CVE"/>
		<reference ref_id="CVE-2020-35527" ref_url="https://www.suse.com/security/cve/CVE-2020-35527/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7108.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7108.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35525/">CVE-2020-35525 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35525">CVE-2020-35525 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35527/">CVE-2020-35527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35527">CVE-2020-35527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840928" comment="lemon-3.26.0-16.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840929" comment="sqlite-3.26.0-16.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840930" comment="sqlite-devel-3.26.0-16.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840931" comment="sqlite-doc-3.26.0-16.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840932" comment="sqlite-libs-3.26.0-16.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2469" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0494" ref_url="https://www.suse.com/security/cve/CVE-2022-0494/" source="CVE"/>
		<reference ref_id="CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353/" source="CVE"/>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<reference ref_id="CVE-2022-49610" ref_url="https://www.suse.com/security/cve/CVE-2022-49610/" source="CVE"/>
		<reference ref_id="CVE-2022-49611" ref_url="https://www.suse.com/security/cve/CVE-2022-49611/" source="CVE"/>
		<reference ref_id="CVE-2022-50053" ref_url="https://www.suse.com/security/cve/CVE-2022-50053/" source="CVE"/>
		<reference ref_id="CVE-2022-50054" ref_url="https://www.suse.com/security/cve/CVE-2022-50054/" source="CVE"/>
		<reference ref_id="CVE-2022-50055" ref_url="https://www.suse.com/security/cve/CVE-2022-50055/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0494/">CVE-2022-0494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28693">CVE-2022-28693 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2022-49610/">CVE-2022-49610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49610">CVE-2022-49610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49611/">CVE-2022-49611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49611">CVE-2022-49611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50053/">CVE-2022-50053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50053">CVE-2022-50053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50054/">CVE-2022-50054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50054">CVE-2022-50054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50055/">CVE-2022-50055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50055">CVE-2022-50055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840933" comment="bpftool-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840934" comment="kernel-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840935" comment="kernel-abi-stablelists-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840936" comment="kernel-core-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840937" comment="kernel-cross-headers-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840938" comment="kernel-debug-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840939" comment="kernel-debug-core-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840941" comment="kernel-debug-modules-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840942" comment="kernel-debug-modules-extra-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840944" comment="kernel-doc-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840945" comment="kernel-headers-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840946" comment="kernel-modules-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840947" comment="kernel-modules-extra-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840948" comment="kernel-tools-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840949" comment="kernel-tools-libs-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840951" comment="perf-4.18.0-372.32.1.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840952" comment="python3-perf-4.18.0-372.32.1.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2470" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840953" comment="ctdb-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840954" comment="libsmbclient-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840955" comment="libsmbclient-devel-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840956" comment="libwbclient-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840957" comment="libwbclient-devel-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840958" comment="python3-samba-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840959" comment="python3-samba-test-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840960" comment="samba-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840961" comment="samba-client-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840962" comment="samba-client-libs-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840963" comment="samba-common-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840964" comment="samba-common-libs-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840965" comment="samba-common-tools-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840966" comment="samba-devel-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840967" comment="samba-krb5-printing-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840968" comment="samba-libs-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840969" comment="samba-pidl-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840970" comment="samba-test-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840971" comment="samba-test-libs-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840972" comment="samba-vfs-iouring-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840973" comment="samba-winbind-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840974" comment="samba-winbind-clients-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840975" comment="samba-winbind-krb5-locator-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840976" comment="samba-winbind-modules-4.15.5-10.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840977" comment="samba-winexe-4.15.5-10.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2471" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-2478" ref_url="https://www.suse.com/security/cve/CVE-2021-2478/" source="CVE"/>
		<reference ref_id="CVE-2021-2479" ref_url="https://www.suse.com/security/cve/CVE-2021-2479/" source="CVE"/>
		<reference ref_id="CVE-2021-2481" ref_url="https://www.suse.com/security/cve/CVE-2021-2481/" source="CVE"/>
		<reference ref_id="CVE-2021-35546" ref_url="https://www.suse.com/security/cve/CVE-2021-35546/" source="CVE"/>
		<reference ref_id="CVE-2021-35575" ref_url="https://www.suse.com/security/cve/CVE-2021-35575/" source="CVE"/>
		<reference ref_id="CVE-2021-35577" ref_url="https://www.suse.com/security/cve/CVE-2021-35577/" source="CVE"/>
		<reference ref_id="CVE-2021-35591" ref_url="https://www.suse.com/security/cve/CVE-2021-35591/" source="CVE"/>
		<reference ref_id="CVE-2021-35596" ref_url="https://www.suse.com/security/cve/CVE-2021-35596/" source="CVE"/>
		<reference ref_id="CVE-2021-35597" ref_url="https://www.suse.com/security/cve/CVE-2021-35597/" source="CVE"/>
		<reference ref_id="CVE-2021-35602" ref_url="https://www.suse.com/security/cve/CVE-2021-35602/" source="CVE"/>
		<reference ref_id="CVE-2021-35604" ref_url="https://www.suse.com/security/cve/CVE-2021-35604/" source="CVE"/>
		<reference ref_id="CVE-2021-35607" ref_url="https://www.suse.com/security/cve/CVE-2021-35607/" source="CVE"/>
		<reference ref_id="CVE-2021-35608" ref_url="https://www.suse.com/security/cve/CVE-2021-35608/" source="CVE"/>
		<reference ref_id="CVE-2021-35610" ref_url="https://www.suse.com/security/cve/CVE-2021-35610/" source="CVE"/>
		<reference ref_id="CVE-2021-35612" ref_url="https://www.suse.com/security/cve/CVE-2021-35612/" source="CVE"/>
		<reference ref_id="CVE-2021-35622" ref_url="https://www.suse.com/security/cve/CVE-2021-35622/" source="CVE"/>
		<reference ref_id="CVE-2021-35623" ref_url="https://www.suse.com/security/cve/CVE-2021-35623/" source="CVE"/>
		<reference ref_id="CVE-2021-35624" ref_url="https://www.suse.com/security/cve/CVE-2021-35624/" source="CVE"/>
		<reference ref_id="CVE-2021-35625" ref_url="https://www.suse.com/security/cve/CVE-2021-35625/" source="CVE"/>
		<reference ref_id="CVE-2021-35626" ref_url="https://www.suse.com/security/cve/CVE-2021-35626/" source="CVE"/>
		<reference ref_id="CVE-2021-35627" ref_url="https://www.suse.com/security/cve/CVE-2021-35627/" source="CVE"/>
		<reference ref_id="CVE-2021-35628" ref_url="https://www.suse.com/security/cve/CVE-2021-35628/" source="CVE"/>
		<reference ref_id="CVE-2021-35630" ref_url="https://www.suse.com/security/cve/CVE-2021-35630/" source="CVE"/>
		<reference ref_id="CVE-2021-35631" ref_url="https://www.suse.com/security/cve/CVE-2021-35631/" source="CVE"/>
		<reference ref_id="CVE-2021-35632" ref_url="https://www.suse.com/security/cve/CVE-2021-35632/" source="CVE"/>
		<reference ref_id="CVE-2021-35633" ref_url="https://www.suse.com/security/cve/CVE-2021-35633/" source="CVE"/>
		<reference ref_id="CVE-2021-35634" ref_url="https://www.suse.com/security/cve/CVE-2021-35634/" source="CVE"/>
		<reference ref_id="CVE-2021-35635" ref_url="https://www.suse.com/security/cve/CVE-2021-35635/" source="CVE"/>
		<reference ref_id="CVE-2021-35636" ref_url="https://www.suse.com/security/cve/CVE-2021-35636/" source="CVE"/>
		<reference ref_id="CVE-2021-35637" ref_url="https://www.suse.com/security/cve/CVE-2021-35637/" source="CVE"/>
		<reference ref_id="CVE-2021-35638" ref_url="https://www.suse.com/security/cve/CVE-2021-35638/" source="CVE"/>
		<reference ref_id="CVE-2021-35639" ref_url="https://www.suse.com/security/cve/CVE-2021-35639/" source="CVE"/>
		<reference ref_id="CVE-2021-35640" ref_url="https://www.suse.com/security/cve/CVE-2021-35640/" source="CVE"/>
		<reference ref_id="CVE-2021-35641" ref_url="https://www.suse.com/security/cve/CVE-2021-35641/" source="CVE"/>
		<reference ref_id="CVE-2021-35642" ref_url="https://www.suse.com/security/cve/CVE-2021-35642/" source="CVE"/>
		<reference ref_id="CVE-2021-35643" ref_url="https://www.suse.com/security/cve/CVE-2021-35643/" source="CVE"/>
		<reference ref_id="CVE-2021-35644" ref_url="https://www.suse.com/security/cve/CVE-2021-35644/" source="CVE"/>
		<reference ref_id="CVE-2021-35645" ref_url="https://www.suse.com/security/cve/CVE-2021-35645/" source="CVE"/>
		<reference ref_id="CVE-2021-35646" ref_url="https://www.suse.com/security/cve/CVE-2021-35646/" source="CVE"/>
		<reference ref_id="CVE-2021-35647" ref_url="https://www.suse.com/security/cve/CVE-2021-35647/" source="CVE"/>
		<reference ref_id="CVE-2021-35648" ref_url="https://www.suse.com/security/cve/CVE-2021-35648/" source="CVE"/>
		<reference ref_id="CVE-2022-21245" ref_url="https://www.suse.com/security/cve/CVE-2022-21245/" source="CVE"/>
		<reference ref_id="CVE-2022-21249" ref_url="https://www.suse.com/security/cve/CVE-2022-21249/" source="CVE"/>
		<reference ref_id="CVE-2022-21253" ref_url="https://www.suse.com/security/cve/CVE-2022-21253/" source="CVE"/>
		<reference ref_id="CVE-2022-21254" ref_url="https://www.suse.com/security/cve/CVE-2022-21254/" source="CVE"/>
		<reference ref_id="CVE-2022-21256" ref_url="https://www.suse.com/security/cve/CVE-2022-21256/" source="CVE"/>
		<reference ref_id="CVE-2022-21264" ref_url="https://www.suse.com/security/cve/CVE-2022-21264/" source="CVE"/>
		<reference ref_id="CVE-2022-21265" ref_url="https://www.suse.com/security/cve/CVE-2022-21265/" source="CVE"/>
		<reference ref_id="CVE-2022-21270" ref_url="https://www.suse.com/security/cve/CVE-2022-21270/" source="CVE"/>
		<reference ref_id="CVE-2022-21278" ref_url="https://www.suse.com/security/cve/CVE-2022-21278/" source="CVE"/>
		<reference ref_id="CVE-2022-21297" ref_url="https://www.suse.com/security/cve/CVE-2022-21297/" source="CVE"/>
		<reference ref_id="CVE-2022-21301" ref_url="https://www.suse.com/security/cve/CVE-2022-21301/" source="CVE"/>
		<reference ref_id="CVE-2022-21302" ref_url="https://www.suse.com/security/cve/CVE-2022-21302/" source="CVE"/>
		<reference ref_id="CVE-2022-21303" ref_url="https://www.suse.com/security/cve/CVE-2022-21303/" source="CVE"/>
		<reference ref_id="CVE-2022-21304" ref_url="https://www.suse.com/security/cve/CVE-2022-21304/" source="CVE"/>
		<reference ref_id="CVE-2022-21339" ref_url="https://www.suse.com/security/cve/CVE-2022-21339/" source="CVE"/>
		<reference ref_id="CVE-2022-21342" ref_url="https://www.suse.com/security/cve/CVE-2022-21342/" source="CVE"/>
		<reference ref_id="CVE-2022-21344" ref_url="https://www.suse.com/security/cve/CVE-2022-21344/" source="CVE"/>
		<reference ref_id="CVE-2022-21348" ref_url="https://www.suse.com/security/cve/CVE-2022-21348/" source="CVE"/>
		<reference ref_id="CVE-2022-21351" ref_url="https://www.suse.com/security/cve/CVE-2022-21351/" source="CVE"/>
		<reference ref_id="CVE-2022-21352" ref_url="https://www.suse.com/security/cve/CVE-2022-21352/" source="CVE"/>
		<reference ref_id="CVE-2022-21358" ref_url="https://www.suse.com/security/cve/CVE-2022-21358/" source="CVE"/>
		<reference ref_id="CVE-2022-21362" ref_url="https://www.suse.com/security/cve/CVE-2022-21362/" source="CVE"/>
		<reference ref_id="CVE-2022-21367" ref_url="https://www.suse.com/security/cve/CVE-2022-21367/" source="CVE"/>
		<reference ref_id="CVE-2022-21368" ref_url="https://www.suse.com/security/cve/CVE-2022-21368/" source="CVE"/>
		<reference ref_id="CVE-2022-21370" ref_url="https://www.suse.com/security/cve/CVE-2022-21370/" source="CVE"/>
		<reference ref_id="CVE-2022-21372" ref_url="https://www.suse.com/security/cve/CVE-2022-21372/" source="CVE"/>
		<reference ref_id="CVE-2022-21374" ref_url="https://www.suse.com/security/cve/CVE-2022-21374/" source="CVE"/>
		<reference ref_id="CVE-2022-21378" ref_url="https://www.suse.com/security/cve/CVE-2022-21378/" source="CVE"/>
		<reference ref_id="CVE-2022-21379" ref_url="https://www.suse.com/security/cve/CVE-2022-21379/" source="CVE"/>
		<reference ref_id="CVE-2022-21412" ref_url="https://www.suse.com/security/cve/CVE-2022-21412/" source="CVE"/>
		<reference ref_id="CVE-2022-21413" ref_url="https://www.suse.com/security/cve/CVE-2022-21413/" source="CVE"/>
		<reference ref_id="CVE-2022-21414" ref_url="https://www.suse.com/security/cve/CVE-2022-21414/" source="CVE"/>
		<reference ref_id="CVE-2022-21415" ref_url="https://www.suse.com/security/cve/CVE-2022-21415/" source="CVE"/>
		<reference ref_id="CVE-2022-21417" ref_url="https://www.suse.com/security/cve/CVE-2022-21417/" source="CVE"/>
		<reference ref_id="CVE-2022-21418" ref_url="https://www.suse.com/security/cve/CVE-2022-21418/" source="CVE"/>
		<reference ref_id="CVE-2022-21423" ref_url="https://www.suse.com/security/cve/CVE-2022-21423/" source="CVE"/>
		<reference ref_id="CVE-2022-21425" ref_url="https://www.suse.com/security/cve/CVE-2022-21425/" source="CVE"/>
		<reference ref_id="CVE-2022-21427" ref_url="https://www.suse.com/security/cve/CVE-2022-21427/" source="CVE"/>
		<reference ref_id="CVE-2022-21435" ref_url="https://www.suse.com/security/cve/CVE-2022-21435/" source="CVE"/>
		<reference ref_id="CVE-2022-21436" ref_url="https://www.suse.com/security/cve/CVE-2022-21436/" source="CVE"/>
		<reference ref_id="CVE-2022-21437" ref_url="https://www.suse.com/security/cve/CVE-2022-21437/" source="CVE"/>
		<reference ref_id="CVE-2022-21438" ref_url="https://www.suse.com/security/cve/CVE-2022-21438/" source="CVE"/>
		<reference ref_id="CVE-2022-21440" ref_url="https://www.suse.com/security/cve/CVE-2022-21440/" source="CVE"/>
		<reference ref_id="CVE-2022-21444" ref_url="https://www.suse.com/security/cve/CVE-2022-21444/" source="CVE"/>
		<reference ref_id="CVE-2022-21451" ref_url="https://www.suse.com/security/cve/CVE-2022-21451/" source="CVE"/>
		<reference ref_id="CVE-2022-21452" ref_url="https://www.suse.com/security/cve/CVE-2022-21452/" source="CVE"/>
		<reference ref_id="CVE-2022-21454" ref_url="https://www.suse.com/security/cve/CVE-2022-21454/" source="CVE"/>
		<reference ref_id="CVE-2022-21455" ref_url="https://www.suse.com/security/cve/CVE-2022-21455/" source="CVE"/>
		<reference ref_id="CVE-2022-21457" ref_url="https://www.suse.com/security/cve/CVE-2022-21457/" source="CVE"/>
		<reference ref_id="CVE-2022-21459" ref_url="https://www.suse.com/security/cve/CVE-2022-21459/" source="CVE"/>
		<reference ref_id="CVE-2022-21460" ref_url="https://www.suse.com/security/cve/CVE-2022-21460/" source="CVE"/>
		<reference ref_id="CVE-2022-21462" ref_url="https://www.suse.com/security/cve/CVE-2022-21462/" source="CVE"/>
		<reference ref_id="CVE-2022-21478" ref_url="https://www.suse.com/security/cve/CVE-2022-21478/" source="CVE"/>
		<reference ref_id="CVE-2022-21479" ref_url="https://www.suse.com/security/cve/CVE-2022-21479/" source="CVE"/>
		<reference ref_id="CVE-2022-21509" ref_url="https://www.suse.com/security/cve/CVE-2022-21509/" source="CVE"/>
		<reference ref_id="CVE-2022-21515" ref_url="https://www.suse.com/security/cve/CVE-2022-21515/" source="CVE"/>
		<reference ref_id="CVE-2022-21517" ref_url="https://www.suse.com/security/cve/CVE-2022-21517/" source="CVE"/>
		<reference ref_id="CVE-2022-21522" ref_url="https://www.suse.com/security/cve/CVE-2022-21522/" source="CVE"/>
		<reference ref_id="CVE-2022-21525" ref_url="https://www.suse.com/security/cve/CVE-2022-21525/" source="CVE"/>
		<reference ref_id="CVE-2022-21526" ref_url="https://www.suse.com/security/cve/CVE-2022-21526/" source="CVE"/>
		<reference ref_id="CVE-2022-21527" ref_url="https://www.suse.com/security/cve/CVE-2022-21527/" source="CVE"/>
		<reference ref_id="CVE-2022-21528" ref_url="https://www.suse.com/security/cve/CVE-2022-21528/" source="CVE"/>
		<reference ref_id="CVE-2022-21529" ref_url="https://www.suse.com/security/cve/CVE-2022-21529/" source="CVE"/>
		<reference ref_id="CVE-2022-21530" ref_url="https://www.suse.com/security/cve/CVE-2022-21530/" source="CVE"/>
		<reference ref_id="CVE-2022-21531" ref_url="https://www.suse.com/security/cve/CVE-2022-21531/" source="CVE"/>
		<reference ref_id="CVE-2022-21534" ref_url="https://www.suse.com/security/cve/CVE-2022-21534/" source="CVE"/>
		<reference ref_id="CVE-2022-21537" ref_url="https://www.suse.com/security/cve/CVE-2022-21537/" source="CVE"/>
		<reference ref_id="CVE-2022-21538" ref_url="https://www.suse.com/security/cve/CVE-2022-21538/" source="CVE"/>
		<reference ref_id="CVE-2022-21539" ref_url="https://www.suse.com/security/cve/CVE-2022-21539/" source="CVE"/>
		<reference ref_id="CVE-2022-21547" ref_url="https://www.suse.com/security/cve/CVE-2022-21547/" source="CVE"/>
		<reference ref_id="CVE-2022-21553" ref_url="https://www.suse.com/security/cve/CVE-2022-21553/" source="CVE"/>
		<reference ref_id="CVE-2022-21556" ref_url="https://www.suse.com/security/cve/CVE-2022-21556/" source="CVE"/>
		<reference ref_id="CVE-2022-21569" ref_url="https://www.suse.com/security/cve/CVE-2022-21569/" source="CVE"/>
		<reference ref_id="CVE-2022-21592" ref_url="https://www.suse.com/security/cve/CVE-2022-21592/" source="CVE"/>
		<reference ref_id="CVE-2022-21595" ref_url="https://www.suse.com/security/cve/CVE-2022-21595/" source="CVE"/>
		<reference ref_id="CVE-2022-21600" ref_url="https://www.suse.com/security/cve/CVE-2022-21600/" source="CVE"/>
		<reference ref_id="CVE-2022-21605" ref_url="https://www.suse.com/security/cve/CVE-2022-21605/" source="CVE"/>
		<reference ref_id="CVE-2022-21607" ref_url="https://www.suse.com/security/cve/CVE-2022-21607/" source="CVE"/>
		<reference ref_id="CVE-2022-21635" ref_url="https://www.suse.com/security/cve/CVE-2022-21635/" source="CVE"/>
		<reference ref_id="CVE-2022-21638" ref_url="https://www.suse.com/security/cve/CVE-2022-21638/" source="CVE"/>
		<reference ref_id="CVE-2022-21641" ref_url="https://www.suse.com/security/cve/CVE-2022-21641/" source="CVE"/>
		<reference ref_id="CVE-2023-21866" ref_url="https://www.suse.com/security/cve/CVE-2023-21866/" source="CVE"/>
		<reference ref_id="CVE-2023-21872" ref_url="https://www.suse.com/security/cve/CVE-2023-21872/" source="CVE"/>
		<reference ref_id="CVE-2023-21950" ref_url="https://www.suse.com/security/cve/CVE-2023-21950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7119.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7119.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2478/">CVE-2021-2478 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2478">CVE-2021-2478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2479/">CVE-2021-2479 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2479">CVE-2021-2479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2481/">CVE-2021-2481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2481">CVE-2021-2481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35546/">CVE-2021-35546 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35546">CVE-2021-35546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35575/">CVE-2021-35575 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35575">CVE-2021-35575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35577/">CVE-2021-35577 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35577">CVE-2021-35577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35591/">CVE-2021-35591 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35591">CVE-2021-35591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35596/">CVE-2021-35596 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35596">CVE-2021-35596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35597/">CVE-2021-35597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35597">CVE-2021-35597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35602/">CVE-2021-35602 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35602">CVE-2021-35602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-35604/">CVE-2021-35604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35604">CVE-2021-35604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35607/">CVE-2021-35607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35607">CVE-2021-35607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35608/">CVE-2021-35608 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35608">CVE-2021-35608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35610/">CVE-2021-35610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35610">CVE-2021-35610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35612/">CVE-2021-35612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35612">CVE-2021-35612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35622/">CVE-2021-35622 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35622">CVE-2021-35622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35623/">CVE-2021-35623 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35623">CVE-2021-35623 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35624/">CVE-2021-35624 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35624">CVE-2021-35624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35625/">CVE-2021-35625 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35625">CVE-2021-35625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35626/">CVE-2021-35626 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35626">CVE-2021-35626 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35627/">CVE-2021-35627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35627">CVE-2021-35627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35628/">CVE-2021-35628 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35628">CVE-2021-35628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35630/">CVE-2021-35630 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35630">CVE-2021-35630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35631/">CVE-2021-35631 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35631">CVE-2021-35631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35632/">CVE-2021-35632 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35632">CVE-2021-35632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35633/">CVE-2021-35633 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35633">CVE-2021-35633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35634/">CVE-2021-35634 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35634">CVE-2021-35634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35635/">CVE-2021-35635 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35635">CVE-2021-35635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35636/">CVE-2021-35636 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35636">CVE-2021-35636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35637/">CVE-2021-35637 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35637">CVE-2021-35637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35638/">CVE-2021-35638 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35638">CVE-2021-35638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35639/">CVE-2021-35639 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35639">CVE-2021-35639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35640/">CVE-2021-35640 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35640">CVE-2021-35640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35641/">CVE-2021-35641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35641">CVE-2021-35641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35642/">CVE-2021-35642 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35642">CVE-2021-35642 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35643/">CVE-2021-35643 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35643">CVE-2021-35643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35644/">CVE-2021-35644 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35644">CVE-2021-35644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35645/">CVE-2021-35645 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35645">CVE-2021-35645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35646/">CVE-2021-35646 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35646">CVE-2021-35646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35647/">CVE-2021-35647 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35647">CVE-2021-35647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35648/">CVE-2021-35648 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35648">CVE-2021-35648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21245/">CVE-2022-21245 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21245">CVE-2022-21245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21249/">CVE-2022-21249 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21249">CVE-2022-21249 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21253/">CVE-2022-21253 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21253">CVE-2022-21253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21254/">CVE-2022-21254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21254">CVE-2022-21254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21256/">CVE-2022-21256 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21256">CVE-2022-21256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21264/">CVE-2022-21264 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21264">CVE-2022-21264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21265/">CVE-2022-21265 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21265">CVE-2022-21265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21270/">CVE-2022-21270 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21270">CVE-2022-21270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21278/">CVE-2022-21278 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21278">CVE-2022-21278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21297/">CVE-2022-21297 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21297">CVE-2022-21297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21301/">CVE-2022-21301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21301">CVE-2022-21301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21302/">CVE-2022-21302 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21302">CVE-2022-21302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21303/">CVE-2022-21303 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21303">CVE-2022-21303 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21304/">CVE-2022-21304 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21304">CVE-2022-21304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21339/">CVE-2022-21339 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21339">CVE-2022-21339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21342/">CVE-2022-21342 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21342">CVE-2022-21342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21344/">CVE-2022-21344 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21344">CVE-2022-21344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21348/">CVE-2022-21348 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21348">CVE-2022-21348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21351/">CVE-2022-21351 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21351">CVE-2022-21351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21352/">CVE-2022-21352 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21352">CVE-2022-21352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21358/">CVE-2022-21358 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21358">CVE-2022-21358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21362/">CVE-2022-21362 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21362">CVE-2022-21362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21367/">CVE-2022-21367 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21367">CVE-2022-21367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21368/">CVE-2022-21368 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21368">CVE-2022-21368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21370/">CVE-2022-21370 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21370">CVE-2022-21370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21372/">CVE-2022-21372 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21372">CVE-2022-21372 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21374/">CVE-2022-21374 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21374">CVE-2022-21374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21378/">CVE-2022-21378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21378">CVE-2022-21378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21379/">CVE-2022-21379 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21379">CVE-2022-21379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21412/">CVE-2022-21412 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21412">CVE-2022-21412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21413/">CVE-2022-21413 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21413">CVE-2022-21413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21414/">CVE-2022-21414 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21414">CVE-2022-21414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21415/">CVE-2022-21415 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21415">CVE-2022-21415 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21417/">CVE-2022-21417 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21417">CVE-2022-21417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21418/">CVE-2022-21418 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21418">CVE-2022-21418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21423/">CVE-2022-21423 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21423">CVE-2022-21423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21425/">CVE-2022-21425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21425">CVE-2022-21425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21427/">CVE-2022-21427 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21427">CVE-2022-21427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21435/">CVE-2022-21435 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21435">CVE-2022-21435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21436/">CVE-2022-21436 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21436">CVE-2022-21436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21437/">CVE-2022-21437 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21437">CVE-2022-21437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21438/">CVE-2022-21438 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21438">CVE-2022-21438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21440/">CVE-2022-21440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21440">CVE-2022-21440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21444/">CVE-2022-21444 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21444">CVE-2022-21444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21451/">CVE-2022-21451 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21451">CVE-2022-21451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21452/">CVE-2022-21452 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21452">CVE-2022-21452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21454/">CVE-2022-21454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21454">CVE-2022-21454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21455/">CVE-2022-21455 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21455">CVE-2022-21455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21457/">CVE-2022-21457 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21457">CVE-2022-21457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21459/">CVE-2022-21459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21459">CVE-2022-21459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21460/">CVE-2022-21460 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21460">CVE-2022-21460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21462/">CVE-2022-21462 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21462">CVE-2022-21462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21478/">CVE-2022-21478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21478">CVE-2022-21478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21479/">CVE-2022-21479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21479">CVE-2022-21479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21509/">CVE-2022-21509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21509">CVE-2022-21509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21515/">CVE-2022-21515 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21515">CVE-2022-21515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21517/">CVE-2022-21517 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21517">CVE-2022-21517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21522/">CVE-2022-21522 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21522">CVE-2022-21522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21525/">CVE-2022-21525 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21525">CVE-2022-21525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21526/">CVE-2022-21526 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21526">CVE-2022-21526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21527/">CVE-2022-21527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21527">CVE-2022-21527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21528/">CVE-2022-21528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21528">CVE-2022-21528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21529/">CVE-2022-21529 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21529">CVE-2022-21529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21530/">CVE-2022-21530 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21530">CVE-2022-21530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21531/">CVE-2022-21531 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21531">CVE-2022-21531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21534/">CVE-2022-21534 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21534">CVE-2022-21534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21537/">CVE-2022-21537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21537">CVE-2022-21537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21538/">CVE-2022-21538 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21538">CVE-2022-21538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21539/">CVE-2022-21539 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21539">CVE-2022-21539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21547/">CVE-2022-21547 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21547">CVE-2022-21547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21553/">CVE-2022-21553 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21553">CVE-2022-21553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21556/">CVE-2022-21556 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21556">CVE-2022-21556 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21569/">CVE-2022-21569 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21569">CVE-2022-21569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21592/">CVE-2022-21592 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21592">CVE-2022-21592 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21595/">CVE-2022-21595 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21595">CVE-2022-21595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21600/">CVE-2022-21600 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21600">CVE-2022-21600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21605/">CVE-2022-21605 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21605">CVE-2022-21605 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21607/">CVE-2022-21607 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21607">CVE-2022-21607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21635/">CVE-2022-21635 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21635">CVE-2022-21635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21638/">CVE-2022-21638 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21638">CVE-2022-21638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21641/">CVE-2022-21641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21641">CVE-2022-21641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21866/">CVE-2023-21866 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21866">CVE-2023-21866 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21872/">CVE-2023-21872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21872">CVE-2023-21872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21950/">CVE-2023-21950 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21950">CVE-2023-21950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840978" comment="mecab-0.996-2.module+el8.6.0+16523+5cb0e868 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832264" comment="mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832265" comment="mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840979" comment="mysql-8.0.30-1.module+el8.6.0+16523+5cb0e868 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840980" comment="mysql-common-8.0.30-1.module+el8.6.0+16523+5cb0e868 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840981" comment="mysql-devel-8.0.30-1.module+el8.6.0+16523+5cb0e868 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840982" comment="mysql-errmsg-8.0.30-1.module+el8.6.0+16523+5cb0e868 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840983" comment="mysql-libs-8.0.30-1.module+el8.6.0+16523+5cb0e868 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840984" comment="mysql-server-8.0.30-1.module+el8.6.0+16523+5cb0e868 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840985" comment="mysql-test-8.0.30-1.module+el8.6.0+16523+5cb0e868 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2472" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838936" comment="pg_repack-1.4.6-3.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838937" comment="pgaudit-1.4.0-5.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838938" comment="postgres-decoderbufs-0.10.0-2.module+el8.5.0+11354+78b3c9c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840986" comment="postgresql-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840987" comment="postgresql-contrib-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840988" comment="postgresql-docs-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840989" comment="postgresql-plperl-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840990" comment="postgresql-plpython3-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840991" comment="postgresql-pltcl-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840992" comment="postgresql-server-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840993" comment="postgresql-server-devel-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840994" comment="postgresql-static-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840995" comment="postgresql-test-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840996" comment="postgresql-test-rpm-macros-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840997" comment="postgresql-upgrade-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840998" comment="postgresql-upgrade-devel-12.12-1.module+el8.6.0+16796+0abe6678 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2473" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28851" ref_url="https://www.suse.com/security/cve/CVE-2020-28851/" source="CVE"/>
		<reference ref_id="CVE-2020-28852" ref_url="https://www.suse.com/security/cve/CVE-2020-28852/" source="CVE"/>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7129.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7129.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28851/">CVE-2020-28851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28851">CVE-2020-28851 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28852/">CVE-2020-28852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28852">CVE-2020-28852 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840999" comment="git-lfs-2.13.3-3.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2474" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2850" ref_url="https://www.suse.com/security/cve/CVE-2022-2850/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7133.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7133.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2850/">CVE-2022-2850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2850">CVE-2022-2850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841000" comment="389-ds-base-1.4.3.28-8.module+el8.6.0+16880+945f9b53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841001" comment="389-ds-base-devel-1.4.3.28-8.module+el8.6.0+16880+945f9b53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841002" comment="389-ds-base-legacy-tools-1.4.3.28-8.module+el8.6.0+16880+945f9b53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841003" comment="389-ds-base-libs-1.4.3.28-8.module+el8.6.0+16880+945f9b53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841004" comment="389-ds-base-snmp-1.4.3.28-8.module+el8.6.0+16880+945f9b53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841005" comment="python3-lib389-1.4.3.28-8.module+el8.6.0+16880+945f9b53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2475" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236/" source="CVE"/>
		<reference ref_id="CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249/" source="CVE"/>
		<reference ref_id="CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250/" source="CVE"/>
		<reference ref_id="CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251/" source="CVE"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7190.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7190.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39236">CVE-2022-39236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39249">CVE-2022-39249 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39250">CVE-2022-39250 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39251">CVE-2022-39251 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841006" comment="thunderbird-102.4.0-1.el8_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2476" version="1" class="patch">
	<metadata>
		<title>security update for device-mapper-multipath (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841007" comment="device-mapper-multipath-0.8.4-22.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841008" comment="device-mapper-multipath-devel-0.8.4-22.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841009" comment="device-mapper-multipath-libs-0.8.4-22.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841010" comment="kpartx-0.8.4-22.el8_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841011" comment="libdmmp-0.8.4-22.el8_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2477" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1049" ref_url="https://www.suse.com/security/cve/CVE-2022-1049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7447.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7447.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1049/">CVE-2022-1049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1049">CVE-2022-1049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841012" comment="pcs-0.10.14-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841013" comment="pcs-snmp-0.10.14-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2478" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221/" source="CVE"/>
		<reference ref_id="CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190/" source="CVE"/>
		<reference ref_id="CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<reference ref_id="CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7457.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7457.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1708">CVE-2022-1708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2990">CVE-2022-2990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841014" comment="aardvark-dns-1.1.0-4.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841015" comment="buildah-1.27.0-2.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841016" comment="buildah-tests-1.27.0-2.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841017" comment="cockpit-podman-53-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841018" comment="conmon-2.1.4-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841019" comment="container-selinux-2.189.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841020" comment="containernetworking-plugins-1.1.1-3.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841021" comment="containers-common-1-40.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841022" comment="crit-3.15-3.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841023" comment="criu-3.15-3.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841024" comment="criu-devel-3.15-3.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841025" comment="criu-libs-3.15-3.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841026" comment="crun-1.5-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841027" comment="fuse-overlayfs-1.9-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841028" comment="libslirp-4.4.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841029" comment="libslirp-devel-4.4.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841030" comment="netavark-1.1.0-6.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841031" comment="oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841032" comment="podman-4.2.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841033" comment="podman-catatonit-4.2.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841034" comment="podman-docker-4.2.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841035" comment="podman-gvproxy-4.2.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841036" comment="podman-plugins-4.2.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841037" comment="podman-remote-4.2.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841038" comment="podman-tests-4.2.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841039" comment="python3-criu-3.15-3.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841040" comment="python3-podman-4.2.0-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841041" comment="runc-1.1.4-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841042" comment="skopeo-1.9.2-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841043" comment="skopeo-tests-1.9.2-1.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841044" comment="slirp4netns-1.2.0-2.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841045" comment="toolbox-0.0.99.3-0.6.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841046" comment="toolbox-tests-0.0.99.3-0.6.module+el8.7.0+16772+33343656 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841047" comment="udica-0.2.6-3.module+el8.7.0+16772+33343656 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2479" version="1" class="patch">
	<metadata>
		<title>security update for flatpak-builder (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7458.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7458.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21682">CVE-2022-21682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841048" comment="flatpak-builder-1.0.14-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2480" version="1" class="patch">
	<metadata>
		<title>security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22570">CVE-2021-22570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841049" comment="protobuf-3.5.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841050" comment="protobuf-compiler-3.5.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841051" comment="protobuf-devel-3.5.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841052" comment="protobuf-lite-3.5.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841053" comment="protobuf-lite-devel-3.5.0-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841054" comment="python3-protobuf-3.5.0-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2481" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708/" source="CVE"/>
		<reference ref_id="CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191/" source="CVE"/>
		<reference ref_id="CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7469.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7469.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1708">CVE-2022-1708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841055" comment="aardvark-dns-1.0.1-35.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841056" comment="buildah-1.24.5-2.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841057" comment="buildah-tests-1.24.5-2.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841058" comment="cockpit-podman-46-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841059" comment="conmon-2.1.4-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841060" comment="container-selinux-2.189.0-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841061" comment="containernetworking-plugins-1.1.1-2.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841062" comment="containers-common-1-35.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841063" comment="crit-3.15-3.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841064" comment="criu-3.15-3.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841065" comment="criu-devel-3.15-3.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841066" comment="criu-libs-3.15-3.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841067" comment="crun-1.5-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841068" comment="fuse-overlayfs-1.9-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841069" comment="libslirp-4.4.0-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841070" comment="libslirp-devel-4.4.0-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841071" comment="netavark-1.0.1-35.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841072" comment="oci-seccomp-bpf-hook-1.2.5-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841073" comment="podman-4.0.2-8.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841074" comment="podman-catatonit-4.0.2-8.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841075" comment="podman-docker-4.0.2-8.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841076" comment="podman-gvproxy-4.0.2-8.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841077" comment="podman-plugins-4.0.2-8.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841078" comment="podman-remote-4.0.2-8.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841079" comment="podman-tests-4.0.2-8.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841080" comment="python3-criu-3.15-3.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841081" comment="python3-podman-4.0.0-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841082" comment="runc-1.1.4-1.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841083" comment="skopeo-1.6.2-5.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841084" comment="skopeo-tests-1.6.2-5.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841085" comment="slirp4netns-1.1.8-2.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841086" comment="toolbox-0.0.99.3-0.5.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841087" comment="toolbox-tests-0.0.99.3-0.5.module+el8.7.0+16520+2db5507d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841088" comment="udica-0.2.6-3.module+el8.7.0+16520+2db5507d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2482" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-collections (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2414" ref_url="https://www.suse.com/security/cve/CVE-2022-2414/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7470.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7470.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2414/">CVE-2022-2414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2414">CVE-2022-2414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009833840" comment="apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833841" comment="apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836773" comment="apache-commons-net-3.6-3.module+el8.3.0+6805+72837426 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833842" comment="bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833843" comment="glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833844" comment="glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833845" comment="glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833846" comment="glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833847" comment="glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841089" comment="idm-pki-acme-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841090" comment="idm-pki-base-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841091" comment="idm-pki-base-java-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841092" comment="idm-pki-ca-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841093" comment="idm-pki-kra-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841094" comment="idm-pki-server-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841095" comment="idm-pki-symkey-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841096" comment="idm-pki-tools-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833848" comment="jackson-annotations-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833849" comment="jackson-core-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833850" comment="jackson-databind-2.10.0-1.module+el8.2.0+5059+3eb3af25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833851" comment="jackson-jaxrs-json-provider-2.9.9-1.module+el8.1.0+3832+9784644d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833852" comment="jackson-jaxrs-providers-2.9.9-1.module+el8.1.0+3832+9784644d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833853" comment="jackson-module-jaxb-annotations-2.7.6-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833854" comment="jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833855" comment="javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833856" comment="javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841097" comment="jss-4.9.4-1.module+el8.7.0+15532+95bac9ee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841098" comment="jss-javadoc-4.9.4-1.module+el8.7.0+15532+95bac9ee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839875" comment="ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839876" comment="ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841099" comment="pki-servlet-4.0-api-9.0.50-1.module+el8.7.0+15761+f86c9a56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841100" comment="pki-servlet-engine-9.0.50-1.module+el8.7.0+15761+f86c9a56 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833870" comment="python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841101" comment="python3-idm-pki-10.12.0-4.module+el8.7.0+16126+c5918a27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833871" comment="python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833873" comment="relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836787" comment="resteasy-3.0.26-6.module+el8.4.0+8891+bb8828ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833875" comment="slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833876" comment="slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836788" comment="stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839886" comment="tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833879" comment="velocity-1.7-24.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833880" comment="xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833881" comment="xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833882" comment="xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833883" comment="xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836790" comment="xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833885" comment="xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2483" version="1" class="patch">
	<metadata>
		<title>security update for qt5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7482.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7482.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25255">CVE-2022-25255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841102" comment="qt5-devel-5.15.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841103" comment="qt5-rpm-macros-5.15.3-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841104" comment="qt5-srpm-macros-5.15.3-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2484" version="1" class="patch">
	<metadata>
		<title>security update for fribidi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-25308" ref_url="https://www.suse.com/security/cve/CVE-2022-25308/" source="CVE"/>
		<reference ref_id="CVE-2022-25309" ref_url="https://www.suse.com/security/cve/CVE-2022-25309/" source="CVE"/>
		<reference ref_id="CVE-2022-25310" ref_url="https://www.suse.com/security/cve/CVE-2022-25310/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7514.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7514.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25308/">CVE-2022-25308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25308">CVE-2022-25308 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-25309/">CVE-2022-25309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25309">CVE-2022-25309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25310/">CVE-2022-25310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25310">CVE-2022-25310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841105" comment="fribidi-1.0.4-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841106" comment="fribidi-devel-1.0.4-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2485" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-23648" ref_url="https://www.suse.com/security/cve/CVE-2021-23648/" source="CVE"/>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702/" source="CVE"/>
		<reference ref_id="CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703/" source="CVE"/>
		<reference ref_id="CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7519.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7519.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23648/">CVE-2021-23648 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23648">CVE-2021-23648 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841107" comment="grafana-7.5.15-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2486" version="1" class="patch">
	<metadata>
		<title>security update for yajl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7524.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7524.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841108" comment="yajl-2.1.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841109" comment="yajl-devel-2.1.0-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2487" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1708" ref_url="https://www.suse.com/security/cve/CVE-2022-1708/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7529.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7529.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1708/">CVE-2022-1708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1708">CVE-2022-1708 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841110" comment="buildah-1.19.9-6.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841111" comment="buildah-tests-1.19.9-6.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841112" comment="cockpit-podman-29-2.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841113" comment="conmon-2.0.26-3.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841114" comment="container-selinux-2.189.0-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841115" comment="containernetworking-plugins-0.9.1-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841116" comment="containers-common-1.2.4-2.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841117" comment="crit-3.15-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841118" comment="criu-3.15-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841119" comment="crun-0.18-3.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841120" comment="fuse-overlayfs-1.4.0-2.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841121" comment="libslirp-4.3.1-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841122" comment="libslirp-devel-4.3.1-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841123" comment="oci-seccomp-bpf-hook-1.2.0-3.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841124" comment="podman-3.0.1-13.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841125" comment="podman-catatonit-3.0.1-13.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841126" comment="podman-docker-3.0.1-13.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841127" comment="podman-plugins-3.0.1-13.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841128" comment="podman-remote-3.0.1-13.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841129" comment="podman-tests-3.0.1-13.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841130" comment="python3-criu-3.15-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841131" comment="runc-1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841132" comment="skopeo-1.2.4-2.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841133" comment="skopeo-tests-1.2.4-2.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841134" comment="slirp4netns-1.1.8-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841135" comment="toolbox-0.0.99.3-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841136" comment="toolbox-tests-0.0.99.3-1.module+el8.7.0+16212+65e1b35f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841137" comment="udica-0.2.4-1.module+el8.7.0+16212+65e1b35f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2488" version="1" class="patch">
	<metadata>
		<title>security update for redis (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24735" ref_url="https://www.suse.com/security/cve/CVE-2022-24735/" source="CVE"/>
		<reference ref_id="CVE-2022-24736" ref_url="https://www.suse.com/security/cve/CVE-2022-24736/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7541.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7541.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-24735/">CVE-2022-24735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24736/">CVE-2022-24736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24736">CVE-2022-24736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841138" comment="redis-6.2.7-1.module+el8.7.0+15197+cc495aeb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841139" comment="redis-devel-6.2.7-1.module+el8.7.0+15197+cc495aeb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841140" comment="redis-doc-6.2.7-1.module+el8.7.0+15197+cc495aeb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2489" version="1" class="patch">
	<metadata>
		<title>security update for wavpack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44269" ref_url="https://www.suse.com/security/cve/CVE-2021-44269/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7558.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7558.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44269/">CVE-2021-44269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44269">CVE-2021-44269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841141" comment="wavpack-5.1.0-16.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841142" comment="wavpack-devel-5.1.0-16.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2490" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7583.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7583.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841143" comment="xorg-x11-server-Xdmx-1.20.11-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841144" comment="xorg-x11-server-Xephyr-1.20.11-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841145" comment="xorg-x11-server-Xnest-1.20.11-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841146" comment="xorg-x11-server-Xorg-1.20.11-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841147" comment="xorg-x11-server-Xvfb-1.20.11-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841148" comment="xorg-x11-server-Xwayland-21.1.3-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841149" comment="xorg-x11-server-common-1.20.11-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841150" comment="xorg-x11-server-devel-1.20.11-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841151" comment="xorg-x11-server-source-1.20.11-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841152" comment="xorg-x11-xtrans-devel-1.4.0-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2491" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561/" source="CVE"/>
		<reference ref_id="CVE-2022-0562" ref_url="https://www.suse.com/security/cve/CVE-2022-0562/" source="CVE"/>
		<reference ref_id="CVE-2022-0865" ref_url="https://www.suse.com/security/cve/CVE-2022-0865/" source="CVE"/>
		<reference ref_id="CVE-2022-0891" ref_url="https://www.suse.com/security/cve/CVE-2022-0891/" source="CVE"/>
		<reference ref_id="CVE-2022-0908" ref_url="https://www.suse.com/security/cve/CVE-2022-0908/" source="CVE"/>
		<reference ref_id="CVE-2022-0909" ref_url="https://www.suse.com/security/cve/CVE-2022-0909/" source="CVE"/>
		<reference ref_id="CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924/" source="CVE"/>
		<reference ref_id="CVE-2022-1355" ref_url="https://www.suse.com/security/cve/CVE-2022-1355/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0562/">CVE-2022-0562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">CVE-2022-0562 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0865/">CVE-2022-0865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">CVE-2022-0865 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0891/">CVE-2022-0891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">CVE-2022-0891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0908/">CVE-2022-0908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">CVE-2022-0908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0909/">CVE-2022-0909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">CVE-2022-0909 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">CVE-2022-0924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1355/">CVE-2022-1355 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1355">CVE-2022-1355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841153" comment="libtiff-4.0.9-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841154" comment="libtiff-devel-4.0.9-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841155" comment="libtiff-tools-4.0.9-23.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2492" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7593.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7593.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837903" comment="babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837904" comment="python-nose-docs-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835513" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841156" comment="python2-2.7.18-11.module+el8.7.0+15681+7a92afba is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837906" comment="python2-babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836757" comment="python2-backports-1.0-16.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836758" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837907" comment="python2-bson-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841157" comment="python2-debug-2.7.18-11.module+el8.7.0+15681+7a92afba is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841158" comment="python2-devel-2.7.18-11.module+el8.7.0+15681+7a92afba is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837910" comment="python2-jinja2-2.10-9.module+el8.5.0+10541+706bb066 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841159" comment="python2-libs-2.7.18-11.module+el8.7.0+15681+7a92afba is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839847" comment="python2-lxml-4.2.3-6.module+el8.6.0+13959+8e368262 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837913" comment="python2-nose-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836763" comment="python2-numpy-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836764" comment="python2-numpy-doc-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836765" comment="python2-numpy-f2py-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839848" comment="python2-pip-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839849" comment="python2-pip-wheel-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837914" comment="python2-pygments-2.2.0-22.module+el8.5.0+10788+a4cea9e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837915" comment="python2-pymongo-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837916" comment="python2-pymongo-gridfs-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837917" comment="python2-scipy-1.0.0-21.module+el8.5.0+10858+05337455 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836766" comment="python2-setuptools-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836767" comment="python2-setuptools-wheel-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836768" comment="python2-six-1.11.0-6.module+el8.4.0+9287+299307c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835522" comment="python2-sqlalchemy-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841160" comment="python2-test-2.7.18-11.module+el8.7.0+15681+7a92afba is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841161" comment="python2-tkinter-2.7.18-11.module+el8.7.0+15681+7a92afba is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841162" comment="python2-tools-2.7.18-11.module+el8.7.0+15681+7a92afba is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836772" comment="python2-urllib3-1.24.2-3.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837921" comment="python2-virtualenv-15.1.0-21.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837922" comment="python2-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837923" comment="python2-wheel-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2493" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27337" ref_url="https://www.suse.com/security/cve/CVE-2022-27337/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7594.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7594.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27337/">CVE-2022-27337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27337">CVE-2022-27337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841163" comment="poppler-20.11.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841164" comment="poppler-cpp-20.11.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841165" comment="poppler-cpp-devel-20.11.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841166" comment="poppler-devel-20.11.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841167" comment="poppler-glib-20.11.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841168" comment="poppler-glib-devel-20.11.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841169" comment="poppler-qt5-20.11.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841170" comment="poppler-qt5-devel-20.11.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841171" comment="poppler-utils-20.11.0-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2494" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-good (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3497" ref_url="https://www.suse.com/security/cve/CVE-2021-3497/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7618.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7618.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3497/">CVE-2021-3497 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3497">CVE-2021-3497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841172" comment="gstreamer1-plugins-good-1.16.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841173" comment="gstreamer1-plugins-good-gtk-1.16.1-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2495" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-25033" ref_url="https://www.suse.com/security/cve/CVE-2019-25033/" source="CVE"/>
		<reference ref_id="CVE-2022-30698" ref_url="https://www.suse.com/security/cve/CVE-2022-30698/" source="CVE"/>
		<reference ref_id="CVE-2022-30699" ref_url="https://www.suse.com/security/cve/CVE-2022-30699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7622.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7622.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25033/">CVE-2019-25033 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25033">CVE-2019-25033 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30698/">CVE-2022-30698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30698">CVE-2022-30698 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30699/">CVE-2022-30699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30699">CVE-2022-30699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841174" comment="python3-unbound-1.16.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841175" comment="unbound-1.16.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841176" comment="unbound-devel-1.16.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841177" comment="unbound-libs-1.16.2-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2496" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-30550" ref_url="https://www.suse.com/security/cve/CVE-2022-30550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7623.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7623.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-30550/">CVE-2022-30550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30550">CVE-2022-30550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841178" comment="dovecot-2.3.16-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841179" comment="dovecot-devel-2.3.16-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841180" comment="dovecot-mysql-2.3.16-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841181" comment="dovecot-pgsql-2.3.16-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841182" comment="dovecot-pigeonhole-2.3.16-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2497" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7624.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7624.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21708">CVE-2021-21708 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31625">CVE-2022-31625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840372" comment="apcu-panel-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840373" comment="libzip-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840374" comment="libzip-devel-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840375" comment="libzip-tools-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841183" comment="php-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841184" comment="php-bcmath-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841185" comment="php-cli-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841186" comment="php-common-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841187" comment="php-dba-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841188" comment="php-dbg-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841189" comment="php-devel-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841190" comment="php-embedded-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841191" comment="php-enchant-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841192" comment="php-ffi-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841193" comment="php-fpm-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841194" comment="php-gd-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841195" comment="php-gmp-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841196" comment="php-intl-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841197" comment="php-ldap-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841198" comment="php-mbstring-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841199" comment="php-mysqlnd-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841200" comment="php-odbc-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841201" comment="php-opcache-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841202" comment="php-pdo-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840396" comment="php-pear-1.10.13-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840397" comment="php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840398" comment="php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840399" comment="php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840400" comment="php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840401" comment="php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841203" comment="php-pgsql-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841204" comment="php-process-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841205" comment="php-snmp-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841206" comment="php-soap-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841207" comment="php-xml-8.0.20-2.module+el8.7.0+16187+bb5ab920 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2498" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="CVE-2021-32610" ref_url="https://www.suse.com/security/cve/CVE-2021-32610/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7628.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7628.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21707">CVE-2021-21707 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21708">CVE-2021-21708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32610/">CVE-2021-32610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32610">CVE-2021-32610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838070" comment="apcu-panel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838071" comment="libzip-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838072" comment="libzip-devel-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838073" comment="libzip-tools-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841208" comment="php-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841209" comment="php-bcmath-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841210" comment="php-cli-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841211" comment="php-common-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841212" comment="php-dba-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841213" comment="php-dbg-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841214" comment="php-devel-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841215" comment="php-embedded-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841216" comment="php-enchant-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841217" comment="php-ffi-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841218" comment="php-fpm-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841219" comment="php-gd-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841220" comment="php-gmp-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841221" comment="php-intl-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841222" comment="php-json-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841223" comment="php-ldap-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841224" comment="php-mbstring-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841225" comment="php-mysqlnd-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841226" comment="php-odbc-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841227" comment="php-opcache-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841228" comment="php-pdo-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841229" comment="php-pear-1.10.13-1.module+el8.7.0+15127+a450a8db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838096" comment="php-pecl-apcu-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838097" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838098" comment="php-pecl-rrd-2.0.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838099" comment="php-pecl-xdebug-2.9.5-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838100" comment="php-pecl-zip-1.18.2-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841230" comment="php-pgsql-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841231" comment="php-process-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841232" comment="php-snmp-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841233" comment="php-soap-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841234" comment="php-xml-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841235" comment="php-xmlrpc-7.4.30-1.module+el8.7.0+15886+8e29b882 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2499" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7633.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7633.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841236" comment="dnsmasq-2.79-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841237" comment="dnsmasq-utils-2.79-24.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2500" version="1" class="patch">
	<metadata>
		<title>security update for openblas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-4048" ref_url="https://www.suse.com/security/cve/CVE-2021-4048/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7639.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7639.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4048/">CVE-2021-4048 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4048">CVE-2021-4048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841238" comment="openblas-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841239" comment="openblas-Rblas-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841240" comment="openblas-devel-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841241" comment="openblas-openmp-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841242" comment="openblas-openmp64-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841243" comment="openblas-openmp64_-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841244" comment="openblas-serial64-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841245" comment="openblas-serial64_-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841246" comment="openblas-static-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841247" comment="openblas-threads-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841248" comment="openblas-threads64-0.3.15-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841249" comment="openblas-threads64_-0.3.15-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2501" version="1" class="patch">
	<metadata>
		<title>security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7640.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7640.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841250" comment="mutt-2.0.7-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2502" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="CVE-2022-0396" ref_url="https://www.suse.com/security/cve/CVE-2022-0396/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0396/">CVE-2022-0396 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0396">CVE-2022-0396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841251" comment="bind9.16-9.16.23-0.9.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841252" comment="bind9.16-chroot-9.16.23-0.9.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841253" comment="bind9.16-devel-9.16.23-0.9.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841254" comment="bind9.16-dnssec-utils-9.16.23-0.9.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841255" comment="bind9.16-doc-9.16.23-0.9.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841256" comment="bind9.16-libs-9.16.23-0.9.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841257" comment="bind9.16-license-9.16.23-0.9.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841258" comment="bind9.16-utils-9.16.23-0.9.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841259" comment="python3-bind9.16-9.16.23-0.9.el8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2503" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7645.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7645.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841260" comment="openjpeg2-2.4.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841261" comment="openjpeg2-devel-2.4.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841262" comment="openjpeg2-devel-docs-2.4.0-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841263" comment="openjpeg2-tools-2.4.0-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2504" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377/" source="CVE"/>
		<reference ref_id="CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614/" source="CVE"/>
		<reference ref_id="CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615/" source="CVE"/>
		<reference ref_id="CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404/" source="CVE"/>
		<reference ref_id="CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522/" source="CVE"/>
		<reference ref_id="CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556/" source="CVE"/>
		<reference ref_id="CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7647.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7647.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841264" comment="httpd-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841265" comment="httpd-devel-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841266" comment="httpd-filesystem-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841267" comment="httpd-manual-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841268" comment="httpd-tools-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839914" comment="mod_http2-1.15.7-5.module+el8.6.0+13996+01710940 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841269" comment="mod_ldap-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841270" comment="mod_proxy_html-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841271" comment="mod_session-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841272" comment="mod_ssl-2.4.37-51.module+el8.7.0+16050+02173b8e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2505" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7648.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7648.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841273" comment="grafana-pcp-3.2.0-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2506" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516/" source="CVE"/>
		<reference ref_id="CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099/" source="CVE"/>
		<reference ref_id="CVE-2021-47103" ref_url="https://www.suse.com/security/cve/CVE-2021-47103/" source="CVE"/>
		<reference ref_id="CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107/" source="CVE"/>
		<reference ref_id="CVE-2021-47213" ref_url="https://www.suse.com/security/cve/CVE-2021-47213/" source="CVE"/>
		<reference ref_id="CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378/" source="CVE"/>
		<reference ref_id="CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580/" source="CVE"/>
		<reference ref_id="CVE-2021-47639" ref_url="https://www.suse.com/security/cve/CVE-2021-47639/" source="CVE"/>
		<reference ref_id="CVE-2021-47649" ref_url="https://www.suse.com/security/cve/CVE-2021-47649/" source="CVE"/>
		<reference ref_id="CVE-2021-47657" ref_url="https://www.suse.com/security/cve/CVE-2021-47657/" source="CVE"/>
		<reference ref_id="CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-1158" ref_url="https://www.suse.com/security/cve/CVE-2022-1158/" source="CVE"/>
		<reference ref_id="CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184/" source="CVE"/>
		<reference ref_id="CVE-2022-1263" ref_url="https://www.suse.com/security/cve/CVE-2022-1263/" source="CVE"/>
		<reference ref_id="CVE-2022-1280" ref_url="https://www.suse.com/security/cve/CVE-2022-1280/" source="CVE"/>
		<reference ref_id="CVE-2022-1852" ref_url="https://www.suse.com/security/cve/CVE-2022-1852/" source="CVE"/>
		<reference ref_id="CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368/" source="CVE"/>
		<reference ref_id="CVE-2022-20572" ref_url="https://www.suse.com/security/cve/CVE-2022-20572/" source="CVE"/>
		<reference ref_id="CVE-2022-2078" ref_url="https://www.suse.com/security/cve/CVE-2022-2078/" source="CVE"/>
		<reference ref_id="CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499/" source="CVE"/>
		<reference ref_id="CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153/" source="CVE"/>
		<reference ref_id="CVE-2022-23960" ref_url="https://www.suse.com/security/cve/CVE-2022-23960/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-2503" ref_url="https://www.suse.com/security/cve/CVE-2022-2503/" source="CVE"/>
		<reference ref_id="CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639/" source="CVE"/>
		<reference ref_id="CVE-2022-27950" ref_url="https://www.suse.com/security/cve/CVE-2022-27950/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893/" source="CVE"/>
		<reference ref_id="CVE-2022-2938" ref_url="https://www.suse.com/security/cve/CVE-2022-2938/" source="CVE"/>
		<reference ref_id="CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581/" source="CVE"/>
		<reference ref_id="CVE-2022-3107" ref_url="https://www.suse.com/security/cve/CVE-2022-3107/" source="CVE"/>
		<reference ref_id="CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946/" source="CVE"/>
		<reference ref_id="CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735/" source="CVE"/>
		<reference ref_id="CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738/" source="CVE"/>
		<reference ref_id="CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765/" source="CVE"/>
		<reference ref_id="CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786/" source="CVE"/>
		<reference ref_id="CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912/" source="CVE"/>
		<reference ref_id="CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915/" source="CVE"/>
		<reference ref_id="CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2022-49044" ref_url="https://www.suse.com/security/cve/CVE-2022-49044/" source="CVE"/>
		<reference ref_id="CVE-2022-49060" ref_url="https://www.suse.com/security/cve/CVE-2022-49060/" source="CVE"/>
		<reference ref_id="CVE-2022-49063" ref_url="https://www.suse.com/security/cve/CVE-2022-49063/" source="CVE"/>
		<reference ref_id="CVE-2022-49066" ref_url="https://www.suse.com/security/cve/CVE-2022-49066/" source="CVE"/>
		<reference ref_id="CVE-2022-49086" ref_url="https://www.suse.com/security/cve/CVE-2022-49086/" source="CVE"/>
		<reference ref_id="CVE-2022-49098" ref_url="https://www.suse.com/security/cve/CVE-2022-49098/" source="CVE"/>
		<reference ref_id="CVE-2022-49122" ref_url="https://www.suse.com/security/cve/CVE-2022-49122/" source="CVE"/>
		<reference ref_id="CVE-2022-49123" ref_url="https://www.suse.com/security/cve/CVE-2022-49123/" source="CVE"/>
		<reference ref_id="CVE-2022-49129" ref_url="https://www.suse.com/security/cve/CVE-2022-49129/" source="CVE"/>
		<reference ref_id="CVE-2022-49130" ref_url="https://www.suse.com/security/cve/CVE-2022-49130/" source="CVE"/>
		<reference ref_id="CVE-2022-49145" ref_url="https://www.suse.com/security/cve/CVE-2022-49145/" source="CVE"/>
		<reference ref_id="CVE-2022-49156" ref_url="https://www.suse.com/security/cve/CVE-2022-49156/" source="CVE"/>
		<reference ref_id="CVE-2022-49158" ref_url="https://www.suse.com/security/cve/CVE-2022-49158/" source="CVE"/>
		<reference ref_id="CVE-2022-49160" ref_url="https://www.suse.com/security/cve/CVE-2022-49160/" source="CVE"/>
		<reference ref_id="CVE-2022-49175" ref_url="https://www.suse.com/security/cve/CVE-2022-49175/" source="CVE"/>
		<reference ref_id="CVE-2022-49199" ref_url="https://www.suse.com/security/cve/CVE-2022-49199/" source="CVE"/>
		<reference ref_id="CVE-2022-49235" ref_url="https://www.suse.com/security/cve/CVE-2022-49235/" source="CVE"/>
		<reference ref_id="CVE-2022-49238" ref_url="https://www.suse.com/security/cve/CVE-2022-49238/" source="CVE"/>
		<reference ref_id="CVE-2022-49259" ref_url="https://www.suse.com/security/cve/CVE-2022-49259/" source="CVE"/>
		<reference ref_id="CVE-2022-49263" ref_url="https://www.suse.com/security/cve/CVE-2022-49263/" source="CVE"/>
		<reference ref_id="CVE-2022-49265" ref_url="https://www.suse.com/security/cve/CVE-2022-49265/" source="CVE"/>
		<reference ref_id="CVE-2022-49268" ref_url="https://www.suse.com/security/cve/CVE-2022-49268/" source="CVE"/>
		<reference ref_id="CVE-2022-49272" ref_url="https://www.suse.com/security/cve/CVE-2022-49272/" source="CVE"/>
		<reference ref_id="CVE-2022-49288" ref_url="https://www.suse.com/security/cve/CVE-2022-49288/" source="CVE"/>
		<reference ref_id="CVE-2022-49290" ref_url="https://www.suse.com/security/cve/CVE-2022-49290/" source="CVE"/>
		<reference ref_id="CVE-2022-49292" ref_url="https://www.suse.com/security/cve/CVE-2022-49292/" source="CVE"/>
		<reference ref_id="CVE-2022-49343" ref_url="https://www.suse.com/security/cve/CVE-2022-49343/" source="CVE"/>
		<reference ref_id="CVE-2022-49347" ref_url="https://www.suse.com/security/cve/CVE-2022-49347/" source="CVE"/>
		<reference ref_id="CVE-2022-49349" ref_url="https://www.suse.com/security/cve/CVE-2022-49349/" source="CVE"/>
		<reference ref_id="CVE-2022-49374" ref_url="https://www.suse.com/security/cve/CVE-2022-49374/" source="CVE"/>
		<reference ref_id="CVE-2022-49378" ref_url="https://www.suse.com/security/cve/CVE-2022-49378/" source="CVE"/>
		<reference ref_id="CVE-2022-49398" ref_url="https://www.suse.com/security/cve/CVE-2022-49398/" source="CVE"/>
		<reference ref_id="CVE-2022-49404" ref_url="https://www.suse.com/security/cve/CVE-2022-49404/" source="CVE"/>
		<reference ref_id="CVE-2022-49409" ref_url="https://www.suse.com/security/cve/CVE-2022-49409/" source="CVE"/>
		<reference ref_id="CVE-2022-49418" ref_url="https://www.suse.com/security/cve/CVE-2022-49418/" source="CVE"/>
		<reference ref_id="CVE-2022-49426" ref_url="https://www.suse.com/security/cve/CVE-2022-49426/" source="CVE"/>
		<reference ref_id="CVE-2022-49433" ref_url="https://www.suse.com/security/cve/CVE-2022-49433/" source="CVE"/>
		<reference ref_id="CVE-2022-49515" ref_url="https://www.suse.com/security/cve/CVE-2022-49515/" source="CVE"/>
		<reference ref_id="CVE-2022-49534" ref_url="https://www.suse.com/security/cve/CVE-2022-49534/" source="CVE"/>
		<reference ref_id="CVE-2022-49536" ref_url="https://www.suse.com/security/cve/CVE-2022-49536/" source="CVE"/>
		<reference ref_id="CVE-2022-49537" ref_url="https://www.suse.com/security/cve/CVE-2022-49537/" source="CVE"/>
		<reference ref_id="CVE-2022-49538" ref_url="https://www.suse.com/security/cve/CVE-2022-49538/" source="CVE"/>
		<reference ref_id="CVE-2022-49541" ref_url="https://www.suse.com/security/cve/CVE-2022-49541/" source="CVE"/>
		<reference ref_id="CVE-2022-49543" ref_url="https://www.suse.com/security/cve/CVE-2022-49543/" source="CVE"/>
		<reference ref_id="CVE-2022-49559" ref_url="https://www.suse.com/security/cve/CVE-2022-49559/" source="CVE"/>
		<reference ref_id="CVE-2022-49561" ref_url="https://www.suse.com/security/cve/CVE-2022-49561/" source="CVE"/>
		<reference ref_id="CVE-2022-49584" ref_url="https://www.suse.com/security/cve/CVE-2022-49584/" source="CVE"/>
		<reference ref_id="CVE-2022-49605" ref_url="https://www.suse.com/security/cve/CVE-2022-49605/" source="CVE"/>
		<reference ref_id="CVE-2022-49606" ref_url="https://www.suse.com/security/cve/CVE-2022-49606/" source="CVE"/>
		<reference ref_id="CVE-2022-49610" ref_url="https://www.suse.com/security/cve/CVE-2022-49610/" source="CVE"/>
		<reference ref_id="CVE-2022-49611" ref_url="https://www.suse.com/security/cve/CVE-2022-49611/" source="CVE"/>
		<reference ref_id="CVE-2022-49615" ref_url="https://www.suse.com/security/cve/CVE-2022-49615/" source="CVE"/>
		<reference ref_id="CVE-2022-49616" ref_url="https://www.suse.com/security/cve/CVE-2022-49616/" source="CVE"/>
		<reference ref_id="CVE-2022-49625" ref_url="https://www.suse.com/security/cve/CVE-2022-49625/" source="CVE"/>
		<reference ref_id="CVE-2022-49626" ref_url="https://www.suse.com/security/cve/CVE-2022-49626/" source="CVE"/>
		<reference ref_id="CVE-2022-49664" ref_url="https://www.suse.com/security/cve/CVE-2022-49664/" source="CVE"/>
		<reference ref_id="CVE-2022-49669" ref_url="https://www.suse.com/security/cve/CVE-2022-49669/" source="CVE"/>
		<reference ref_id="CVE-2022-49671" ref_url="https://www.suse.com/security/cve/CVE-2022-49671/" source="CVE"/>
		<reference ref_id="CVE-2022-49673" ref_url="https://www.suse.com/security/cve/CVE-2022-49673/" source="CVE"/>
		<reference ref_id="CVE-2022-49674" ref_url="https://www.suse.com/security/cve/CVE-2022-49674/" source="CVE"/>
		<reference ref_id="CVE-2022-49695" ref_url="https://www.suse.com/security/cve/CVE-2022-49695/" source="CVE"/>
		<reference ref_id="CVE-2022-49697" ref_url="https://www.suse.com/security/cve/CVE-2022-49697/" source="CVE"/>
		<reference ref_id="CVE-2022-49698" ref_url="https://www.suse.com/security/cve/CVE-2022-49698/" source="CVE"/>
		<reference ref_id="CVE-2022-49707" ref_url="https://www.suse.com/security/cve/CVE-2022-49707/" source="CVE"/>
		<reference ref_id="CVE-2022-49708" ref_url="https://www.suse.com/security/cve/CVE-2022-49708/" source="CVE"/>
		<reference ref_id="CVE-2022-49710" ref_url="https://www.suse.com/security/cve/CVE-2022-49710/" source="CVE"/>
		<reference ref_id="CVE-2022-50027" ref_url="https://www.suse.com/security/cve/CVE-2022-50027/" source="CVE"/>
		<reference ref_id="CVE-2022-50030" ref_url="https://www.suse.com/security/cve/CVE-2022-50030/" source="CVE"/>
		<reference ref_id="CVE-2022-50053" ref_url="https://www.suse.com/security/cve/CVE-2022-50053/" source="CVE"/>
		<reference ref_id="CVE-2022-50054" ref_url="https://www.suse.com/security/cve/CVE-2022-50054/" source="CVE"/>
		<reference ref_id="CVE-2022-50055" ref_url="https://www.suse.com/security/cve/CVE-2022-50055/" source="CVE"/>
		<reference ref_id="CVE-2022-50069" ref_url="https://www.suse.com/security/cve/CVE-2022-50069/" source="CVE"/>
		<reference ref_id="CVE-2022-50081" ref_url="https://www.suse.com/security/cve/CVE-2022-50081/" source="CVE"/>
		<reference ref_id="CVE-2022-50084" ref_url="https://www.suse.com/security/cve/CVE-2022-50084/" source="CVE"/>
		<reference ref_id="CVE-2022-50085" ref_url="https://www.suse.com/security/cve/CVE-2022-50085/" source="CVE"/>
		<reference ref_id="CVE-2022-50092" ref_url="https://www.suse.com/security/cve/CVE-2022-50092/" source="CVE"/>
		<reference ref_id="CVE-2022-50110" ref_url="https://www.suse.com/security/cve/CVE-2022-50110/" source="CVE"/>
		<reference ref_id="CVE-2022-50115" ref_url="https://www.suse.com/security/cve/CVE-2022-50115/" source="CVE"/>
		<reference ref_id="CVE-2022-50177" ref_url="https://www.suse.com/security/cve/CVE-2022-50177/" source="CVE"/>
		<reference ref_id="CVE-2022-50178" ref_url="https://www.suse.com/security/cve/CVE-2022-50178/" source="CVE"/>
		<reference ref_id="CVE-2022-50187" ref_url="https://www.suse.com/security/cve/CVE-2022-50187/" source="CVE"/>
		<reference ref_id="CVE-2022-50213" ref_url="https://www.suse.com/security/cve/CVE-2022-50213/" source="CVE"/>
		<reference ref_id="CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387/" source="CVE"/>
		<reference ref_id="CVE-2023-53181" ref_url="https://www.suse.com/security/cve/CVE-2023-53181/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7683.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7683.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36558">CVE-2020-36558 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47103/">CVE-2021-47103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47103">CVE-2021-47103 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47213/">CVE-2021-47213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47213">CVE-2021-47213 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47639/">CVE-2021-47639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47639">CVE-2021-47639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47649/">CVE-2021-47649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47649">CVE-2021-47649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47657/">CVE-2021-47657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47657">CVE-2021-47657 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1158/">CVE-2022-1158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1263/">CVE-2022-1263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1280/">CVE-2022-1280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1280">CVE-2022-1280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1852/">CVE-2022-1852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20572/">CVE-2022-20572 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20572">CVE-2022-20572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2078/">CVE-2022-2078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23960/">CVE-2022-23960 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23960">CVE-2022-23960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2503/">CVE-2022-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2503">CVE-2022-2503 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2639">CVE-2022-2639 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27950/">CVE-2022-27950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27950">CVE-2022-27950 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2938/">CVE-2022-2938 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2938">CVE-2022-2938 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3107/">CVE-2022-3107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3107">CVE-2022-3107 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49044/">CVE-2022-49044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49044">CVE-2022-49044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49060/">CVE-2022-49060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49060">CVE-2022-49060 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49063/">CVE-2022-49063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49063">CVE-2022-49063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49066/">CVE-2022-49066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49066">CVE-2022-49066 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49086/">CVE-2022-49086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49086">CVE-2022-49086 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49098/">CVE-2022-49098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49098">CVE-2022-49098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49122/">CVE-2022-49122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49122">CVE-2022-49122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49123/">CVE-2022-49123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49123">CVE-2022-49123 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49129/">CVE-2022-49129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49129">CVE-2022-49129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49130/">CVE-2022-49130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49130">CVE-2022-49130 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49145/">CVE-2022-49145 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49145">CVE-2022-49145 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49156/">CVE-2022-49156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49156">CVE-2022-49156 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49158/">CVE-2022-49158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49158">CVE-2022-49158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49160/">CVE-2022-49160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49160">CVE-2022-49160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49175/">CVE-2022-49175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49175">CVE-2022-49175 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49199/">CVE-2022-49199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49199">CVE-2022-49199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49235/">CVE-2022-49235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49235">CVE-2022-49235 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49238/">CVE-2022-49238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49238">CVE-2022-49238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49259/">CVE-2022-49259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49259">CVE-2022-49259 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49263/">CVE-2022-49263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49263">CVE-2022-49263 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49265/">CVE-2022-49265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49265">CVE-2022-49265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49268/">CVE-2022-49268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49268">CVE-2022-49268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49272/">CVE-2022-49272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49272">CVE-2022-49272 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49288/">CVE-2022-49288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49288">CVE-2022-49288 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49290/">CVE-2022-49290 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49290">CVE-2022-49290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49292/">CVE-2022-49292 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49292">CVE-2022-49292 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49343/">CVE-2022-49343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49343">CVE-2022-49343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49347/">CVE-2022-49347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49347">CVE-2022-49347 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49349/">CVE-2022-49349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49349">CVE-2022-49349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49374/">CVE-2022-49374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49374">CVE-2022-49374 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49378/">CVE-2022-49378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49378">CVE-2022-49378 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49398/">CVE-2022-49398 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49398">CVE-2022-49398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49404/">CVE-2022-49404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49404">CVE-2022-49404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49409/">CVE-2022-49409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49409">CVE-2022-49409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49418/">CVE-2022-49418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49418">CVE-2022-49418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49426/">CVE-2022-49426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49426">CVE-2022-49426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49433/">CVE-2022-49433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49433">CVE-2022-49433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49515/">CVE-2022-49515 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49515">CVE-2022-49515 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49534/">CVE-2022-49534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49534">CVE-2022-49534 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49536/">CVE-2022-49536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49536">CVE-2022-49536 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49537/">CVE-2022-49537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49537">CVE-2022-49537 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49538/">CVE-2022-49538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49538">CVE-2022-49538 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49541/">CVE-2022-49541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49541">CVE-2022-49541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49543/">CVE-2022-49543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49543">CVE-2022-49543 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49559/">CVE-2022-49559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49559">CVE-2022-49559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49561/">CVE-2022-49561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49561">CVE-2022-49561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49584/">CVE-2022-49584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49584">CVE-2022-49584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49605/">CVE-2022-49605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49605">CVE-2022-49605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49606/">CVE-2022-49606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49606">CVE-2022-49606 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2022-49610/">CVE-2022-49610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49610">CVE-2022-49610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49611/">CVE-2022-49611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49611">CVE-2022-49611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49615/">CVE-2022-49615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49615">CVE-2022-49615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49616/">CVE-2022-49616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49616">CVE-2022-49616 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49625/">CVE-2022-49625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49625">CVE-2022-49625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49626/">CVE-2022-49626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49626">CVE-2022-49626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49664/">CVE-2022-49664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49664">CVE-2022-49664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49669/">CVE-2022-49669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49669">CVE-2022-49669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49671/">CVE-2022-49671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49671">CVE-2022-49671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49673/">CVE-2022-49673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49673">CVE-2022-49673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49674/">CVE-2022-49674 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49674">CVE-2022-49674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49695/">CVE-2022-49695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49695">CVE-2022-49695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49697/">CVE-2022-49697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49697">CVE-2022-49697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49698/">CVE-2022-49698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49698">CVE-2022-49698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49707/">CVE-2022-49707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49707">CVE-2022-49707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49708/">CVE-2022-49708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49708">CVE-2022-49708 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49710/">CVE-2022-49710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49710">CVE-2022-49710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50027/">CVE-2022-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50027">CVE-2022-50027 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50030/">CVE-2022-50030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50030">CVE-2022-50030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50053/">CVE-2022-50053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50053">CVE-2022-50053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50054/">CVE-2022-50054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50054">CVE-2022-50054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50055/">CVE-2022-50055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50055">CVE-2022-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50069/">CVE-2022-50069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50069">CVE-2022-50069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50081/">CVE-2022-50081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50081">CVE-2022-50081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50084/">CVE-2022-50084 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50084">CVE-2022-50084 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50085/">CVE-2022-50085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50085">CVE-2022-50085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50092/">CVE-2022-50092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50092">CVE-2022-50092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50110/">CVE-2022-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50110">CVE-2022-50110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50115/">CVE-2022-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50115">CVE-2022-50115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50177/">CVE-2022-50177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50177">CVE-2022-50177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50178/">CVE-2022-50178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50178">CVE-2022-50178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50187/">CVE-2022-50187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50187">CVE-2022-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50213/">CVE-2022-50213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50213">CVE-2022-50213 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53181/">CVE-2023-53181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53181">CVE-2023-53181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841274" comment="bpftool-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841275" comment="kernel-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841276" comment="kernel-abi-stablelists-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841277" comment="kernel-core-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841278" comment="kernel-cross-headers-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841279" comment="kernel-debug-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841280" comment="kernel-debug-core-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841282" comment="kernel-debug-modules-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841283" comment="kernel-debug-modules-extra-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841285" comment="kernel-doc-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841286" comment="kernel-headers-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841287" comment="kernel-modules-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841288" comment="kernel-modules-extra-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841289" comment="kernel-tools-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841290" comment="kernel-tools-libs-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841292" comment="perf-4.18.0-425.3.1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841293" comment="python3-perf-4.18.0-425.3.1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2507" version="1" class="patch">
	<metadata>
		<title>security update for xmlrpc-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7692.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7692.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841294" comment="xmlrpc-c-1.51.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841295" comment="xmlrpc-c-c++-1.51.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841296" comment="xmlrpc-c-client-1.51.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841297" comment="xmlrpc-c-client++-1.51.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841298" comment="xmlrpc-c-devel-1.51.0-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2508" version="1" class="patch">
	<metadata>
		<title>security update for gdisk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-0256" ref_url="https://www.suse.com/security/cve/CVE-2020-0256/" source="CVE"/>
		<reference ref_id="CVE-2021-0308" ref_url="https://www.suse.com/security/cve/CVE-2021-0308/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0256/">CVE-2020-0256 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0256">CVE-2020-0256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0308/">CVE-2021-0308 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0308">CVE-2021-0308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841299" comment="gdisk-1.0.3-11.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2509" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22662" ref_url="https://www.suse.com/security/cve/CVE-2022-22662/" source="CVE"/>
		<reference ref_id="CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700/" source="CVE"/>
		<reference ref_id="CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709/" source="CVE"/>
		<reference ref_id="CVE-2022-26710" ref_url="https://www.suse.com/security/cve/CVE-2022-26710/" source="CVE"/>
		<reference ref_id="CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716/" source="CVE"/>
		<reference ref_id="CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717/" source="CVE"/>
		<reference ref_id="CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719/" source="CVE"/>
		<reference ref_id="CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293/" source="CVE"/>
		<reference ref_id="CVE-2022-32792" ref_url="https://www.suse.com/security/cve/CVE-2022-32792/" source="CVE"/>
		<reference ref_id="CVE-2022-32816" ref_url="https://www.suse.com/security/cve/CVE-2022-32816/" source="CVE"/>
		<reference ref_id="CVE-2022-32891" ref_url="https://www.suse.com/security/cve/CVE-2022-32891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7704.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7704.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22662/">CVE-2022-22662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22662">CVE-2022-22662 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26710/">CVE-2022-26710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26710">CVE-2022-26710 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32792/">CVE-2022-32792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32792">CVE-2022-32792 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32816/">CVE-2022-32816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32816">CVE-2022-32816 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-32891/">CVE-2022-32891 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32891">CVE-2022-32891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841300" comment="glib2-2.56.4-159.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841301" comment="glib2-devel-2.56.4-159.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841302" comment="glib2-doc-2.56.4-159.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841303" comment="glib2-fam-2.56.4-159.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841304" comment="glib2-static-2.56.4-159.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841305" comment="glib2-tests-2.56.4-159.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841306" comment="webkit2gtk3-2.36.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841307" comment="webkit2gtk3-devel-2.36.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841308" comment="webkit2gtk3-jsc-2.36.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841309" comment="webkit2gtk3-jsc-devel-2.36.7-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2510" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2016-3709" ref_url="https://www.suse.com/security/cve/CVE-2016-3709/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7715.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7715.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-3709/">CVE-2016-3709 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3709">CVE-2016-3709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841310" comment="libxml2-2.9.7-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841311" comment="libxml2-devel-2.9.7-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841312" comment="python3-libxml2-2.9.7-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2511" version="1" class="patch">
	<metadata>
		<title>security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7720.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7720.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841313" comment="e2fsprogs-1.45.6-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841314" comment="e2fsprogs-devel-1.45.6-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841315" comment="e2fsprogs-libs-1.45.6-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841316" comment="libcom_err-1.45.6-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841317" comment="libcom_err-devel-1.45.6-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841318" comment="libss-1.45.6-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841319" comment="libss-devel-1.45.6-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2512" version="1" class="patch">
	<metadata>
		<title>security update for libldb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7730.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7730.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32746">CVE-2022-32746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841320" comment="ldb-tools-2.5.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841321" comment="libldb-2.5.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841322" comment="libldb-devel-2.5.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841323" comment="python-ldb-devel-common-2.5.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841324" comment="python3-ldb-2.5.2-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841325" comment="python3-ldb-devel-2.5.2-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2513" version="1" class="patch">
	<metadata>
		<title>security update for freetype (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404/" source="CVE"/>
		<reference ref_id="CVE-2022-27405" ref_url="https://www.suse.com/security/cve/CVE-2022-27405/" source="CVE"/>
		<reference ref_id="CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7745.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7745.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">CVE-2022-27404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27405/">CVE-2022-27405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27405">CVE-2022-27405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27406">CVE-2022-27406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841326" comment="freetype-2.9.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841327" comment="freetype-devel-2.9.1-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2514" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7790.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7790.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841328" comment="bind-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841329" comment="bind-chroot-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841330" comment="bind-devel-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841331" comment="bind-export-devel-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841332" comment="bind-export-libs-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841333" comment="bind-libs-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841334" comment="bind-libs-lite-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841335" comment="bind-license-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841336" comment="bind-lite-devel-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841337" comment="bind-pkcs11-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841338" comment="bind-pkcs11-devel-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841339" comment="bind-pkcs11-libs-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841340" comment="bind-pkcs11-utils-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841341" comment="bind-sdb-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841342" comment="bind-sdb-chroot-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841343" comment="bind-utils-9.11.36-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841344" comment="python3-bind-9.11.36-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2515" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7793.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7793.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841345" comment="rsync-3.1.3-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841346" comment="rsync-daemon-3.1.3-19.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2516" version="1" class="patch">
	<metadata>
		<title>security update for mingw-expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7811.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7811.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841347" comment="mingw32-expat-2.4.8-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841348" comment="mingw64-expat-2.4.8-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2517" version="1" class="patch">
	<metadata>
		<title>security update for mingw-zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7813.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7813.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841349" comment="mingw32-zlib-1.2.8-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841350" comment="mingw32-zlib-static-1.2.8-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841351" comment="mingw64-zlib-1.2.8-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841352" comment="mingw64-zlib-static-1.2.8-10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2518" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-35255" ref_url="https://www.suse.com/security/cve/CVE-2022-35255/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7821.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7821.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35255/">CVE-2022-35255 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35255">CVE-2022-35255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841353" comment="nodejs-18.9.1-1.module+el8.7.0+16806+4109802b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841354" comment="nodejs-devel-18.9.1-1.module+el8.7.0+16806+4109802b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841355" comment="nodejs-docs-18.9.1-1.module+el8.7.0+16806+4109802b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841356" comment="nodejs-full-i18n-18.9.1-1.module+el8.7.0+16806+4109802b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841357" comment="nodejs-nodemon-2.0.19-1.module+el8.7.0+16061+0a247725 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841358" comment="nodejs-packaging-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841359" comment="nodejs-packaging-bundler-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841360" comment="npm-8.19.1-1.18.9.1.1.module+el8.7.0+16806+4109802b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2519" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989/" source="CVE"/>
		<reference ref_id="CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7822.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7822.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2989">CVE-2022-2989 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2990">CVE-2022-2990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841361" comment="aardvark-dns-1.1.0-5.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841362" comment="buildah-1.27.2-2.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841363" comment="buildah-tests-1.27.2-2.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841364" comment="cockpit-podman-53-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841365" comment="conmon-2.1.4-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841366" comment="container-selinux-2.189.0-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841367" comment="containernetworking-plugins-1.1.1-3.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841368" comment="containers-common-1-43.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841369" comment="crit-3.15-3.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841370" comment="criu-3.15-3.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841371" comment="criu-devel-3.15-3.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841372" comment="criu-libs-3.15-3.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841373" comment="crun-1.5-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841374" comment="fuse-overlayfs-1.9-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841375" comment="libslirp-4.4.0-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841376" comment="libslirp-devel-4.4.0-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841377" comment="netavark-1.1.0-7.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841378" comment="oci-seccomp-bpf-hook-1.2.6-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841379" comment="podman-4.2.0-4.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841380" comment="podman-catatonit-4.2.0-4.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841381" comment="podman-docker-4.2.0-4.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841382" comment="podman-gvproxy-4.2.0-4.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841383" comment="podman-plugins-4.2.0-4.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841384" comment="podman-remote-4.2.0-4.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841385" comment="podman-tests-4.2.0-4.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841386" comment="python3-criu-3.15-3.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841387" comment="python3-podman-4.2.1-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841388" comment="runc-1.1.4-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841389" comment="skopeo-1.9.3-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841390" comment="skopeo-tests-1.9.3-1.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841391" comment="slirp4netns-1.2.0-2.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841392" comment="toolbox-0.0.99.3-0.6.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841393" comment="toolbox-tests-0.0.99.3-0.6.module+el8.7.0+17064+3b31f55c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841394" comment="udica-0.2.6-3.module+el8.7.0+17064+3b31f55c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2520" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41032" ref_url="https://www.suse.com/security/cve/CVE-2022-41032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7826.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7826.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41032/">CVE-2022-41032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41032">CVE-2022-41032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841395" comment="aspnetcore-runtime-7.0-7.0.0-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841396" comment="aspnetcore-targeting-pack-7.0-7.0.0-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841397" comment="dotnet-7.0.100-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841398" comment="dotnet-apphost-pack-7.0-7.0.0-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841399" comment="dotnet-host-7.0.0-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841400" comment="dotnet-hostfxr-7.0-7.0.0-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841401" comment="dotnet-runtime-7.0-7.0.0-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841402" comment="dotnet-sdk-7.0-7.0.100-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841403" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841404" comment="dotnet-targeting-pack-7.0-7.0.0-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841405" comment="dotnet-templates-7.0-7.0.100-0.4.rc2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841406" comment="netstandard-targeting-pack-2.1-7.0.100-0.4.rc2.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2521" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44531" ref_url="https://www.suse.com/security/cve/CVE-2021-44531/" source="CVE"/>
		<reference ref_id="CVE-2021-44532" ref_url="https://www.suse.com/security/cve/CVE-2021-44532/" source="CVE"/>
		<reference ref_id="CVE-2021-44533" ref_url="https://www.suse.com/security/cve/CVE-2021-44533/" source="CVE"/>
		<reference ref_id="CVE-2022-21824" ref_url="https://www.suse.com/security/cve/CVE-2022-21824/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7830.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7830.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44531/">CVE-2021-44531 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44531">CVE-2021-44531 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44532/">CVE-2021-44532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44532">CVE-2021-44532 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44533/">CVE-2021-44533 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44533">CVE-2021-44533 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21824/">CVE-2022-21824 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21824">CVE-2022-21824 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841407" comment="nodejs-14.20.1-2.module+el8.7.0+16991+b0a68a3e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841408" comment="nodejs-devel-14.20.1-2.module+el8.7.0+16991+b0a68a3e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841409" comment="nodejs-docs-14.20.1-2.module+el8.7.0+16991+b0a68a3e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841410" comment="nodejs-full-i18n-14.20.1-2.module+el8.7.0+16991+b0a68a3e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841411" comment="nodejs-nodemon-2.0.19-2.module+el8.7.0+16991+b0a68a3e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841412" comment="npm-6.14.17-1.14.20.1.2.module+el8.7.0+16991+b0a68a3e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2522" version="1" class="patch">
	<metadata>
		<title>security update for device-mapper-multipath (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3787" ref_url="https://www.suse.com/security/cve/CVE-2022-3787/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3787/">CVE-2022-3787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3787">CVE-2022-3787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841413" comment="device-mapper-multipath-0.8.4-28.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841414" comment="device-mapper-multipath-devel-0.8.4-28.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841415" comment="device-mapper-multipath-libs-0.8.4-28.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841416" comment="kpartx-0.8.4-28.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841417" comment="libdmmp-0.8.4-28.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2523" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8547.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8547.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841418" comment="thunderbird-102.5.0-2.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2524" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8554.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8554.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841419" comment="firefox-102.5.0-1.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2525" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8638.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8638.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841420" comment="krb5-devel-1.18.2-22.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841421" comment="krb5-libs-1.18.2-22.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841422" comment="krb5-pkinit-1.18.2-22.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841423" comment="krb5-server-1.18.2-22.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841424" comment="krb5-server-ldap-1.18.2-22.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841425" comment="krb5-workstation-1.18.2-22.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841426" comment="libkadm5-1.18.2-22.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2526" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-45060" ref_url="https://www.suse.com/security/cve/CVE-2022-45060/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8649.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8649.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45060/">CVE-2022-45060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45060">CVE-2022-45060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841427" comment="varnish-6.0.8-2.module+el8.7.0+17239+94d153bd.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841428" comment="varnish-devel-6.0.8-2.module+el8.7.0+17239+94d153bd.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841429" comment="varnish-docs-6.0.8-2.module+el8.7.0+17239+94d153bd.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839144" comment="varnish-modules-0.15.0-6.module+el8.5.0+11976+0b4af72d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2527" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3517" ref_url="https://www.suse.com/security/cve/CVE-2022-3517/" source="CVE"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8833.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8833.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3517/">CVE-2022-3517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3517">CVE-2022-3517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841430" comment="nodejs-18.12.1-2.module+el8.7.0+17306+fc023f99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841431" comment="nodejs-devel-18.12.1-2.module+el8.7.0+17306+fc023f99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841432" comment="nodejs-docs-18.12.1-2.module+el8.7.0+17306+fc023f99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841433" comment="nodejs-full-i18n-18.12.1-2.module+el8.7.0+17306+fc023f99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841434" comment="nodejs-nodemon-2.0.20-1.module+el8.7.0+17282+f47dd33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841358" comment="nodejs-packaging-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841359" comment="nodejs-packaging-bundler-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841435" comment="npm-8.19.2-1.18.12.1.2.module+el8.7.0+17306+fc023f99 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2528" version="1" class="patch">
	<metadata>
		<title>security update for prometheus-jmx-exporter (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1471" ref_url="https://www.suse.com/security/cve/CVE-2022-1471/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:9058.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:9058.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1471/">CVE-2022-1471 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1471">CVE-2022-1471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841436" comment="prometheus-jmx-exporter-0.12.0-9.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841437" comment="prometheus-jmx-exporter-openjdk11-0.12.0-9.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841438" comment="prometheus-jmx-exporter-openjdk17-0.12.0-9.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841439" comment="prometheus-jmx-exporter-openjdk8-0.12.0-9.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2529" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:9067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:9067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841440" comment="firefox-102.6.0-1.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2530" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44531" ref_url="https://www.suse.com/security/cve/CVE-2021-44531/" source="CVE"/>
		<reference ref_id="CVE-2021-44532" ref_url="https://www.suse.com/security/cve/CVE-2021-44532/" source="CVE"/>
		<reference ref_id="CVE-2021-44533" ref_url="https://www.suse.com/security/cve/CVE-2021-44533/" source="CVE"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2022-21824" ref_url="https://www.suse.com/security/cve/CVE-2022-21824/" source="CVE"/>
		<reference ref_id="CVE-2022-3517" ref_url="https://www.suse.com/security/cve/CVE-2022-3517/" source="CVE"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:9073.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:9073.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44531/">CVE-2021-44531 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44531">CVE-2021-44531 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44532/">CVE-2021-44532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44532">CVE-2021-44532 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44533/">CVE-2021-44533 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44533">CVE-2021-44533 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">CVE-2021-44906 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21824/">CVE-2022-21824 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21824">CVE-2022-21824 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3517/">CVE-2022-3517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3517">CVE-2022-3517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841441" comment="nodejs-16.18.1-3.module+el8.7.0+17465+1a1abd74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841442" comment="nodejs-devel-16.18.1-3.module+el8.7.0+17465+1a1abd74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841443" comment="nodejs-docs-16.18.1-3.module+el8.7.0+17465+1a1abd74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841444" comment="nodejs-full-i18n-16.18.1-3.module+el8.7.0+17465+1a1abd74 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841445" comment="nodejs-nodemon-2.0.20-2.module+el8.7.0+17412+bb0e4a6b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838910" comment="nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841446" comment="npm-8.19.2-1.16.18.1.3.module+el8.7.0+17465+1a1abd74 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2531" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-45414" ref_url="https://www.suse.com/security/cve/CVE-2022-45414/" source="CVE"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:9074.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:9074.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-45414/">CVE-2022-45414 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45414">CVE-2022-45414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841447" comment="thunderbird-102.6.0-2.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2532" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-24999" ref_url="https://www.suse.com/security/cve/CVE-2022-24999/" source="CVE"/>
		<reference ref_id="CVE-2022-3517" ref_url="https://www.suse.com/security/cve/CVE-2022-3517/" source="CVE"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">CVE-2021-44906 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0235">CVE-2022-0235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24999/">CVE-2022-24999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24999">CVE-2022-24999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3517/">CVE-2022-3517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3517">CVE-2022-3517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841448" comment="nodejs-14.21.1-2.module+el8.7.0+17528+a329cd47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841449" comment="nodejs-devel-14.21.1-2.module+el8.7.0+17528+a329cd47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841450" comment="nodejs-docs-14.21.1-2.module+el8.7.0+17528+a329cd47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841451" comment="nodejs-full-i18n-14.21.1-2.module+el8.7.0+17528+a329cd47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841452" comment="nodejs-nodemon-2.0.20-2.module+el8.7.0+17528+a329cd47 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841453" comment="npm-6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2533" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-21538" ref_url="https://www.suse.com/security/cve/CVE-2023-21538/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21538/">CVE-2023-21538 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21538">CVE-2023-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841454" comment="aspnetcore-runtime-6.0-6.0.13-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841455" comment="aspnetcore-targeting-pack-6.0-6.0.13-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841456" comment="dotnet-apphost-pack-6.0-6.0.13-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841457" comment="dotnet-hostfxr-6.0-6.0.13-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841458" comment="dotnet-runtime-6.0-6.0.13-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841459" comment="dotnet-sdk-6.0-6.0.113-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841460" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841461" comment="dotnet-targeting-pack-6.0-6.0.13-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841462" comment="dotnet-templates-6.0-6.0.113-1.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2534" version="1" class="patch">
	<metadata>
		<title>security update for usbguard (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-25058" ref_url="https://www.suse.com/security/cve/CVE-2019-25058/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0087.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0087.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25058/">CVE-2019-25058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25058">CVE-2019-25058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841463" comment="usbguard-1.0.0-8.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841464" comment="usbguard-dbus-1.0.0-8.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841465" comment="usbguard-notifier-1.0.0-8.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841466" comment="usbguard-selinux-1.0.0-8.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841467" comment="usbguard-tools-1.0.0-8.el8_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2535" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056/" source="CVE"/>
		<reference ref_id="CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057/" source="CVE"/>
		<reference ref_id="CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058/" source="CVE"/>
		<reference ref_id="CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519/" source="CVE"/>
		<reference ref_id="CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520/" source="CVE"/>
		<reference ref_id="CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521/" source="CVE"/>
		<reference ref_id="CVE-2022-2867" ref_url="https://www.suse.com/security/cve/CVE-2022-2867/" source="CVE"/>
		<reference ref_id="CVE-2022-2868" ref_url="https://www.suse.com/security/cve/CVE-2022-2868/" source="CVE"/>
		<reference ref_id="CVE-2022-2869" ref_url="https://www.suse.com/security/cve/CVE-2022-2869/" source="CVE"/>
		<reference ref_id="CVE-2022-2953" ref_url="https://www.suse.com/security/cve/CVE-2022-2953/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0095.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0095.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2056">CVE-2022-2056 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2057">CVE-2022-2057 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2058">CVE-2022-2058 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519">CVE-2022-2519 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520">CVE-2022-2520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521">CVE-2022-2521 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2867/">CVE-2022-2867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2867">CVE-2022-2867 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2868/">CVE-2022-2868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2868">CVE-2022-2868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2869/">CVE-2022-2869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2869">CVE-2022-2869 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2953/">CVE-2022-2953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2953">CVE-2022-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841468" comment="libtiff-4.0.9-26.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841469" comment="libtiff-devel-4.0.9-26.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841470" comment="libtiff-tools-4.0.9-26.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2536" version="1" class="patch">
	<metadata>
		<title>security update for dbus (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010/" source="CVE"/>
		<reference ref_id="CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011/" source="CVE"/>
		<reference ref_id="CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0096.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0096.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841471" comment="dbus-1.12.8-23.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841472" comment="dbus-common-1.12.8-23.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841473" comment="dbus-daemon-1.12.8-23.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841474" comment="dbus-devel-1.12.8-23.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841475" comment="dbus-libs-1.12.8-23.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841476" comment="dbus-tools-1.12.8-23.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841477" comment="dbus-x11-1.12.8-23.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2537" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0100.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0100.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841478" comment="systemd-239-68.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841479" comment="systemd-container-239-68.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841480" comment="systemd-devel-239-68.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841481" comment="systemd-journal-remote-239-68.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841482" comment="systemd-libs-239-68.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841483" comment="systemd-pam-239-68.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841484" comment="systemd-tests-239-68.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841485" comment="systemd-udev-239-68.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2538" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<reference ref_id="CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139/" source="CVE"/>
		<reference ref_id="CVE-2022-50000" ref_url="https://www.suse.com/security/cve/CVE-2022-50000/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0101.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0101.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4139">CVE-2022-4139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50000/">CVE-2022-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50000">CVE-2022-50000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841486" comment="bpftool-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841487" comment="kernel-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841488" comment="kernel-abi-stablelists-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841489" comment="kernel-core-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841490" comment="kernel-cross-headers-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841491" comment="kernel-debug-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841492" comment="kernel-debug-core-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841494" comment="kernel-debug-modules-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841495" comment="kernel-debug-modules-extra-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841497" comment="kernel-doc-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841498" comment="kernel-headers-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841499" comment="kernel-modules-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841500" comment="kernel-modules-extra-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841501" comment="kernel-tools-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841502" comment="kernel-tools-libs-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841504" comment="perf-4.18.0-425.10.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841505" comment="python3-perf-4.18.0-425.10.1.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2539" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0103.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0103.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841506" comment="expat-2.2.5-10.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841507" comment="expat-devel-2.2.5-10.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2540" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35737">CVE-2022-35737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841508" comment="lemon-3.26.0-17.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841509" comment="sqlite-3.26.0-17.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841510" comment="sqlite-devel-3.26.0-17.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841511" comment="sqlite-doc-3.26.0-17.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841512" comment="sqlite-libs-3.26.0-17.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2541" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841513" comment="postgresql-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841514" comment="postgresql-contrib-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841515" comment="postgresql-docs-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841516" comment="postgresql-plperl-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841517" comment="postgresql-plpython3-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841518" comment="postgresql-pltcl-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841519" comment="postgresql-server-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841520" comment="postgresql-server-devel-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841521" comment="postgresql-static-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841522" comment="postgresql-test-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841523" comment="postgresql-test-rpm-macros-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841524" comment="postgresql-upgrade-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841525" comment="postgresql-upgrade-devel-10.23-1.module+el8.7.0+17280+3a452e1f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2542" version="1" class="patch">
	<metadata>
		<title>security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0116.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0116.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46848">CVE-2021-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841526" comment="libtasn1-4.13-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841527" comment="libtasn1-devel-4.13-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841528" comment="libtasn1-tools-4.13-4.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2543" version="1" class="patch">
	<metadata>
		<title>security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2132" ref_url="https://www.suse.com/security/cve/CVE-2022-2132/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0171.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0171.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2132/">CVE-2022-2132 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2132">CVE-2022-2132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841529" comment="dpdk-21.11-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841530" comment="dpdk-devel-21.11-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841531" comment="dpdk-doc-21.11-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841532" comment="dpdk-tools-21.11-2.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2544" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303/" source="CVE"/>
		<reference ref_id="CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0173.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0173.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841533" comment="libxml2-2.9.7-15.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841534" comment="libxml2-devel-2.9.7-15.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841535" comment="python3-libxml2-2.9.7-15.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2545" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841536" comment="java-17-openjdk-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841537" comment="java-17-openjdk-demo-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841538" comment="java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841539" comment="java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841540" comment="java-17-openjdk-devel-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841541" comment="java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841542" comment="java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841543" comment="java-17-openjdk-fastdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841544" comment="java-17-openjdk-headless-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841545" comment="java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841546" comment="java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841547" comment="java-17-openjdk-javadoc-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841548" comment="java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841549" comment="java-17-openjdk-jmods-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841550" comment="java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841551" comment="java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841552" comment="java-17-openjdk-slowdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841553" comment="java-17-openjdk-src-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841554" comment="java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841555" comment="java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841556" comment="java-17-openjdk-static-libs-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841557" comment="java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841558" comment="java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2546" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0200.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0200.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841559" comment="java-11-openjdk-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841560" comment="java-11-openjdk-demo-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841561" comment="java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841562" comment="java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841563" comment="java-11-openjdk-devel-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841564" comment="java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841565" comment="java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841566" comment="java-11-openjdk-fastdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841567" comment="java-11-openjdk-headless-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841568" comment="java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841569" comment="java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841570" comment="java-11-openjdk-javadoc-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841571" comment="java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841572" comment="java-11-openjdk-jmods-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841573" comment="java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841574" comment="java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841575" comment="java-11-openjdk-slowdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841576" comment="java-11-openjdk-src-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841577" comment="java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841578" comment="java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841579" comment="java-11-openjdk-static-libs-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841580" comment="java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841581" comment="java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2547" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0208.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0208.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841582" comment="java-1.8.0-openjdk-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841583" comment="java-1.8.0-openjdk-accessibility-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841584" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841585" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841586" comment="java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841587" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841588" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841589" comment="java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841590" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841591" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841592" comment="java-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841593" comment="java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841594" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841595" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841596" comment="java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841597" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841598" comment="java-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841599" comment="java-1.8.0-openjdk-src-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841600" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841601" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2548" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0284.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0284.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841602" comment="sudo-1.8.29-8.el8_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2549" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0288.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0288.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841603" comment="firefox-102.7.0-1.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2550" version="1" class="patch">
	<metadata>
		<title>security update for libXpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-44617" ref_url="https://www.suse.com/security/cve/CVE-2022-44617/" source="CVE"/>
		<reference ref_id="CVE-2022-46285" ref_url="https://www.suse.com/security/cve/CVE-2022-46285/" source="CVE"/>
		<reference ref_id="CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0379.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0379.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44617/">CVE-2022-44617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44617">CVE-2022-44617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46285/">CVE-2022-46285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46285">CVE-2022-46285 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841604" comment="libXpm-3.5.12-9.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841605" comment="libXpm-devel-3.5.12-9.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2551" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0446.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0446.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841606" comment="delve-1.8.3-1.module+el8.7.0+15126+0e0a42d9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841607" comment="go-toolset-1.18.9-1.module+el8.7.0+17845+708ebe87 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841608" comment="golang-1.18.9-1.module+el8.7.0+17640+84246675 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841609" comment="golang-bin-1.18.9-1.module+el8.7.0+17640+84246675 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841610" comment="golang-docs-1.18.9-1.module+el8.7.0+17640+84246675 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841611" comment="golang-misc-1.18.9-1.module+el8.7.0+17640+84246675 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841612" comment="golang-race-1.18.9-1.module+el8.7.0+17640+84246675 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841613" comment="golang-src-1.18.9-1.module+el8.7.0+17640+84246675 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841614" comment="golang-tests-1.18.9-1.module+el8.7.0+17640+84246675 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2552" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0463.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0463.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841615" comment="thunderbird-102.7.1-1.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2553" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0430" ref_url="https://www.suse.com/security/cve/CVE-2023-0430/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0606.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0606.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0430/">CVE-2023-0430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0430">CVE-2023-0430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841616" comment="thunderbird-102.7.1-2.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2554" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521/" source="CVE"/>
		<reference ref_id="CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0610.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0610.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841617" comment="git-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841618" comment="git-all-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841619" comment="git-core-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841620" comment="git-core-doc-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841621" comment="git-credential-libsecret-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841622" comment="git-daemon-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841623" comment="git-email-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841624" comment="git-gui-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841625" comment="git-instaweb-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841626" comment="git-subtree-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841627" comment="git-svn-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841628" comment="gitk-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841629" comment="gitweb-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841630" comment="perl-Git-2.31.1-3.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841631" comment="perl-Git-SVN-2.31.1-3.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2555" version="1" class="patch">
	<metadata>
		<title>security update for libksba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0625.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0625.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841632" comment="libksba-1.3.5-9.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841633" comment="libksba-devel-1.3.5-9.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2556" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0662.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0662.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841634" comment="tigervnc-1.12.0-9.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841635" comment="tigervnc-icons-1.12.0-9.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841636" comment="tigervnc-license-1.12.0-9.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841637" comment="tigervnc-selinux-1.12.0-9.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841638" comment="tigervnc-server-1.12.0-9.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841639" comment="tigervnc-server-minimal-1.12.0-9.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841640" comment="tigervnc-server-module-1.12.0-9.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2557" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0808.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0808.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841641" comment="firefox-102.8.0-2.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2558" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0616" ref_url="https://www.suse.com/security/cve/CVE-2023-0616/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0821.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0821.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0616/">CVE-2023-0616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0616">CVE-2023-0616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841642" comment="thunderbird-102.8.0-2.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2559" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2873" ref_url="https://www.suse.com/security/cve/CVE-2022-2873/" source="CVE"/>
		<reference ref_id="CVE-2022-41222" ref_url="https://www.suse.com/security/cve/CVE-2022-41222/" source="CVE"/>
		<reference ref_id="CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945/" source="CVE"/>
		<reference ref_id="CVE-2022-50235" ref_url="https://www.suse.com/security/cve/CVE-2022-50235/" source="CVE"/>
		<reference ref_id="CVE-2022-50410" ref_url="https://www.suse.com/security/cve/CVE-2022-50410/" source="CVE"/>
		<reference ref_id="CVE-2022-50482" ref_url="https://www.suse.com/security/cve/CVE-2022-50482/" source="CVE"/>
		<reference ref_id="CVE-2022-50487" ref_url="https://www.suse.com/security/cve/CVE-2022-50487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0832.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0832.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2873/">CVE-2022-2873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41222/">CVE-2022-41222 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41222">CVE-2022-41222 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50235/">CVE-2022-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50235">CVE-2022-50235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50410/">CVE-2022-50410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50410">CVE-2022-50410 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50482/">CVE-2022-50482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50482">CVE-2022-50482 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50487/">CVE-2022-50487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50487">CVE-2022-50487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841643" comment="bpftool-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841644" comment="kernel-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841645" comment="kernel-abi-stablelists-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841646" comment="kernel-core-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841647" comment="kernel-cross-headers-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841648" comment="kernel-debug-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841649" comment="kernel-debug-core-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841651" comment="kernel-debug-modules-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841652" comment="kernel-debug-modules-extra-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841654" comment="kernel-doc-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841655" comment="kernel-headers-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841656" comment="kernel-modules-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841657" comment="kernel-modules-extra-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841658" comment="kernel-tools-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841659" comment="kernel-tools-libs-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841661" comment="perf-4.18.0-425.13.1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841662" comment="python3-perf-4.18.0-425.13.1.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2560" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735/" source="CVE"/>
		<reference ref_id="CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861/" source="CVE"/>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0833.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0833.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841663" comment="platform-python-3.6.8-48.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841664" comment="platform-python-debug-3.6.8-48.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841665" comment="platform-python-devel-3.6.8-48.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841666" comment="python3-idle-3.6.8-48.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841667" comment="python3-libs-3.6.8-48.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841668" comment="python3-test-3.6.8-48.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841669" comment="python3-tkinter-3.6.8-48.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2561" version="1" class="patch">
	<metadata>
		<title>security update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0835.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0835.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841670" comment="platform-python-setuptools-39.2.0-6.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841671" comment="python3-setuptools-39.2.0-6.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841672" comment="python3-setuptools-wheel-39.2.0-6.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2562" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841673" comment="systemd-239-68.el8_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841674" comment="systemd-container-239-68.el8_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841675" comment="systemd-devel-239-68.el8_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841676" comment="systemd-journal-remote-239-68.el8_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841677" comment="systemd-libs-239-68.el8_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841678" comment="systemd-pam-239-68.el8_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841679" comment="systemd-tests-239-68.el8_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841680" comment="systemd-udev-239-68.el8_7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2563" version="1" class="patch">
	<metadata>
		<title>security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841681" comment="ctdb-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841682" comment="libsmbclient-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841683" comment="libsmbclient-devel-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841684" comment="libwbclient-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841685" comment="libwbclient-devel-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841686" comment="python3-samba-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841687" comment="python3-samba-test-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841688" comment="samba-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841689" comment="samba-client-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841690" comment="samba-client-libs-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841691" comment="samba-common-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841692" comment="samba-common-libs-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841693" comment="samba-common-tools-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841694" comment="samba-devel-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841695" comment="samba-krb5-printing-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841696" comment="samba-libs-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841697" comment="samba-pidl-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841698" comment="samba-test-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841699" comment="samba-test-libs-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841700" comment="samba-vfs-iouring-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841701" comment="samba-winbind-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841702" comment="samba-winbind-clients-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841703" comment="samba-winbind-krb5-locator-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841704" comment="samba-winbind-modules-4.16.4-4.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841705" comment="samba-winexe-4.16.4-4.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2564" version="1" class="patch">
	<metadata>
		<title>security update for tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841706" comment="tar-1.30-6.el8_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2565" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<reference ref_id="CVE-2022-31630" ref_url="https://www.suse.com/security/cve/CVE-2022-31630/" source="CVE"/>
		<reference ref_id="CVE-2022-31631" ref_url="https://www.suse.com/security/cve/CVE-2022-31631/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<reference ref_id="CVE-2022-4900" ref_url="https://www.suse.com/security/cve/CVE-2022-4900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31630/">CVE-2022-31630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31630">CVE-2022-31630 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31631/">CVE-2022-31631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4900/">CVE-2022-4900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4900">CVE-2022-4900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840372" comment="apcu-panel-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840373" comment="libzip-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840374" comment="libzip-devel-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840375" comment="libzip-tools-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841707" comment="php-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841708" comment="php-bcmath-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841709" comment="php-cli-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841710" comment="php-common-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841711" comment="php-dba-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841712" comment="php-dbg-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841713" comment="php-devel-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841714" comment="php-embedded-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841715" comment="php-enchant-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841716" comment="php-ffi-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841717" comment="php-fpm-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841718" comment="php-gd-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841719" comment="php-gmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841720" comment="php-intl-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841721" comment="php-ldap-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841722" comment="php-mbstring-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841723" comment="php-mysqlnd-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841724" comment="php-odbc-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841725" comment="php-opcache-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841726" comment="php-pdo-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840396" comment="php-pear-1.10.13-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840397" comment="php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840398" comment="php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840399" comment="php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840400" comment="php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840401" comment="php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841727" comment="php-pgsql-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841728" comment="php-process-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841729" comment="php-snmp-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841730" comment="php-soap-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841731" comment="php-xml-8.0.27-1.module+el8.7.0+17863+0ad92cd2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2566" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2006-20001" ref_url="https://www.suse.com/security/cve/CVE-2006-20001/" source="CVE"/>
		<reference ref_id="CVE-2022-36760" ref_url="https://www.suse.com/security/cve/CVE-2022-36760/" source="CVE"/>
		<reference ref_id="CVE-2022-37436" ref_url="https://www.suse.com/security/cve/CVE-2022-37436/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2006-20001/">CVE-2006-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-20001">CVE-2006-20001 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36760/">CVE-2022-36760 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36760">CVE-2022-36760 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-37436/">CVE-2022-37436 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37436">CVE-2022-37436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841732" comment="httpd-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841733" comment="httpd-devel-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841734" comment="httpd-filesystem-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841735" comment="httpd-manual-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841736" comment="httpd-tools-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839914" comment="mod_http2-1.15.7-5.module+el8.6.0+13996+01710940 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841737" comment="mod_ldap-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841738" comment="mod_proxy_html-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841739" comment="mod_session-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841740" comment="mod_ssl-2.4.37-51.module+el8.7.0+18026+7b169787.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2567" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-45442" ref_url="https://www.suse.com/security/cve/CVE-2022-45442/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0855.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0855.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-45442/">CVE-2022-45442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45442">CVE-2022-45442 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841741" comment="pcs-0.10.14-5.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841742" comment="pcs-snmp-0.10.14-5.el8_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2568" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-23529" ref_url="https://www.suse.com/security/cve/CVE-2023-23529/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0902.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0902.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23529/">CVE-2023-23529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23529">CVE-2023-23529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841743" comment="webkit2gtk3-2.36.7-1.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841744" comment="webkit2gtk3-devel-2.36.7-1.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841745" comment="webkit2gtk3-jsc-2.36.7-1.el8_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841746" comment="webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2569" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-23916" ref_url="https://www.suse.com/security/cve/CVE-2023-23916/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1140.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1140.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23916/">CVE-2023-23916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841747" comment="curl-7.61.1-25.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841748" comment="libcurl-7.61.1-25.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841749" comment="libcurl-devel-7.61.1-25.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841750" comment="libcurl-minimal-7.61.1-25.el8_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2570" version="1" class="patch">
	<metadata>
		<title>security update for nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1252.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1252.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841751" comment="nss-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841752" comment="nss-devel-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841753" comment="nss-softokn-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841754" comment="nss-softokn-devel-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841755" comment="nss-softokn-freebl-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841756" comment="nss-softokn-freebl-devel-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841757" comment="nss-sysinit-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841758" comment="nss-tools-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841759" comment="nss-util-3.79.0-11.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841760" comment="nss-util-devel-3.79.0-11.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2571" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841761" comment="firefox-102.9.0-3.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2572" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1403.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1403.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841762" comment="thunderbird-102.9.0-1.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2573" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1405.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1405.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841763" comment="openssl-1.1.1k-9.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841764" comment="openssl-devel-1.1.1k-9.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841765" comment="openssl-libs-1.1.1k-9.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841766" comment="openssl-perl-1.1.1k-9.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2574" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1551.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1551.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841767" comment="tigervnc-1.12.0-9.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841768" comment="tigervnc-icons-1.12.0-9.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841769" comment="tigervnc-license-1.12.0-9.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841770" comment="tigervnc-selinux-1.12.0-9.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841771" comment="tigervnc-server-1.12.0-9.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841772" comment="tigervnc-server-minimal-1.12.0-9.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841773" comment="tigervnc-server-module-1.12.0-9.el8_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2575" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<reference ref_id="CVE-2023-0266" ref_url="https://www.suse.com/security/cve/CVE-2023-0266/" source="CVE"/>
		<reference ref_id="CVE-2023-0386" ref_url="https://www.suse.com/security/cve/CVE-2023-0386/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1566.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1566.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0266/">CVE-2023-0266 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0386/">CVE-2023-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841774" comment="bpftool-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841775" comment="kernel-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841776" comment="kernel-abi-stablelists-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841777" comment="kernel-core-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841778" comment="kernel-cross-headers-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841779" comment="kernel-debug-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841780" comment="kernel-debug-core-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841782" comment="kernel-debug-modules-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841783" comment="kernel-debug-modules-extra-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841785" comment="kernel-doc-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841786" comment="kernel-headers-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841787" comment="kernel-modules-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841788" comment="kernel-modules-extra-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841789" comment="kernel-tools-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841790" comment="kernel-tools-libs-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841792" comment="perf-4.18.0-425.19.2.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841793" comment="python3-perf-4.18.0-425.19.2.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2576" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0361" ref_url="https://www.suse.com/security/cve/CVE-2023-0361/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1569.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1569.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0361/">CVE-2023-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841794" comment="gnutls-3.6.16-6.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841795" comment="gnutls-c++-3.6.16-6.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841796" comment="gnutls-dane-3.6.16-6.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841797" comment="gnutls-devel-3.6.16-6.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841798" comment="gnutls-utils-3.6.16-6.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2577" version="1" class="patch">
	<metadata>
		<title>security update for pesign (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3560" ref_url="https://www.suse.com/security/cve/CVE-2022-3560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1572.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1572.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3560/">CVE-2022-3560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3560">CVE-2022-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841799" comment="pesign-0.112-27.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2578" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625/" source="CVE"/>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1576.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1576.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838952" comment="pg_repack-1.4.6-3.module+el8.5.0+11357+bcc62552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837247" comment="pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837248" comment="postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841800" comment="postgresql-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841801" comment="postgresql-contrib-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841802" comment="postgresql-docs-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841803" comment="postgresql-plperl-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841804" comment="postgresql-plpython3-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841805" comment="postgresql-pltcl-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841806" comment="postgresql-server-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841807" comment="postgresql-server-devel-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841808" comment="postgresql-static-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841809" comment="postgresql-test-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841810" comment="postgresql-test-rpm-macros-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841811" comment="postgresql-upgrade-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841812" comment="postgresql-upgrade-devel-13.10-1.module+el8.7.0+18279+1ca8cf12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2579" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-35065" ref_url="https://www.suse.com/security/cve/CVE-2021-35065/" source="CVE"/>
		<reference ref_id="CVE-2022-25881" ref_url="https://www.suse.com/security/cve/CVE-2022-25881/" source="CVE"/>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-23918" ref_url="https://www.suse.com/security/cve/CVE-2023-23918/" source="CVE"/>
		<reference ref_id="CVE-2023-23919" ref_url="https://www.suse.com/security/cve/CVE-2023-23919/" source="CVE"/>
		<reference ref_id="CVE-2023-23920" ref_url="https://www.suse.com/security/cve/CVE-2023-23920/" source="CVE"/>
		<reference ref_id="CVE-2023-23936" ref_url="https://www.suse.com/security/cve/CVE-2023-23936/" source="CVE"/>
		<reference ref_id="CVE-2023-24807" ref_url="https://www.suse.com/security/cve/CVE-2023-24807/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35065/">CVE-2021-35065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35065">CVE-2021-35065 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25881/">CVE-2022-25881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25881">CVE-2022-25881 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23918/">CVE-2023-23918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23918">CVE-2023-23918 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23919/">CVE-2023-23919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23919">CVE-2023-23919 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23920/">CVE-2023-23920 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23920">CVE-2023-23920 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23936/">CVE-2023-23936 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23936">CVE-2023-23936 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24807/">CVE-2023-24807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24807">CVE-2023-24807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841813" comment="nodejs-16.19.1-1.module+el8.7.0+18373+704f5cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841814" comment="nodejs-devel-16.19.1-1.module+el8.7.0+18373+704f5cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841815" comment="nodejs-docs-16.19.1-1.module+el8.7.0+18373+704f5cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841816" comment="nodejs-full-i18n-16.19.1-1.module+el8.7.0+18373+704f5cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841817" comment="nodejs-nodemon-2.0.20-3.module+el8.7.0+18373+704f5cef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838910" comment="nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841818" comment="npm-8.19.3-1.16.19.1.1.module+el8.7.0+18373+704f5cef is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2580" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-35065" ref_url="https://www.suse.com/security/cve/CVE-2021-35065/" source="CVE"/>
		<reference ref_id="CVE-2022-25881" ref_url="https://www.suse.com/security/cve/CVE-2022-25881/" source="CVE"/>
		<reference ref_id="CVE-2023-23918" ref_url="https://www.suse.com/security/cve/CVE-2023-23918/" source="CVE"/>
		<reference ref_id="CVE-2023-23919" ref_url="https://www.suse.com/security/cve/CVE-2023-23919/" source="CVE"/>
		<reference ref_id="CVE-2023-23920" ref_url="https://www.suse.com/security/cve/CVE-2023-23920/" source="CVE"/>
		<reference ref_id="CVE-2023-23936" ref_url="https://www.suse.com/security/cve/CVE-2023-23936/" source="CVE"/>
		<reference ref_id="CVE-2023-24807" ref_url="https://www.suse.com/security/cve/CVE-2023-24807/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1583.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1583.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35065/">CVE-2021-35065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35065">CVE-2021-35065 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25881/">CVE-2022-25881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25881">CVE-2022-25881 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23918/">CVE-2023-23918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23918">CVE-2023-23918 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23919/">CVE-2023-23919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23919">CVE-2023-23919 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23920/">CVE-2023-23920 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23920">CVE-2023-23920 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23936/">CVE-2023-23936 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23936">CVE-2023-23936 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24807/">CVE-2023-24807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24807">CVE-2023-24807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841819" comment="nodejs-18.14.2-2.module+el8.7.0+18445+9493b6ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841820" comment="nodejs-devel-18.14.2-2.module+el8.7.0+18445+9493b6ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841821" comment="nodejs-docs-18.14.2-2.module+el8.7.0+18445+9493b6ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841822" comment="nodejs-full-i18n-18.14.2-2.module+el8.7.0+18445+9493b6ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841823" comment="nodejs-nodemon-2.0.20-2.module+el8.7.0+18445+9493b6ea is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841358" comment="nodejs-packaging-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841359" comment="nodejs-packaging-bundler-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841824" comment="npm-9.5.0-1.18.14.2.2.module+el8.7.0+18445+9493b6ea is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2581" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1673.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1673.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841825" comment="httpd-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841826" comment="httpd-devel-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841827" comment="httpd-filesystem-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841828" comment="httpd-manual-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841829" comment="httpd-tools-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841830" comment="mod_http2-1.15.7-5.module+el8.7.0+18499+2e106f0b.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841831" comment="mod_ldap-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841832" comment="mod_proxy_html-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841833" comment="mod_session-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841834" comment="mod_ssl-2.4.37-51.module+el8.7.0+18499+2e106f0b.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2582" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-35065" ref_url="https://www.suse.com/security/cve/CVE-2021-35065/" source="CVE"/>
		<reference ref_id="CVE-2022-25881" ref_url="https://www.suse.com/security/cve/CVE-2022-25881/" source="CVE"/>
		<reference ref_id="CVE-2022-3517" ref_url="https://www.suse.com/security/cve/CVE-2022-3517/" source="CVE"/>
		<reference ref_id="CVE-2022-38900" ref_url="https://www.suse.com/security/cve/CVE-2022-38900/" source="CVE"/>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-23918" ref_url="https://www.suse.com/security/cve/CVE-2023-23918/" source="CVE"/>
		<reference ref_id="CVE-2023-23920" ref_url="https://www.suse.com/security/cve/CVE-2023-23920/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1743.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1743.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35065/">CVE-2021-35065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35065">CVE-2021-35065 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25881/">CVE-2022-25881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25881">CVE-2022-25881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3517/">CVE-2022-3517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3517">CVE-2022-3517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38900/">CVE-2022-38900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38900">CVE-2022-38900 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23918/">CVE-2023-23918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23918">CVE-2023-23918 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23920/">CVE-2023-23920 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23920">CVE-2023-23920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841835" comment="nodejs-14.21.3-1.module+el8.7.0+18531+81d21ca6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841836" comment="nodejs-devel-14.21.3-1.module+el8.7.0+18531+81d21ca6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841837" comment="nodejs-docs-14.21.3-1.module+el8.7.0+18531+81d21ca6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841838" comment="nodejs-full-i18n-14.21.3-1.module+el8.7.0+18531+81d21ca6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841839" comment="nodejs-nodemon-2.0.20-3.module+el8.7.0+18531+81d21ca6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835982" comment="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841840" comment="npm-6.14.18-1.14.21.3.1.module+el8.7.0+18531+81d21ca6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2583" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1787.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1787.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841841" comment="firefox-102.10.0-1.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2584" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0547" ref_url="https://www.suse.com/security/cve/CVE-2023-0547/" source="CVE"/>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="CVE-2023-28427" ref_url="https://www.suse.com/security/cve/CVE-2023-28427/" source="CVE"/>
		<reference ref_id="CVE-2023-29479" ref_url="https://www.suse.com/security/cve/CVE-2023-29479/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1802.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1802.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0547/">CVE-2023-0547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0547">CVE-2023-0547 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-28427/">CVE-2023-28427 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28427">CVE-2023-28427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29479/">CVE-2023-29479 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29479">CVE-2023-29479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841842" comment="thunderbird-102.10.0-2.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2585" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1895.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1895.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841843" comment="java-11-openjdk-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841844" comment="java-11-openjdk-demo-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841845" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841846" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841847" comment="java-11-openjdk-devel-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841848" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841849" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841850" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841851" comment="java-11-openjdk-headless-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841852" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841853" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841854" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841855" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841856" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841857" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841858" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841859" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841860" comment="java-11-openjdk-src-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841861" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841862" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841863" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841864" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841865" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2586" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1898.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1898.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841866" comment="java-17-openjdk-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841867" comment="java-17-openjdk-demo-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841868" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841869" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841870" comment="java-17-openjdk-devel-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841871" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841872" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841873" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841874" comment="java-17-openjdk-headless-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841875" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841876" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841877" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841878" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841879" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841880" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841881" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841882" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841883" comment="java-17-openjdk-src-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841884" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841885" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841886" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841887" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841888" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2587" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1908.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1908.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841889" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841890" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841891" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841892" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841893" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841894" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841895" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841896" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841897" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841898" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841899" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841900" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841901" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841902" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841903" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841904" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841905" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841906" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841907" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841908" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2588" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28205" ref_url="https://www.suse.com/security/cve/CVE-2023-28205/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1919.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1919.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28205/">CVE-2023-28205 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28205">CVE-2023-28205 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841909" comment="webkit2gtk3-2.36.7-1.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841910" comment="webkit2gtk3-devel-2.36.7-1.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841911" comment="webkit2gtk3-jsc-2.36.7-1.el8_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841912" comment="webkit2gtk3-jsc-devel-2.36.7-1.el8_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2589" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28617" ref_url="https://www.suse.com/security/cve/CVE-2023-28617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1930.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1930.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28617/">CVE-2023-28617 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28617">CVE-2023-28617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841913" comment="emacs-26.1-7.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841914" comment="emacs-common-26.1-7.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841915" comment="emacs-filesystem-26.1-7.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841916" comment="emacs-lucid-26.1-7.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841917" comment="emacs-nox-26.1-7.el8_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841918" comment="emacs-terminal-26.1-7.el8_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2590" version="1" class="patch">
	<metadata>
		<title>security update for libwebp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2076.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2076.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841919" comment="libwebp-1.0.0-8.el8_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841920" comment="libwebp-devel-1.0.0-8.el8_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2591" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-30570" ref_url="https://www.suse.com/security/cve/CVE-2023-30570/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2122.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2122.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30570/">CVE-2023-30570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30570">CVE-2023-30570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841921" comment="libreswan-4.5-1.el8_7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2592" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2023-0778" ref_url="https://www.suse.com/security/cve/CVE-2023-0778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2758.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2758.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0778/">CVE-2023-0778 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0778">CVE-2023-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841922" comment="aardvark-dns-1.5.0-2.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841923" comment="buildah-1.29.1-1.module+el8.8.0+18195+471da4bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841924" comment="buildah-tests-1.29.1-1.module+el8.8.0+18195+471da4bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841925" comment="cockpit-podman-63.1-1.module+el8.8.0+18286+cd236dce is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841926" comment="conmon-2.1.6-1.module+el8.8.0+18098+9b44df5f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841927" comment="container-selinux-2.205.0-2.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841928" comment="containernetworking-plugins-1.2.0-1.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841929" comment="containers-common-1-63.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841930" comment="crit-3.15-3.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841931" comment="criu-3.15-3.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841932" comment="criu-devel-3.15-3.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841933" comment="criu-libs-3.15-3.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841934" comment="crun-1.8.1-2.module+el8.8.0+18418+f0e540fe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841935" comment="fuse-overlayfs-1.10-1.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841936" comment="libslirp-4.4.0-1.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841937" comment="libslirp-devel-4.4.0-1.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841938" comment="netavark-1.5.0-4.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841939" comment="oci-seccomp-bpf-hook-1.2.8-1.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841940" comment="podman-4.4.1-8.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841941" comment="podman-catatonit-4.4.1-8.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841942" comment="podman-docker-4.4.1-8.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841943" comment="podman-gvproxy-4.4.1-8.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841944" comment="podman-plugins-4.4.1-8.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841945" comment="podman-remote-4.4.1-8.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841946" comment="podman-tests-4.4.1-8.module+el8.8.0+18438+15d3aa65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841947" comment="python3-criu-3.15-3.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841948" comment="python3-podman-4.4.1-1.module+el8.8.0+18275+3a56cc62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841949" comment="runc-1.1.4-1.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841950" comment="skopeo-1.11.2-0.2.module+el8.8.0+18251+ad5b274c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841951" comment="skopeo-tests-1.11.2-0.2.module+el8.8.0+18251+ad5b274c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841952" comment="slirp4netns-1.2.0-2.module+el8.8.0+18060+3f21f2cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841953" comment="toolbox-0.0.99.3-7.module+el8.8.0+18119+e3deee03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841954" comment="toolbox-tests-0.0.99.3-7.module+el8.8.0+18119+e3deee03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841955" comment="udica-0.2.6-20.module+el8.8.0+18060+3f21f2cc is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2593" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3204" ref_url="https://www.suse.com/security/cve/CVE-2022-3204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2771.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2771.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3204/">CVE-2022-3204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3204">CVE-2022-3204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841956" comment="python3-unbound-1.16.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841957" comment="unbound-1.16.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841958" comment="unbound-devel-1.16.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841959" comment="unbound-libs-1.16.2-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2594" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-39229" ref_url="https://www.suse.com/security/cve/CVE-2022-39229/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2784.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2784.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39229/">CVE-2022-39229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39229">CVE-2022-39229 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841960" comment="grafana-7.5.15-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2595" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2785.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2785.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841961" comment="grafana-pcp-3.2.0-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2596" version="1" class="patch">
	<metadata>
		<title>security update for wayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3782" ref_url="https://www.suse.com/security/cve/CVE-2021-3782/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2786.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2786.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3782/">CVE-2021-3782 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3782">CVE-2021-3782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841962" comment="libwayland-client-1.21.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841963" comment="libwayland-cursor-1.21.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841964" comment="libwayland-egl-1.21.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841965" comment="libwayland-server-1.21.0-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841966" comment="wayland-devel-1.21.0-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2597" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<reference ref_id="CVE-2022-3094" ref_url="https://www.suse.com/security/cve/CVE-2022-3094/" source="CVE"/>
		<reference ref_id="CVE-2022-3736" ref_url="https://www.suse.com/security/cve/CVE-2022-3736/" source="CVE"/>
		<reference ref_id="CVE-2022-3924" ref_url="https://www.suse.com/security/cve/CVE-2022-3924/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2792.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2792.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3094/">CVE-2022-3094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3094">CVE-2022-3094 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3736/">CVE-2022-3736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3736">CVE-2022-3736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3924/">CVE-2022-3924 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3924">CVE-2022-3924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841967" comment="bind9.16-9.16.23-0.14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841968" comment="bind9.16-chroot-9.16.23-0.14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841969" comment="bind9.16-devel-9.16.23-0.14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841970" comment="bind9.16-dnssec-utils-9.16.23-0.14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841971" comment="bind9.16-doc-9.16.23-0.14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841972" comment="bind9.16-libs-9.16.23-0.14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841973" comment="bind9.16-license-9.16.23-0.14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841974" comment="bind9.16-utils-9.16.23-0.14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841975" comment="python3-bind9.16-9.16.23-0.14.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2598" version="1" class="patch">
	<metadata>
		<title>security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-39377" ref_url="https://www.suse.com/security/cve/CVE-2022-39377/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2800.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2800.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39377/">CVE-2022-39377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39377">CVE-2022-39377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841976" comment="sysstat-11.7.3-9.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2599" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-37032" ref_url="https://www.suse.com/security/cve/CVE-2022-37032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2801.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2801.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37032/">CVE-2022-37032 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37032">CVE-2022-37032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841977" comment="frr-7.5.1-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841978" comment="frr-selinux-7.5.1-7.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2600" version="1" class="patch">
	<metadata>
		<title>security update for buildah (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2023-0778" ref_url="https://www.suse.com/security/cve/CVE-2023-0778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2802.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2802.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2989">CVE-2022-2989 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0778/">CVE-2023-0778 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0778">CVE-2023-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009841979" comment="aardvark-dns-1.0.1-37.module+el8.8.0+17954+9046de88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841980" comment="buildah-1.24.6-5.module+el8.8.0+18083+cd85596b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841981" comment="buildah-tests-1.24.6-5.module+el8.8.0+18083+cd85596b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841982" comment="cockpit-podman-46-1.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841983" comment="conmon-2.1.4-1.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841984" comment="container-selinux-2.199.0-1.module+el8.8.0+18113+8b5b6979 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841985" comment="containernetworking-plugins-1.1.1-2.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841986" comment="containers-common-1-37.module+el8.8.0+17954+9046de88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841987" comment="crit-3.15-3.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841988" comment="criu-3.15-3.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841989" comment="criu-devel-3.15-3.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841990" comment="criu-libs-3.15-3.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841991" comment="crun-1.6-1.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841992" comment="fuse-overlayfs-1.9-1.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841993" comment="libslirp-4.4.0-1.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841994" comment="libslirp-devel-4.4.0-1.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841995" comment="netavark-1.0.1-37.module+el8.8.0+17954+9046de88 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841996" comment="oci-seccomp-bpf-hook-1.2.5-2.module+el8.8.0+18083+cd85596b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841997" comment="podman-4.0.2-20.module+el8.8.0+18201+6ad7332c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841998" comment="podman-catatonit-4.0.2-20.module+el8.8.0+18201+6ad7332c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841999" comment="podman-docker-4.0.2-20.module+el8.8.0+18201+6ad7332c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842000" comment="podman-gvproxy-4.0.2-20.module+el8.8.0+18201+6ad7332c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842001" comment="podman-plugins-4.0.2-20.module+el8.8.0+18201+6ad7332c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842002" comment="podman-remote-4.0.2-20.module+el8.8.0+18201+6ad7332c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842003" comment="podman-tests-4.0.2-20.module+el8.8.0+18201+6ad7332c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842004" comment="python3-criu-3.15-3.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842005" comment="python3-podman-4.0.0-1.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842006" comment="runc-1.1.4-1.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842007" comment="skopeo-1.6.2-6.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842008" comment="skopeo-tests-1.6.2-6.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842009" comment="slirp4netns-1.1.8-2.module+el8.8.0+17821+de1b53f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842010" comment="toolbox-0.0.99.3-7.module+el8.8.0+18115+45021590 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842011" comment="toolbox-tests-0.0.99.3-7.module+el8.8.0+18115+45021590 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842012" comment="udica-0.2.6-3.module+el8.8.0+17821+de1b53f1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2601" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2805.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2805.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842013" comment="xorg-x11-server-Xwayland-21.1.3-10.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2602" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2806.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2806.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842014" comment="xorg-x11-server-Xdmx-1.20.11-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842015" comment="xorg-x11-server-Xephyr-1.20.11-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842016" comment="xorg-x11-server-Xnest-1.20.11-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842017" comment="xorg-x11-server-Xorg-1.20.11-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842018" comment="xorg-x11-server-Xvfb-1.20.11-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842019" comment="xorg-x11-server-common-1.20.11-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842020" comment="xorg-x11-server-devel-1.20.11-15.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842021" comment="xorg-x11-server-source-1.20.11-15.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2603" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-38784" ref_url="https://www.suse.com/security/cve/CVE-2022-38784/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2810.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2810.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38784/">CVE-2022-38784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38784">CVE-2022-38784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842022" comment="poppler-20.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842023" comment="poppler-cpp-20.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842024" comment="poppler-cpp-devel-20.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842025" comment="poppler-devel-20.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842026" comment="poppler-glib-20.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842027" comment="poppler-glib-devel-20.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842028" comment="poppler-qt5-20.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842029" comment="poppler-qt5-devel-20.11.0-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842030" comment="poppler-utils-20.11.0-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2604" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2830.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2830.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842031" comment="tigervnc-1.12.0-15.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842032" comment="tigervnc-icons-1.12.0-15.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842033" comment="tigervnc-license-1.12.0-15.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842034" comment="tigervnc-selinux-1.12.0-15.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842035" comment="tigervnc-server-1.12.0-15.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842036" comment="tigervnc-server-minimal-1.12.0-15.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842037" comment="tigervnc-server-module-1.12.0-15.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2605" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32886" ref_url="https://www.suse.com/security/cve/CVE-2022-32886/" source="CVE"/>
		<reference ref_id="CVE-2022-32888" ref_url="https://www.suse.com/security/cve/CVE-2022-32888/" source="CVE"/>
		<reference ref_id="CVE-2022-32923" ref_url="https://www.suse.com/security/cve/CVE-2022-32923/" source="CVE"/>
		<reference ref_id="CVE-2022-42799" ref_url="https://www.suse.com/security/cve/CVE-2022-42799/" source="CVE"/>
		<reference ref_id="CVE-2022-42823" ref_url="https://www.suse.com/security/cve/CVE-2022-42823/" source="CVE"/>
		<reference ref_id="CVE-2022-42824" ref_url="https://www.suse.com/security/cve/CVE-2022-42824/" source="CVE"/>
		<reference ref_id="CVE-2022-42826" ref_url="https://www.suse.com/security/cve/CVE-2022-42826/" source="CVE"/>
		<reference ref_id="CVE-2022-42852" ref_url="https://www.suse.com/security/cve/CVE-2022-42852/" source="CVE"/>
		<reference ref_id="CVE-2022-42863" ref_url="https://www.suse.com/security/cve/CVE-2022-42863/" source="CVE"/>
		<reference ref_id="CVE-2022-42867" ref_url="https://www.suse.com/security/cve/CVE-2022-42867/" source="CVE"/>
		<reference ref_id="CVE-2022-46691" ref_url="https://www.suse.com/security/cve/CVE-2022-46691/" source="CVE"/>
		<reference ref_id="CVE-2022-46692" ref_url="https://www.suse.com/security/cve/CVE-2022-46692/" source="CVE"/>
		<reference ref_id="CVE-2022-46698" ref_url="https://www.suse.com/security/cve/CVE-2022-46698/" source="CVE"/>
		<reference ref_id="CVE-2022-46699" ref_url="https://www.suse.com/security/cve/CVE-2022-46699/" source="CVE"/>
		<reference ref_id="CVE-2022-46700" ref_url="https://www.suse.com/security/cve/CVE-2022-46700/" source="CVE"/>
		<reference ref_id="CVE-2022-48503" ref_url="https://www.suse.com/security/cve/CVE-2022-48503/" source="CVE"/>
		<reference ref_id="CVE-2023-23517" ref_url="https://www.suse.com/security/cve/CVE-2023-23517/" source="CVE"/>
		<reference ref_id="CVE-2023-23518" ref_url="https://www.suse.com/security/cve/CVE-2023-23518/" source="CVE"/>
		<reference ref_id="CVE-2023-25358" ref_url="https://www.suse.com/security/cve/CVE-2023-25358/" source="CVE"/>
		<reference ref_id="CVE-2023-25360" ref_url="https://www.suse.com/security/cve/CVE-2023-25360/" source="CVE"/>
		<reference ref_id="CVE-2023-25361" ref_url="https://www.suse.com/security/cve/CVE-2023-25361/" source="CVE"/>
		<reference ref_id="CVE-2023-25362" ref_url="https://www.suse.com/security/cve/CVE-2023-25362/" source="CVE"/>
		<reference ref_id="CVE-2023-25363" ref_url="https://www.suse.com/security/cve/CVE-2023-25363/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32886/">CVE-2022-32886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32886">CVE-2022-32886 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32888/">CVE-2022-32888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32888">CVE-2022-32888 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32923/">CVE-2022-32923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32923">CVE-2022-32923 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42799/">CVE-2022-42799 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42799">CVE-2022-42799 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42823/">CVE-2022-42823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42823">CVE-2022-42823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42824/">CVE-2022-42824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42824">CVE-2022-42824 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42826/">CVE-2022-42826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42826">CVE-2022-42826 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42852/">CVE-2022-42852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42852">CVE-2022-42852 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42863/">CVE-2022-42863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42863">CVE-2022-42863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42867/">CVE-2022-42867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42867">CVE-2022-42867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46691/">CVE-2022-46691 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46691">CVE-2022-46691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46692/">CVE-2022-46692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46692">CVE-2022-46692 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-46698/">CVE-2022-46698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46698">CVE-2022-46698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46699/">CVE-2022-46699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46699">CVE-2022-46699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46700/">CVE-2022-46700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46700">CVE-2022-46700 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48503/">CVE-2022-48503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48503">CVE-2022-48503 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23517/">CVE-2023-23517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23517">CVE-2023-23517 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23518/">CVE-2023-23518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23518">CVE-2023-23518 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25358/">CVE-2023-25358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25358">CVE-2023-25358 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25360/">CVE-2023-25360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25360">CVE-2023-25360 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25361/">CVE-2023-25361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25361">CVE-2023-25361 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25362/">CVE-2023-25362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25362">CVE-2023-25362 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25363/">CVE-2023-25363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25363">CVE-2023-25363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842038" comment="webkit2gtk3-2.38.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842039" comment="webkit2gtk3-devel-2.38.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842040" comment="webkit2gtk3-jsc-2.38.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842041" comment="webkit2gtk3-jsc-devel-2.38.5-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2606" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-39282" ref_url="https://www.suse.com/security/cve/CVE-2022-39282/" source="CVE"/>
		<reference ref_id="CVE-2022-39283" ref_url="https://www.suse.com/security/cve/CVE-2022-39283/" source="CVE"/>
		<reference ref_id="CVE-2022-39316" ref_url="https://www.suse.com/security/cve/CVE-2022-39316/" source="CVE"/>
		<reference ref_id="CVE-2022-39317" ref_url="https://www.suse.com/security/cve/CVE-2022-39317/" source="CVE"/>
		<reference ref_id="CVE-2022-39318" ref_url="https://www.suse.com/security/cve/CVE-2022-39318/" source="CVE"/>
		<reference ref_id="CVE-2022-39319" ref_url="https://www.suse.com/security/cve/CVE-2022-39319/" source="CVE"/>
		<reference ref_id="CVE-2022-39320" ref_url="https://www.suse.com/security/cve/CVE-2022-39320/" source="CVE"/>
		<reference ref_id="CVE-2022-39347" ref_url="https://www.suse.com/security/cve/CVE-2022-39347/" source="CVE"/>
		<reference ref_id="CVE-2022-41877" ref_url="https://www.suse.com/security/cve/CVE-2022-41877/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2851.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2851.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39282/">CVE-2022-39282 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39282">CVE-2022-39282 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39283/">CVE-2022-39283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39283">CVE-2022-39283 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39316/">CVE-2022-39316 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39316">CVE-2022-39316 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39317/">CVE-2022-39317 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39317">CVE-2022-39317 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39318/">CVE-2022-39318 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39318">CVE-2022-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39319/">CVE-2022-39319 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39319">CVE-2022-39319 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39320/">CVE-2022-39320 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39320">CVE-2022-39320 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39347/">CVE-2022-39347 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39347">CVE-2022-39347 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41877/">CVE-2022-41877 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41877">CVE-2022-41877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842042" comment="freerdp-2.2.0-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842043" comment="freerdp-devel-2.2.0-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842044" comment="freerdp-libs-2.2.0-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842045" comment="libwinpr-2.2.0-10.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842046" comment="libwinpr-devel-2.2.0-10.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2607" version="1" class="patch">
	<metadata>
		<title>security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187/" source="CVE"/>
		<reference ref_id="CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253/" source="CVE"/>
		<reference ref_id="CVE-2022-39260" ref_url="https://www.suse.com/security/cve/CVE-2022-39260/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2859.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2859.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39260/">CVE-2022-39260 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842047" comment="git-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842048" comment="git-all-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842049" comment="git-core-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842050" comment="git-core-doc-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842051" comment="git-credential-libsecret-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842052" comment="git-daemon-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842053" comment="git-email-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842054" comment="git-gui-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842055" comment="git-instaweb-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842056" comment="git-subtree-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842057" comment="git-svn-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842058" comment="gitk-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842059" comment="gitweb-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842060" comment="perl-Git-2.39.1-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842061" comment="perl-Git-SVN-2.39.1-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2608" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2860.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2860.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837903" comment="babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837904" comment="python-nose-docs-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835513" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842062" comment="python2-2.7.18-12.module+el8.8.0+17629+2cfc9d03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837906" comment="python2-babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836757" comment="python2-backports-1.0-16.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836758" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837907" comment="python2-bson-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842063" comment="python2-debug-2.7.18-12.module+el8.8.0+17629+2cfc9d03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842064" comment="python2-devel-2.7.18-12.module+el8.8.0+17629+2cfc9d03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837910" comment="python2-jinja2-2.10-9.module+el8.5.0+10541+706bb066 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842065" comment="python2-libs-2.7.18-12.module+el8.8.0+17629+2cfc9d03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839847" comment="python2-lxml-4.2.3-6.module+el8.6.0+13959+8e368262 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837913" comment="python2-nose-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836763" comment="python2-numpy-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836764" comment="python2-numpy-doc-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836765" comment="python2-numpy-f2py-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839848" comment="python2-pip-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839849" comment="python2-pip-wheel-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837914" comment="python2-pygments-2.2.0-22.module+el8.5.0+10788+a4cea9e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837915" comment="python2-pymongo-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837916" comment="python2-pymongo-gridfs-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837917" comment="python2-scipy-1.0.0-21.module+el8.5.0+10858+05337455 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836766" comment="python2-setuptools-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836767" comment="python2-setuptools-wheel-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836768" comment="python2-six-1.11.0-6.module+el8.4.0+9287+299307c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835522" comment="python2-sqlalchemy-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842066" comment="python2-test-2.7.18-12.module+el8.8.0+17629+2cfc9d03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842067" comment="python2-tkinter-2.7.18-12.module+el8.8.0+17629+2cfc9d03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842068" comment="python2-tools-2.7.18-12.module+el8.8.0+17629+2cfc9d03 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836772" comment="python2-urllib3-1.24.2-3.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837921" comment="python2-virtualenv-15.1.0-21.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837922" comment="python2-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837923" comment="python2-wheel-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2609" version="1" class="patch">
	<metadata>
		<title>security update for ctags (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4515" ref_url="https://www.suse.com/security/cve/CVE-2022-4515/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2863.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2863.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4515/">CVE-2022-4515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4515">CVE-2022-4515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842069" comment="ctags-5.8-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842070" comment="ctags-etags-5.8-23.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2610" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2866.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2866.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842071" comment="git-lfs-3.2.0-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2611" version="1" class="patch">
	<metadata>
		<title>security update for postgresql-jdbc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41946" ref_url="https://www.suse.com/security/cve/CVE-2022-41946/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2867.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2867.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41946/">CVE-2022-41946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41946">CVE-2022-41946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842072" comment="postgresql-jdbc-42.2.14-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842073" comment="postgresql-jdbc-javadoc-42.2.14-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2612" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41859" ref_url="https://www.suse.com/security/cve/CVE-2022-41859/" source="CVE"/>
		<reference ref_id="CVE-2022-41860" ref_url="https://www.suse.com/security/cve/CVE-2022-41860/" source="CVE"/>
		<reference ref_id="CVE-2022-41861" ref_url="https://www.suse.com/security/cve/CVE-2022-41861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2870.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2870.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41859/">CVE-2022-41859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41859">CVE-2022-41859 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41860/">CVE-2022-41860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41860">CVE-2022-41860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41861/">CVE-2022-41861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41861">CVE-2022-41861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842074" comment="freeradius-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842075" comment="freeradius-devel-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842076" comment="freeradius-doc-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842077" comment="freeradius-krb5-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842078" comment="freeradius-ldap-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842079" comment="freeradius-mysql-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842080" comment="freeradius-perl-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842081" comment="freeradius-postgresql-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842082" comment="freeradius-rest-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842083" comment="freeradius-sqlite-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842084" comment="freeradius-unixODBC-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842085" comment="freeradius-utils-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842086" comment="python3-freeradius-3.0.20-14.module+el8.8.0+17558+3f8a93b9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2613" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-12-binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4285" ref_url="https://www.suse.com/security/cve/CVE-2022-4285/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2873.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2873.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4285/">CVE-2022-4285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842087" comment="gcc-toolset-12-binutils-2.38-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842088" comment="gcc-toolset-12-binutils-devel-2.38-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842089" comment="gcc-toolset-12-binutils-gold-2.38-17.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2614" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627/" source="CVE"/>
		<reference ref_id="CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2883.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2883.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3627">CVE-2022-3627 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842090" comment="libtiff-4.0.9-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842091" comment="libtiff-devel-4.0.9-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842092" comment="libtiff-tools-4.0.9-27.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2615" version="1" class="patch">
	<metadata>
		<title>security update for python-mako (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40023" ref_url="https://www.suse.com/security/cve/CVE-2022-40023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2893.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2893.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40023/">CVE-2022-40023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40023">CVE-2022-40023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842093" comment="python3-mako-1.0.6-14.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2616" version="1" class="patch">
	<metadata>
		<title>security update for libtar (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33643" ref_url="https://www.suse.com/security/cve/CVE-2021-33643/" source="CVE"/>
		<reference ref_id="CVE-2021-33644" ref_url="https://www.suse.com/security/cve/CVE-2021-33644/" source="CVE"/>
		<reference ref_id="CVE-2021-33645" ref_url="https://www.suse.com/security/cve/CVE-2021-33645/" source="CVE"/>
		<reference ref_id="CVE-2021-33646" ref_url="https://www.suse.com/security/cve/CVE-2021-33646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2898.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2898.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33643/">CVE-2021-33643 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33643">CVE-2021-33643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33644/">CVE-2021-33644 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33644">CVE-2021-33644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33645/">CVE-2021-33645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33645">CVE-2021-33645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33646/">CVE-2021-33646 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33646">CVE-2021-33646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842094" comment="libtar-1.2.20-17.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2617" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2017-8923" ref_url="https://www.suse.com/security/cve/CVE-2017-8923/" source="CVE"/>
		<reference ref_id="CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628/" source="CVE"/>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<reference ref_id="CVE-2022-31630" ref_url="https://www.suse.com/security/cve/CVE-2022-31630/" source="CVE"/>
		<reference ref_id="CVE-2022-31631" ref_url="https://www.suse.com/security/cve/CVE-2022-31631/" source="CVE"/>
		<reference ref_id="CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2903.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2903.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8923/">CVE-2017-8923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8923">CVE-2017-8923 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31630/">CVE-2022-31630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31630">CVE-2022-31630 at NVD</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31631/">CVE-2022-31631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009838070" comment="apcu-panel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838071" comment="libzip-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838072" comment="libzip-devel-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838073" comment="libzip-tools-1.6.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842095" comment="php-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842096" comment="php-bcmath-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842097" comment="php-cli-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842098" comment="php-common-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842099" comment="php-dba-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842100" comment="php-dbg-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842101" comment="php-devel-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842102" comment="php-embedded-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842103" comment="php-enchant-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842104" comment="php-ffi-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842105" comment="php-fpm-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842106" comment="php-gd-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842107" comment="php-gmp-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842108" comment="php-intl-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842109" comment="php-json-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842110" comment="php-ldap-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842111" comment="php-mbstring-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842112" comment="php-mysqlnd-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842113" comment="php-odbc-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842114" comment="php-opcache-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842115" comment="php-pdo-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841229" comment="php-pear-1.10.13-1.module+el8.7.0+15127+a450a8db is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838096" comment="php-pecl-apcu-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838097" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838098" comment="php-pecl-rrd-2.0.1-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838099" comment="php-pecl-xdebug-2.9.5-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838100" comment="php-pecl-zip-1.18.2-1.module+el8.3.0+6678+b09f589e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842116" comment="php-pgsql-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842117" comment="php-process-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842118" comment="php-snmp-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842119" comment="php-soap-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842120" comment="php-xml-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842121" comment="php-xmlrpc-7.4.33-1.module+el8.8.0+17865+ef7eddfa is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2618" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450/" source="CVE"/>
		<reference ref_id="CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215/" source="CVE"/>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2932.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2932.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842122" comment="edk2-ovmf-20220126gitbb1bba3d77-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2619" version="1" class="patch">
	<metadata>
		<title>security update for device-mapper-multipath (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41973" ref_url="https://www.suse.com/security/cve/CVE-2022-41973/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2948.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2948.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41973/">CVE-2022-41973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842123" comment="device-mapper-multipath-0.8.4-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842124" comment="device-mapper-multipath-devel-0.8.4-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842125" comment="device-mapper-multipath-libs-0.8.4-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842126" comment="kpartx-0.8.4-37.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842127" comment="libdmmp-0.8.4-37.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2620" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341/" source="CVE"/>
		<reference ref_id="CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655/" source="CVE"/>
		<reference ref_id="CVE-2021-33656" ref_url="https://www.suse.com/security/cve/CVE-2021-33656/" source="CVE"/>
		<reference ref_id="CVE-2021-47221" ref_url="https://www.suse.com/security/cve/CVE-2021-47221/" source="CVE"/>
		<reference ref_id="CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592/" source="CVE"/>
		<reference ref_id="CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462/" source="CVE"/>
		<reference ref_id="CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679/" source="CVE"/>
		<reference ref_id="CVE-2022-1789" ref_url="https://www.suse.com/security/cve/CVE-2022-1789/" source="CVE"/>
		<reference ref_id="CVE-2022-20141" ref_url="https://www.suse.com/security/cve/CVE-2022-20141/" source="CVE"/>
		<reference ref_id="CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196/" source="CVE"/>
		<reference ref_id="CVE-2022-25265" ref_url="https://www.suse.com/security/cve/CVE-2022-25265/" source="CVE"/>
		<reference ref_id="CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663/" source="CVE"/>
		<reference ref_id="CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028/" source="CVE"/>
		<reference ref_id="CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594/" source="CVE"/>
		<reference ref_id="CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239/" source="CVE"/>
		<reference ref_id="CVE-2022-3522" ref_url="https://www.suse.com/security/cve/CVE-2022-3522/" source="CVE"/>
		<reference ref_id="CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524/" source="CVE"/>
		<reference ref_id="CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564/" source="CVE"/>
		<reference ref_id="CVE-2022-3566" ref_url="https://www.suse.com/security/cve/CVE-2022-3566/" source="CVE"/>
		<reference ref_id="CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567/" source="CVE"/>
		<reference ref_id="CVE-2022-3619" ref_url="https://www.suse.com/security/cve/CVE-2022-3619/" source="CVE"/>
		<reference ref_id="CVE-2022-3623" ref_url="https://www.suse.com/security/cve/CVE-2022-3623/" source="CVE"/>
		<reference ref_id="CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625/" source="CVE"/>
		<reference ref_id="CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628/" source="CVE"/>
		<reference ref_id="CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879/" source="CVE"/>
		<reference ref_id="CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707/" source="CVE"/>
		<reference ref_id="CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188/" source="CVE"/>
		<reference ref_id="CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189/" source="CVE"/>
		<reference ref_id="CVE-2022-41218" ref_url="https://www.suse.com/security/cve/CVE-2022-41218/" source="CVE"/>
		<reference ref_id="CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129/" source="CVE"/>
		<reference ref_id="CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674/" source="CVE"/>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720/" source="CVE"/>
		<reference ref_id="CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721/" source="CVE"/>
		<reference ref_id="CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722/" source="CVE"/>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<reference ref_id="CVE-2022-4662" ref_url="https://www.suse.com/security/cve/CVE-2022-4662/" source="CVE"/>
		<reference ref_id="CVE-2022-47929" ref_url="https://www.suse.com/security/cve/CVE-2022-47929/" source="CVE"/>
		<reference ref_id="CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695/" source="CVE"/>
		<reference ref_id="CVE-2022-48696" ref_url="https://www.suse.com/security/cve/CVE-2022-48696/" source="CVE"/>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-48883" ref_url="https://www.suse.com/security/cve/CVE-2022-48883/" source="CVE"/>
		<reference ref_id="CVE-2022-48884" ref_url="https://www.suse.com/security/cve/CVE-2022-48884/" source="CVE"/>
		<reference ref_id="CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992/" source="CVE"/>
		<reference ref_id="CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010/" source="CVE"/>
		<reference ref_id="CVE-2022-49114" ref_url="https://www.suse.com/security/cve/CVE-2022-49114/" source="CVE"/>
		<reference ref_id="CVE-2022-49294" ref_url="https://www.suse.com/security/cve/CVE-2022-49294/" source="CVE"/>
		<reference ref_id="CVE-2022-49319" ref_url="https://www.suse.com/security/cve/CVE-2022-49319/" source="CVE"/>
		<reference ref_id="CVE-2022-49323" ref_url="https://www.suse.com/security/cve/CVE-2022-49323/" source="CVE"/>
		<reference ref_id="CVE-2022-49328" ref_url="https://www.suse.com/security/cve/CVE-2022-49328/" source="CVE"/>
		<reference ref_id="CVE-2022-49330" ref_url="https://www.suse.com/security/cve/CVE-2022-49330/" source="CVE"/>
		<reference ref_id="CVE-2022-49333" ref_url="https://www.suse.com/security/cve/CVE-2022-49333/" source="CVE"/>
		<reference ref_id="CVE-2022-49339" ref_url="https://www.suse.com/security/cve/CVE-2022-49339/" source="CVE"/>
		<reference ref_id="CVE-2022-49365" ref_url="https://www.suse.com/security/cve/CVE-2022-49365/" source="CVE"/>
		<reference ref_id="CVE-2022-49371" ref_url="https://www.suse.com/security/cve/CVE-2022-49371/" source="CVE"/>
		<reference ref_id="CVE-2022-49372" ref_url="https://www.suse.com/security/cve/CVE-2022-49372/" source="CVE"/>
		<reference ref_id="CVE-2022-49376" ref_url="https://www.suse.com/security/cve/CVE-2022-49376/" source="CVE"/>
		<reference ref_id="CVE-2022-49416" ref_url="https://www.suse.com/security/cve/CVE-2022-49416/" source="CVE"/>
		<reference ref_id="CVE-2022-49429" ref_url="https://www.suse.com/security/cve/CVE-2022-49429/" source="CVE"/>
		<reference ref_id="CVE-2022-49471" ref_url="https://www.suse.com/security/cve/CVE-2022-49471/" source="CVE"/>
		<reference ref_id="CVE-2022-49511" ref_url="https://www.suse.com/security/cve/CVE-2022-49511/" source="CVE"/>
		<reference ref_id="CVE-2022-49513" ref_url="https://www.suse.com/security/cve/CVE-2022-49513/" source="CVE"/>
		<reference ref_id="CVE-2022-49519" ref_url="https://www.suse.com/security/cve/CVE-2022-49519/" source="CVE"/>
		<reference ref_id="CVE-2022-49539" ref_url="https://www.suse.com/security/cve/CVE-2022-49539/" source="CVE"/>
		<reference ref_id="CVE-2022-49545" ref_url="https://www.suse.com/security/cve/CVE-2022-49545/" source="CVE"/>
		<reference ref_id="CVE-2022-49577" ref_url="https://www.suse.com/security/cve/CVE-2022-49577/" source="CVE"/>
		<reference ref_id="CVE-2022-49583" ref_url="https://www.suse.com/security/cve/CVE-2022-49583/" source="CVE"/>
		<reference ref_id="CVE-2022-49592" ref_url="https://www.suse.com/security/cve/CVE-2022-49592/" source="CVE"/>
		<reference ref_id="CVE-2022-49636" ref_url="https://www.suse.com/security/cve/CVE-2022-49636/" source="CVE"/>
		<reference ref_id="CVE-2022-49642" ref_url="https://www.suse.com/security/cve/CVE-2022-49642/" source="CVE"/>
		<reference ref_id="CVE-2022-49644" ref_url="https://www.suse.com/security/cve/CVE-2022-49644/" source="CVE"/>
		<reference ref_id="CVE-2022-49646" ref_url="https://www.suse.com/security/cve/CVE-2022-49646/" source="CVE"/>
		<reference ref_id="CVE-2022-49653" ref_url="https://www.suse.com/security/cve/CVE-2022-49653/" source="CVE"/>
		<reference ref_id="CVE-2022-49663" ref_url="https://www.suse.com/security/cve/CVE-2022-49663/" source="CVE"/>
		<reference ref_id="CVE-2022-49691" ref_url="https://www.suse.com/security/cve/CVE-2022-49691/" source="CVE"/>
		<reference ref_id="CVE-2022-49723" ref_url="https://www.suse.com/security/cve/CVE-2022-49723/" source="CVE"/>
		<reference ref_id="CVE-2022-49726" ref_url="https://www.suse.com/security/cve/CVE-2022-49726/" source="CVE"/>
		<reference ref_id="CVE-2022-49732" ref_url="https://www.suse.com/security/cve/CVE-2022-49732/" source="CVE"/>
		<reference ref_id="CVE-2022-49872" ref_url="https://www.suse.com/security/cve/CVE-2022-49872/" source="CVE"/>
		<reference ref_id="CVE-2022-49908" ref_url="https://www.suse.com/security/cve/CVE-2022-49908/" source="CVE"/>
		<reference ref_id="CVE-2022-49925" ref_url="https://www.suse.com/security/cve/CVE-2022-49925/" source="CVE"/>
		<reference ref_id="CVE-2022-49934" ref_url="https://www.suse.com/security/cve/CVE-2022-49934/" source="CVE"/>
		<reference ref_id="CVE-2022-49935" ref_url="https://www.suse.com/security/cve/CVE-2022-49935/" source="CVE"/>
		<reference ref_id="CVE-2022-49936" ref_url="https://www.suse.com/security/cve/CVE-2022-49936/" source="CVE"/>
		<reference ref_id="CVE-2022-49942" ref_url="https://www.suse.com/security/cve/CVE-2022-49942/" source="CVE"/>
		<reference ref_id="CVE-2022-49951" ref_url="https://www.suse.com/security/cve/CVE-2022-49951/" source="CVE"/>
		<reference ref_id="CVE-2022-49958" ref_url="https://www.suse.com/security/cve/CVE-2022-49958/" source="CVE"/>
		<reference ref_id="CVE-2022-49959" ref_url="https://www.suse.com/security/cve/CVE-2022-49959/" source="CVE"/>
		<reference ref_id="CVE-2022-49960" ref_url="https://www.suse.com/security/cve/CVE-2022-49960/" source="CVE"/>
		<reference ref_id="CVE-2022-49962" ref_url="https://www.suse.com/security/cve/CVE-2022-49962/" source="CVE"/>
		<reference ref_id="CVE-2022-49964" ref_url="https://www.suse.com/security/cve/CVE-2022-49964/" source="CVE"/>
		<reference ref_id="CVE-2022-49965" ref_url="https://www.suse.com/security/cve/CVE-2022-49965/" source="CVE"/>
		<reference ref_id="CVE-2022-49966" ref_url="https://www.suse.com/security/cve/CVE-2022-49966/" source="CVE"/>
		<reference ref_id="CVE-2022-49969" ref_url="https://www.suse.com/security/cve/CVE-2022-49969/" source="CVE"/>
		<reference ref_id="CVE-2022-49971" ref_url="https://www.suse.com/security/cve/CVE-2022-49971/" source="CVE"/>
		<reference ref_id="CVE-2022-49982" ref_url="https://www.suse.com/security/cve/CVE-2022-49982/" source="CVE"/>
		<reference ref_id="CVE-2022-49983" ref_url="https://www.suse.com/security/cve/CVE-2022-49983/" source="CVE"/>
		<reference ref_id="CVE-2022-49986" ref_url="https://www.suse.com/security/cve/CVE-2022-49986/" source="CVE"/>
		<reference ref_id="CVE-2022-50000" ref_url="https://www.suse.com/security/cve/CVE-2022-50000/" source="CVE"/>
		<reference ref_id="CVE-2022-50001" ref_url="https://www.suse.com/security/cve/CVE-2022-50001/" source="CVE"/>
		<reference ref_id="CVE-2022-50002" ref_url="https://www.suse.com/security/cve/CVE-2022-50002/" source="CVE"/>
		<reference ref_id="CVE-2022-50007" ref_url="https://www.suse.com/security/cve/CVE-2022-50007/" source="CVE"/>
		<reference ref_id="CVE-2022-50015" ref_url="https://www.suse.com/security/cve/CVE-2022-50015/" source="CVE"/>
		<reference ref_id="CVE-2022-50016" ref_url="https://www.suse.com/security/cve/CVE-2022-50016/" source="CVE"/>
		<reference ref_id="CVE-2022-50022" ref_url="https://www.suse.com/security/cve/CVE-2022-50022/" source="CVE"/>
		<reference ref_id="CVE-2022-50035" ref_url="https://www.suse.com/security/cve/CVE-2022-50035/" source="CVE"/>
		<reference ref_id="CVE-2022-50037" ref_url="https://www.suse.com/security/cve/CVE-2022-50037/" source="CVE"/>
		<reference ref_id="CVE-2022-50039" ref_url="https://www.suse.com/security/cve/CVE-2022-50039/" source="CVE"/>
		<reference ref_id="CVE-2022-50041" ref_url="https://www.suse.com/security/cve/CVE-2022-50041/" source="CVE"/>
		<reference ref_id="CVE-2022-50044" ref_url="https://www.suse.com/security/cve/CVE-2022-50044/" source="CVE"/>
		<reference ref_id="CVE-2022-50048" ref_url="https://www.suse.com/security/cve/CVE-2022-50048/" source="CVE"/>
		<reference ref_id="CVE-2022-50049" ref_url="https://www.suse.com/security/cve/CVE-2022-50049/" source="CVE"/>
		<reference ref_id="CVE-2022-50050" ref_url="https://www.suse.com/security/cve/CVE-2022-50050/" source="CVE"/>
		<reference ref_id="CVE-2022-50052" ref_url="https://www.suse.com/security/cve/CVE-2022-50052/" source="CVE"/>
		<reference ref_id="CVE-2022-50068" ref_url="https://www.suse.com/security/cve/CVE-2022-50068/" source="CVE"/>
		<reference ref_id="CVE-2022-50070" ref_url="https://www.suse.com/security/cve/CVE-2022-50070/" source="CVE"/>
		<reference ref_id="CVE-2022-50079" ref_url="https://www.suse.com/security/cve/CVE-2022-50079/" source="CVE"/>
		<reference ref_id="CVE-2022-50093" ref_url="https://www.suse.com/security/cve/CVE-2022-50093/" source="CVE"/>
		<reference ref_id="CVE-2022-50100" ref_url="https://www.suse.com/security/cve/CVE-2022-50100/" source="CVE"/>
		<reference ref_id="CVE-2022-50111" ref_url="https://www.suse.com/security/cve/CVE-2022-50111/" source="CVE"/>
		<reference ref_id="CVE-2022-50113" ref_url="https://www.suse.com/security/cve/CVE-2022-50113/" source="CVE"/>
		<reference ref_id="CVE-2022-50127" ref_url="https://www.suse.com/security/cve/CVE-2022-50127/" source="CVE"/>
		<reference ref_id="CVE-2022-50129" ref_url="https://www.suse.com/security/cve/CVE-2022-50129/" source="CVE"/>
		<reference ref_id="CVE-2022-50130" ref_url="https://www.suse.com/security/cve/CVE-2022-50130/" source="CVE"/>
		<reference ref_id="CVE-2022-50133" ref_url="https://www.suse.com/security/cve/CVE-2022-50133/" source="CVE"/>
		<reference ref_id="CVE-2022-50135" ref_url="https://www.suse.com/security/cve/CVE-2022-50135/" source="CVE"/>
		<reference ref_id="CVE-2022-50136" ref_url="https://www.suse.com/security/cve/CVE-2022-50136/" source="CVE"/>
		<reference ref_id="CVE-2022-50137" ref_url="https://www.suse.com/security/cve/CVE-2022-50137/" source="CVE"/>
		<reference ref_id="CVE-2022-50138" ref_url="https://www.suse.com/security/cve/CVE-2022-50138/" source="CVE"/>
		<reference ref_id="CVE-2022-50149" ref_url="https://www.suse.com/security/cve/CVE-2022-50149/" source="CVE"/>
		<reference ref_id="CVE-2022-50164" ref_url="https://www.suse.com/security/cve/CVE-2022-50164/" source="CVE"/>
		<reference ref_id="CVE-2022-50172" ref_url="https://www.suse.com/security/cve/CVE-2022-50172/" source="CVE"/>
		<reference ref_id="CVE-2022-50181" ref_url="https://www.suse.com/security/cve/CVE-2022-50181/" source="CVE"/>
		<reference ref_id="CVE-2022-50185" ref_url="https://www.suse.com/security/cve/CVE-2022-50185/" source="CVE"/>
		<reference ref_id="CVE-2022-50189" ref_url="https://www.suse.com/security/cve/CVE-2022-50189/" source="CVE"/>
		<reference ref_id="CVE-2022-50211" ref_url="https://www.suse.com/security/cve/CVE-2022-50211/" source="CVE"/>
		<reference ref_id="CVE-2022-50221" ref_url="https://www.suse.com/security/cve/CVE-2022-50221/" source="CVE"/>
		<reference ref_id="CVE-2022-50226" ref_url="https://www.suse.com/security/cve/CVE-2022-50226/" source="CVE"/>
		<reference ref_id="CVE-2022-50229" ref_url="https://www.suse.com/security/cve/CVE-2022-50229/" source="CVE"/>
		<reference ref_id="CVE-2022-50235" ref_url="https://www.suse.com/security/cve/CVE-2022-50235/" source="CVE"/>
		<reference ref_id="CVE-2022-50243" ref_url="https://www.suse.com/security/cve/CVE-2022-50243/" source="CVE"/>
		<reference ref_id="CVE-2022-50271" ref_url="https://www.suse.com/security/cve/CVE-2022-50271/" source="CVE"/>
		<reference ref_id="CVE-2022-50299" ref_url="https://www.suse.com/security/cve/CVE-2022-50299/" source="CVE"/>
		<reference ref_id="CVE-2022-50308" ref_url="https://www.suse.com/security/cve/CVE-2022-50308/" source="CVE"/>
		<reference ref_id="CVE-2022-50318" ref_url="https://www.suse.com/security/cve/CVE-2022-50318/" source="CVE"/>
		<reference ref_id="CVE-2022-50325" ref_url="https://www.suse.com/security/cve/CVE-2022-50325/" source="CVE"/>
		<reference ref_id="CVE-2022-50350" ref_url="https://www.suse.com/security/cve/CVE-2022-50350/" source="CVE"/>
		<reference ref_id="CVE-2022-50381" ref_url="https://www.suse.com/security/cve/CVE-2022-50381/" source="CVE"/>
		<reference ref_id="CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408/" source="CVE"/>
		<reference ref_id="CVE-2022-50410" ref_url="https://www.suse.com/security/cve/CVE-2022-50410/" source="CVE"/>
		<reference ref_id="CVE-2022-50418" ref_url="https://www.suse.com/security/cve/CVE-2022-50418/" source="CVE"/>
		<reference ref_id="CVE-2022-50425" ref_url="https://www.suse.com/security/cve/CVE-2022-50425/" source="CVE"/>
		<reference ref_id="CVE-2022-50427" ref_url="https://www.suse.com/security/cve/CVE-2022-50427/" source="CVE"/>
		<reference ref_id="CVE-2022-50431" ref_url="https://www.suse.com/security/cve/CVE-2022-50431/" source="CVE"/>
		<reference ref_id="CVE-2022-50467" ref_url="https://www.suse.com/security/cve/CVE-2022-50467/" source="CVE"/>
		<reference ref_id="CVE-2022-50482" ref_url="https://www.suse.com/security/cve/CVE-2022-50482/" source="CVE"/>
		<reference ref_id="CVE-2022-50484" ref_url="https://www.suse.com/security/cve/CVE-2022-50484/" source="CVE"/>
		<reference ref_id="CVE-2022-50487" ref_url="https://www.suse.com/security/cve/CVE-2022-50487/" source="CVE"/>
		<reference ref_id="CVE-2022-50493" ref_url="https://www.suse.com/security/cve/CVE-2022-50493/" source="CVE"/>
		<reference ref_id="CVE-2022-50496" ref_url="https://www.suse.com/security/cve/CVE-2022-50496/" source="CVE"/>
		<reference ref_id="CVE-2022-50516" ref_url="https://www.suse.com/security/cve/CVE-2022-50516/" source="CVE"/>
		<reference ref_id="CVE-2022-50531" ref_url="https://www.suse.com/security/cve/CVE-2022-50531/" source="CVE"/>
		<reference ref_id="CVE-2022-50534" ref_url="https://www.suse.com/security/cve/CVE-2022-50534/" source="CVE"/>
		<reference ref_id="CVE-2022-50543" ref_url="https://www.suse.com/security/cve/CVE-2022-50543/" source="CVE"/>
		<reference ref_id="CVE-2022-50549" ref_url="https://www.suse.com/security/cve/CVE-2022-50549/" source="CVE"/>
		<reference ref_id="CVE-2022-50554" ref_url="https://www.suse.com/security/cve/CVE-2022-50554/" source="CVE"/>
		<reference ref_id="CVE-2022-50563" ref_url="https://www.suse.com/security/cve/CVE-2022-50563/" source="CVE"/>
		<reference ref_id="CVE-2022-50569" ref_url="https://www.suse.com/security/cve/CVE-2022-50569/" source="CVE"/>
		<reference ref_id="CVE-2022-50583" ref_url="https://www.suse.com/security/cve/CVE-2022-50583/" source="CVE"/>
		<reference ref_id="CVE-2022-50615" ref_url="https://www.suse.com/security/cve/CVE-2022-50615/" source="CVE"/>
		<reference ref_id="CVE-2022-50671" ref_url="https://www.suse.com/security/cve/CVE-2022-50671/" source="CVE"/>
		<reference ref_id="CVE-2022-50678" ref_url="https://www.suse.com/security/cve/CVE-2022-50678/" source="CVE"/>
		<reference ref_id="CVE-2022-50698" ref_url="https://www.suse.com/security/cve/CVE-2022-50698/" source="CVE"/>
		<reference ref_id="CVE-2022-50714" ref_url="https://www.suse.com/security/cve/CVE-2022-50714/" source="CVE"/>
		<reference ref_id="CVE-2022-50715" ref_url="https://www.suse.com/security/cve/CVE-2022-50715/" source="CVE"/>
		<reference ref_id="CVE-2022-50723" ref_url="https://www.suse.com/security/cve/CVE-2022-50723/" source="CVE"/>
		<reference ref_id="CVE-2022-50726" ref_url="https://www.suse.com/security/cve/CVE-2022-50726/" source="CVE"/>
		<reference ref_id="CVE-2022-50744" ref_url="https://www.suse.com/security/cve/CVE-2022-50744/" source="CVE"/>
		<reference ref_id="CVE-2022-50752" ref_url="https://www.suse.com/security/cve/CVE-2022-50752/" source="CVE"/>
		<reference ref_id="CVE-2022-50768" ref_url="https://www.suse.com/security/cve/CVE-2022-50768/" source="CVE"/>
		<reference ref_id="CVE-2022-50773" ref_url="https://www.suse.com/security/cve/CVE-2022-50773/" source="CVE"/>
		<reference ref_id="CVE-2022-50863" ref_url="https://www.suse.com/security/cve/CVE-2022-50863/" source="CVE"/>
		<reference ref_id="CVE-2022-50866" ref_url="https://www.suse.com/security/cve/CVE-2022-50866/" source="CVE"/>
		<reference ref_id="CVE-2022-50889" ref_url="https://www.suse.com/security/cve/CVE-2022-50889/" source="CVE"/>
		<reference ref_id="CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394/" source="CVE"/>
		<reference ref_id="CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461/" source="CVE"/>
		<reference ref_id="CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095/" source="CVE"/>
		<reference ref_id="CVE-2023-1195" ref_url="https://www.suse.com/security/cve/CVE-2023-1195/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177/" source="CVE"/>
		<reference ref_id="CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998/" source="CVE"/>
		<reference ref_id="CVE-2023-23454" ref_url="https://www.suse.com/security/cve/CVE-2023-23454/" source="CVE"/>
		<reference ref_id="CVE-2023-53064" ref_url="https://www.suse.com/security/cve/CVE-2023-53064/" source="CVE"/>
		<reference ref_id="CVE-2023-53273" ref_url="https://www.suse.com/security/cve/CVE-2023-53273/" source="CVE"/>
		<reference ref_id="CVE-2023-53393" ref_url="https://www.suse.com/security/cve/CVE-2023-53393/" source="CVE"/>
		<reference ref_id="CVE-2023-53549" ref_url="https://www.suse.com/security/cve/CVE-2023-53549/" source="CVE"/>
		<reference ref_id="CVE-2023-53552" ref_url="https://www.suse.com/security/cve/CVE-2023-53552/" source="CVE"/>
		<reference ref_id="CVE-2023-53811" ref_url="https://www.suse.com/security/cve/CVE-2023-53811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26341">CVE-2021-26341 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33656/">CVE-2021-33656 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33656">CVE-2021-33656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47221/">CVE-2021-47221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47221">CVE-2021-47221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1789/">CVE-2022-1789 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20141/">CVE-2022-20141 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20141">CVE-2022-20141 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-25265/">CVE-2022-25265 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25265">CVE-2022-25265 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3522/">CVE-2022-3522 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3522">CVE-2022-3522 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3566/">CVE-2022-3566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3566">CVE-2022-3566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3567">CVE-2022-3567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3619/">CVE-2022-3619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3623/">CVE-2022-3623 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39188">CVE-2022-39188 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41218/">CVE-2022-41218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41218">CVE-2022-41218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4662/">CVE-2022-4662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47929/">CVE-2022-47929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48696/">CVE-2022-48696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48696">CVE-2022-48696 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48883/">CVE-2022-48883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48883">CVE-2022-48883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48884/">CVE-2022-48884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48884">CVE-2022-48884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49114/">CVE-2022-49114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49114">CVE-2022-49114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49294/">CVE-2022-49294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49294">CVE-2022-49294 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49319/">CVE-2022-49319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49319">CVE-2022-49319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49323/">CVE-2022-49323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49323">CVE-2022-49323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49328/">CVE-2022-49328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49328">CVE-2022-49328 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49330/">CVE-2022-49330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49330">CVE-2022-49330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49333/">CVE-2022-49333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49333">CVE-2022-49333 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49339/">CVE-2022-49339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49339">CVE-2022-49339 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49365/">CVE-2022-49365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49365">CVE-2022-49365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49371/">CVE-2022-49371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49371">CVE-2022-49371 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49372/">CVE-2022-49372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49372">CVE-2022-49372 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49376/">CVE-2022-49376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49376">CVE-2022-49376 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49416/">CVE-2022-49416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49416">CVE-2022-49416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49429/">CVE-2022-49429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49429">CVE-2022-49429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49471/">CVE-2022-49471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49471">CVE-2022-49471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49511/">CVE-2022-49511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49511">CVE-2022-49511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49513/">CVE-2022-49513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49513">CVE-2022-49513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49519/">CVE-2022-49519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49519">CVE-2022-49519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49539/">CVE-2022-49539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49539">CVE-2022-49539 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49545/">CVE-2022-49545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49545">CVE-2022-49545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49577/">CVE-2022-49577 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49577">CVE-2022-49577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49583/">CVE-2022-49583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49583">CVE-2022-49583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49592/">CVE-2022-49592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49592">CVE-2022-49592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49636/">CVE-2022-49636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49636">CVE-2022-49636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49642/">CVE-2022-49642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49642">CVE-2022-49642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49644/">CVE-2022-49644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49644">CVE-2022-49644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49646/">CVE-2022-49646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49646">CVE-2022-49646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49653/">CVE-2022-49653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49653">CVE-2022-49653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49663/">CVE-2022-49663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49663">CVE-2022-49663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49691/">CVE-2022-49691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49691">CVE-2022-49691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49723/">CVE-2022-49723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49723">CVE-2022-49723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49726/">CVE-2022-49726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49726">CVE-2022-49726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49732/">CVE-2022-49732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49732">CVE-2022-49732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49872/">CVE-2022-49872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49872">CVE-2022-49872 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49908/">CVE-2022-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49908">CVE-2022-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49925/">CVE-2022-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49925">CVE-2022-49925 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49934/">CVE-2022-49934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49934">CVE-2022-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49935/">CVE-2022-49935 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49935">CVE-2022-49935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49936/">CVE-2022-49936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49936">CVE-2022-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49942/">CVE-2022-49942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49942">CVE-2022-49942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49951/">CVE-2022-49951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49951">CVE-2022-49951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49958/">CVE-2022-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49958">CVE-2022-49958 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49959/">CVE-2022-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49959">CVE-2022-49959 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49960/">CVE-2022-49960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49960">CVE-2022-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49962/">CVE-2022-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49962">CVE-2022-49962 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49964/">CVE-2022-49964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49964">CVE-2022-49964 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49965/">CVE-2022-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49965">CVE-2022-49965 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49966/">CVE-2022-49966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49966">CVE-2022-49966 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49969/">CVE-2022-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49969">CVE-2022-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49971/">CVE-2022-49971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49971">CVE-2022-49971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49982/">CVE-2022-49982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49982">CVE-2022-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49983/">CVE-2022-49983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49983">CVE-2022-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49986/">CVE-2022-49986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49986">CVE-2022-49986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50000/">CVE-2022-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50000">CVE-2022-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50001/">CVE-2022-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50001">CVE-2022-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50002/">CVE-2022-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50002">CVE-2022-50002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50007/">CVE-2022-50007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50007">CVE-2022-50007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50015/">CVE-2022-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50015">CVE-2022-50015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50016/">CVE-2022-50016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50016">CVE-2022-50016 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50022/">CVE-2022-50022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50022">CVE-2022-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50035/">CVE-2022-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50035">CVE-2022-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50037/">CVE-2022-50037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50037">CVE-2022-50037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50039/">CVE-2022-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50039">CVE-2022-50039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50041/">CVE-2022-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50041">CVE-2022-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50044/">CVE-2022-50044 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50044">CVE-2022-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50048/">CVE-2022-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50048">CVE-2022-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50049/">CVE-2022-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50049">CVE-2022-50049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50050/">CVE-2022-50050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50050">CVE-2022-50050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50052/">CVE-2022-50052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50052">CVE-2022-50052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50068/">CVE-2022-50068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50068">CVE-2022-50068 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50070/">CVE-2022-50070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50070">CVE-2022-50070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50079/">CVE-2022-50079 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50079">CVE-2022-50079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50093/">CVE-2022-50093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50093">CVE-2022-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50100/">CVE-2022-50100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50100">CVE-2022-50100 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50111/">CVE-2022-50111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50111">CVE-2022-50111 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50113/">CVE-2022-50113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50113">CVE-2022-50113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50127/">CVE-2022-50127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50127">CVE-2022-50127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50129/">CVE-2022-50129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50129">CVE-2022-50129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50130/">CVE-2022-50130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50130">CVE-2022-50130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50133/">CVE-2022-50133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50133">CVE-2022-50133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50135/">CVE-2022-50135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50135">CVE-2022-50135 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50136/">CVE-2022-50136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50136">CVE-2022-50136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50137/">CVE-2022-50137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50137">CVE-2022-50137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50138/">CVE-2022-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50138">CVE-2022-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50149/">CVE-2022-50149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50149">CVE-2022-50149 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50164/">CVE-2022-50164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50164">CVE-2022-50164 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50172/">CVE-2022-50172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50172">CVE-2022-50172 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50181/">CVE-2022-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50181">CVE-2022-50181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50185/">CVE-2022-50185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50185">CVE-2022-50185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50189/">CVE-2022-50189 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50189">CVE-2022-50189 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50211/">CVE-2022-50211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50211">CVE-2022-50211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50221/">CVE-2022-50221 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50221">CVE-2022-50221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50226/">CVE-2022-50226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50226">CVE-2022-50226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50229/">CVE-2022-50229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50229">CVE-2022-50229 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50235/">CVE-2022-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50235">CVE-2022-50235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50243/">CVE-2022-50243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50243">CVE-2022-50243 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50271/">CVE-2022-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50271">CVE-2022-50271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50299/">CVE-2022-50299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50299">CVE-2022-50299 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50308/">CVE-2022-50308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50308">CVE-2022-50308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50318/">CVE-2022-50318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50318">CVE-2022-50318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50325/">CVE-2022-50325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50325">CVE-2022-50325 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50350/">CVE-2022-50350 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50350">CVE-2022-50350 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50381/">CVE-2022-50381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50381">CVE-2022-50381 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50410/">CVE-2022-50410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50410">CVE-2022-50410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50418/">CVE-2022-50418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50418">CVE-2022-50418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50425/">CVE-2022-50425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50425">CVE-2022-50425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50427/">CVE-2022-50427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50427">CVE-2022-50427 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50431/">CVE-2022-50431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50431">CVE-2022-50431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50467/">CVE-2022-50467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50467">CVE-2022-50467 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50482/">CVE-2022-50482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50482">CVE-2022-50482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50484/">CVE-2022-50484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50484">CVE-2022-50484 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50487/">CVE-2022-50487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50487">CVE-2022-50487 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50493/">CVE-2022-50493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50493">CVE-2022-50493 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50496/">CVE-2022-50496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50496">CVE-2022-50496 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50516/">CVE-2022-50516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50516">CVE-2022-50516 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50531/">CVE-2022-50531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50531">CVE-2022-50531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50534/">CVE-2022-50534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50534">CVE-2022-50534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50543/">CVE-2022-50543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50543">CVE-2022-50543 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50549/">CVE-2022-50549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50549">CVE-2022-50549 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50554/">CVE-2022-50554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50554">CVE-2022-50554 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50563/">CVE-2022-50563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50563">CVE-2022-50563 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50569/">CVE-2022-50569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50569">CVE-2022-50569 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50583/">CVE-2022-50583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50583">CVE-2022-50583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50615/">CVE-2022-50615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50615">CVE-2022-50615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50671/">CVE-2022-50671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50671">CVE-2022-50671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50678/">CVE-2022-50678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50678">CVE-2022-50678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50698/">CVE-2022-50698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50698">CVE-2022-50698 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50714/">CVE-2022-50714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50714">CVE-2022-50714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50715/">CVE-2022-50715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50715">CVE-2022-50715 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50723/">CVE-2022-50723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50723">CVE-2022-50723 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50726/">CVE-2022-50726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50726">CVE-2022-50726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50744/">CVE-2022-50744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50744">CVE-2022-50744 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50752/">CVE-2022-50752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50752">CVE-2022-50752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50768/">CVE-2022-50768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50768">CVE-2022-50768 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50773/">CVE-2022-50773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50773">CVE-2022-50773 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50863/">CVE-2022-50863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50863">CVE-2022-50863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50866/">CVE-2022-50866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50866">CVE-2022-50866 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50889/">CVE-2022-50889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50889">CVE-2022-50889 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1195/">CVE-2023-1195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1195">CVE-2023-1195 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23454/">CVE-2023-23454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53064/">CVE-2023-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53064">CVE-2023-53064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53273/">CVE-2023-53273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53273">CVE-2023-53273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53393/">CVE-2023-53393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53393">CVE-2023-53393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53549/">CVE-2023-53549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53549">CVE-2023-53549 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53552/">CVE-2023-53552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53552">CVE-2023-53552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53811/">CVE-2023-53811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53811">CVE-2023-53811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842128" comment="bpftool-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842129" comment="kernel-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842130" comment="kernel-abi-stablelists-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842131" comment="kernel-core-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842132" comment="kernel-cross-headers-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842133" comment="kernel-debug-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842134" comment="kernel-debug-core-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842136" comment="kernel-debug-modules-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842137" comment="kernel-debug-modules-extra-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842139" comment="kernel-doc-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842140" comment="kernel-headers-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842141" comment="kernel-modules-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842142" comment="kernel-modules-extra-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842143" comment="kernel-tools-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842144" comment="kernel-tools-libs-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842146" comment="perf-4.18.0-477.10.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842147" comment="python3-perf-4.18.0-477.10.1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2621" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252/" source="CVE"/>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2963.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2963.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842148" comment="curl-7.61.1-30.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842149" comment="libcurl-7.61.1-30.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842150" comment="libcurl-devel-7.61.1-30.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842151" comment="libcurl-minimal-7.61.1-30.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2622" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-44792" ref_url="https://www.suse.com/security/cve/CVE-2022-44792/" source="CVE"/>
		<reference ref_id="CVE-2022-44793" ref_url="https://www.suse.com/security/cve/CVE-2022-44793/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2969.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2969.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44792/">CVE-2022-44792 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44792">CVE-2022-44792 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44793/">CVE-2022-44793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44793">CVE-2022-44793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842152" comment="net-snmp-5.8-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842153" comment="net-snmp-agent-libs-5.8-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842154" comment="net-snmp-devel-5.8-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842155" comment="net-snmp-libs-5.8-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842156" comment="net-snmp-perl-5.8-27.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842157" comment="net-snmp-utils-5.8-27.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2623" version="1" class="patch">
	<metadata>
		<title>security update for evolution-mapi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-1615" ref_url="https://www.suse.com/security/cve/CVE-2022-1615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2987.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2987.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1615/">CVE-2022-1615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1615">CVE-2022-1615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842158" comment="ctdb-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842159" comment="evolution-mapi-3.28.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842160" comment="evolution-mapi-langpacks-3.28.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842161" comment="libnetapi-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981831" comment="libnetapi-devel-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842162" comment="libsmbclient-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981832" comment="libsmbclient-devel-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842163" comment="libwbclient-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981833" comment="libwbclient-devel-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842164" comment="openchange-2.3-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842165" comment="python3-samba-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842166" comment="python3-samba-dc-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981834" comment="python3-samba-devel-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842167" comment="python3-samba-test-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842168" comment="samba-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842169" comment="samba-client-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842170" comment="samba-client-libs-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842171" comment="samba-common-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842172" comment="samba-common-libs-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842173" comment="samba-common-tools-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842174" comment="samba-dc-libs-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842175" comment="samba-dcerpc-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981835" comment="samba-devel-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842176" comment="samba-krb5-printing-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842177" comment="samba-ldb-ldap-modules-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842178" comment="samba-libs-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842179" comment="samba-pidl-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842180" comment="samba-test-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842181" comment="samba-test-libs-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842182" comment="samba-tools-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842183" comment="samba-usershares-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842184" comment="samba-vfs-iouring-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842185" comment="samba-winbind-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842186" comment="samba-winbind-clients-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842187" comment="samba-winbind-krb5-locator-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842188" comment="samba-winbind-modules-4.17.5-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842189" comment="samba-winexe-4.17.5-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2624" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2928" ref_url="https://www.suse.com/security/cve/CVE-2022-2928/" source="CVE"/>
		<reference ref_id="CVE-2022-2929" ref_url="https://www.suse.com/security/cve/CVE-2022-2929/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3000.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3000.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2928/">CVE-2022-2928 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2928">CVE-2022-2928 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2929/">CVE-2022-2929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2929">CVE-2022-2929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842190" comment="dhcp-client-4.3.6-49.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842191" comment="dhcp-common-4.3.6-49.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842192" comment="dhcp-libs-4.3.6-49.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842193" comment="dhcp-relay-4.3.6-49.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842194" comment="dhcp-server-4.3.6-49.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2625" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3002.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3002.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842195" comment="bind-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842196" comment="bind-chroot-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842197" comment="bind-devel-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842198" comment="bind-export-devel-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842199" comment="bind-export-libs-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842200" comment="bind-libs-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842201" comment="bind-libs-lite-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842202" comment="bind-license-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842203" comment="bind-lite-devel-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842204" comment="bind-pkcs11-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842205" comment="bind-pkcs11-devel-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842206" comment="bind-pkcs11-libs-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842207" comment="bind-pkcs11-utils-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842208" comment="bind-sdb-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842209" comment="bind-sdb-chroot-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842210" comment="bind-utils-9.11.36-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842211" comment="python3-bind-9.11.36-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2626" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-36227" ref_url="https://www.suse.com/security/cve/CVE-2022-36227/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3018.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3018.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-36227/">CVE-2022-36227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842212" comment="bsdtar-3.3.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842213" comment="libarchive-3.3.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842214" comment="libarchive-devel-3.3.3-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2627" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3042.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3042.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45939">CVE-2022-45939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842215" comment="emacs-26.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842216" comment="emacs-common-26.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842217" comment="emacs-filesystem-26.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842218" comment="emacs-lucid-26.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842219" comment="emacs-nox-26.1-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842220" comment="emacs-terminal-26.1-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2628" version="1" class="patch">
	<metadata>
		<title>security update for autotrace (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32323" ref_url="https://www.suse.com/security/cve/CVE-2022-32323/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32323/">CVE-2022-32323 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32323">CVE-2022-32323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842221" comment="autotrace-0.31.1-55.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2629" version="1" class="patch">
	<metadata>
		<title>security update for mingw-expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3068.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3068.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842222" comment="mingw32-expat-2.4.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842223" comment="mingw64-expat-2.4.8-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2630" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3082.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3082.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842224" comment="pcs-0.10.15-4.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842225" comment="pcs-snmp-0.10.15-4.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2631" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842226" comment="delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842227" comment="go-toolset-1.19.6-1.module+el8.8.0+18289+edd6c8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842228" comment="golang-1.19.6-1.module+el8.8.0+18289+edd6c8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842229" comment="golang-bin-1.19.6-1.module+el8.8.0+18289+edd6c8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842230" comment="golang-docs-1.19.6-1.module+el8.8.0+18289+edd6c8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842231" comment="golang-misc-1.19.6-1.module+el8.8.0+18289+edd6c8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842232" comment="golang-race-1.19.6-1.module+el8.8.0+18289+edd6c8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842233" comment="golang-src-1.19.6-1.module+el8.8.0+18289+edd6c8b6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842234" comment="golang-tests-1.19.6-1.module+el8.8.0+18289+edd6c8b6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2632" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-21594" ref_url="https://www.suse.com/security/cve/CVE-2022-21594/" source="CVE"/>
		<reference ref_id="CVE-2022-21599" ref_url="https://www.suse.com/security/cve/CVE-2022-21599/" source="CVE"/>
		<reference ref_id="CVE-2022-21604" ref_url="https://www.suse.com/security/cve/CVE-2022-21604/" source="CVE"/>
		<reference ref_id="CVE-2022-21608" ref_url="https://www.suse.com/security/cve/CVE-2022-21608/" source="CVE"/>
		<reference ref_id="CVE-2022-21611" ref_url="https://www.suse.com/security/cve/CVE-2022-21611/" source="CVE"/>
		<reference ref_id="CVE-2022-21617" ref_url="https://www.suse.com/security/cve/CVE-2022-21617/" source="CVE"/>
		<reference ref_id="CVE-2022-21625" ref_url="https://www.suse.com/security/cve/CVE-2022-21625/" source="CVE"/>
		<reference ref_id="CVE-2022-21632" ref_url="https://www.suse.com/security/cve/CVE-2022-21632/" source="CVE"/>
		<reference ref_id="CVE-2022-21633" ref_url="https://www.suse.com/security/cve/CVE-2022-21633/" source="CVE"/>
		<reference ref_id="CVE-2022-21637" ref_url="https://www.suse.com/security/cve/CVE-2022-21637/" source="CVE"/>
		<reference ref_id="CVE-2022-21640" ref_url="https://www.suse.com/security/cve/CVE-2022-21640/" source="CVE"/>
		<reference ref_id="CVE-2022-39400" ref_url="https://www.suse.com/security/cve/CVE-2022-39400/" source="CVE"/>
		<reference ref_id="CVE-2022-39408" ref_url="https://www.suse.com/security/cve/CVE-2022-39408/" source="CVE"/>
		<reference ref_id="CVE-2022-39410" ref_url="https://www.suse.com/security/cve/CVE-2022-39410/" source="CVE"/>
		<reference ref_id="CVE-2023-21836" ref_url="https://www.suse.com/security/cve/CVE-2023-21836/" source="CVE"/>
		<reference ref_id="CVE-2023-21863" ref_url="https://www.suse.com/security/cve/CVE-2023-21863/" source="CVE"/>
		<reference ref_id="CVE-2023-21864" ref_url="https://www.suse.com/security/cve/CVE-2023-21864/" source="CVE"/>
		<reference ref_id="CVE-2023-21865" ref_url="https://www.suse.com/security/cve/CVE-2023-21865/" source="CVE"/>
		<reference ref_id="CVE-2023-21867" ref_url="https://www.suse.com/security/cve/CVE-2023-21867/" source="CVE"/>
		<reference ref_id="CVE-2023-21868" ref_url="https://www.suse.com/security/cve/CVE-2023-21868/" source="CVE"/>
		<reference ref_id="CVE-2023-21869" ref_url="https://www.suse.com/security/cve/CVE-2023-21869/" source="CVE"/>
		<reference ref_id="CVE-2023-21870" ref_url="https://www.suse.com/security/cve/CVE-2023-21870/" source="CVE"/>
		<reference ref_id="CVE-2023-21871" ref_url="https://www.suse.com/security/cve/CVE-2023-21871/" source="CVE"/>
		<reference ref_id="CVE-2023-21873" ref_url="https://www.suse.com/security/cve/CVE-2023-21873/" source="CVE"/>
		<reference ref_id="CVE-2023-21874" ref_url="https://www.suse.com/security/cve/CVE-2023-21874/" source="CVE"/>
		<reference ref_id="CVE-2023-21875" ref_url="https://www.suse.com/security/cve/CVE-2023-21875/" source="CVE"/>
		<reference ref_id="CVE-2023-21876" ref_url="https://www.suse.com/security/cve/CVE-2023-21876/" source="CVE"/>
		<reference ref_id="CVE-2023-21877" ref_url="https://www.suse.com/security/cve/CVE-2023-21877/" source="CVE"/>
		<reference ref_id="CVE-2023-21878" ref_url="https://www.suse.com/security/cve/CVE-2023-21878/" source="CVE"/>
		<reference ref_id="CVE-2023-21879" ref_url="https://www.suse.com/security/cve/CVE-2023-21879/" source="CVE"/>
		<reference ref_id="CVE-2023-21880" ref_url="https://www.suse.com/security/cve/CVE-2023-21880/" source="CVE"/>
		<reference ref_id="CVE-2023-21881" ref_url="https://www.suse.com/security/cve/CVE-2023-21881/" source="CVE"/>
		<reference ref_id="CVE-2023-21882" ref_url="https://www.suse.com/security/cve/CVE-2023-21882/" source="CVE"/>
		<reference ref_id="CVE-2023-21883" ref_url="https://www.suse.com/security/cve/CVE-2023-21883/" source="CVE"/>
		<reference ref_id="CVE-2023-21887" ref_url="https://www.suse.com/security/cve/CVE-2023-21887/" source="CVE"/>
		<reference ref_id="CVE-2023-21912" ref_url="https://www.suse.com/security/cve/CVE-2023-21912/" source="CVE"/>
		<reference ref_id="CVE-2023-21913" ref_url="https://www.suse.com/security/cve/CVE-2023-21913/" source="CVE"/>
		<reference ref_id="CVE-2023-21917" ref_url="https://www.suse.com/security/cve/CVE-2023-21917/" source="CVE"/>
		<reference ref_id="CVE-2023-21963" ref_url="https://www.suse.com/security/cve/CVE-2023-21963/" source="CVE"/>
		<reference ref_id="CVE-2023-22015" ref_url="https://www.suse.com/security/cve/CVE-2023-22015/" source="CVE"/>
		<reference ref_id="CVE-2023-22026" ref_url="https://www.suse.com/security/cve/CVE-2023-22026/" source="CVE"/>
		<reference ref_id="CVE-2023-22028" ref_url="https://www.suse.com/security/cve/CVE-2023-22028/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3087.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3087.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21594/">CVE-2022-21594 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21594">CVE-2022-21594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21599/">CVE-2022-21599 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21599">CVE-2022-21599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21604/">CVE-2022-21604 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21604">CVE-2022-21604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21608/">CVE-2022-21608 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21608">CVE-2022-21608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21611/">CVE-2022-21611 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21611">CVE-2022-21611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21617/">CVE-2022-21617 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21617">CVE-2022-21617 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21625/">CVE-2022-21625 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21625">CVE-2022-21625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21632/">CVE-2022-21632 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21632">CVE-2022-21632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21633/">CVE-2022-21633 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21633">CVE-2022-21633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21637/">CVE-2022-21637 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21637">CVE-2022-21637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21640/">CVE-2022-21640 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21640">CVE-2022-21640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39400/">CVE-2022-39400 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39400">CVE-2022-39400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39408/">CVE-2022-39408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39408">CVE-2022-39408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39410/">CVE-2022-39410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39410">CVE-2022-39410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21836/">CVE-2023-21836 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21836">CVE-2023-21836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21863/">CVE-2023-21863 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21863">CVE-2023-21863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21864/">CVE-2023-21864 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21864">CVE-2023-21864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21865/">CVE-2023-21865 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21865">CVE-2023-21865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21867/">CVE-2023-21867 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21867">CVE-2023-21867 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21868/">CVE-2023-21868 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21868">CVE-2023-21868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21869/">CVE-2023-21869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21869">CVE-2023-21869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21870/">CVE-2023-21870 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21870">CVE-2023-21870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21871/">CVE-2023-21871 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21871">CVE-2023-21871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21873/">CVE-2023-21873 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21873">CVE-2023-21873 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21874/">CVE-2023-21874 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21874">CVE-2023-21874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21875/">CVE-2023-21875 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21875">CVE-2023-21875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21876/">CVE-2023-21876 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21876">CVE-2023-21876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21877/">CVE-2023-21877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21877">CVE-2023-21877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21878/">CVE-2023-21878 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21878">CVE-2023-21878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21879/">CVE-2023-21879 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21879">CVE-2023-21879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21880/">CVE-2023-21880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21880">CVE-2023-21880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21881/">CVE-2023-21881 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21881">CVE-2023-21881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21882/">CVE-2023-21882 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21882">CVE-2023-21882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21883/">CVE-2023-21883 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21883">CVE-2023-21883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21887/">CVE-2023-21887 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21887">CVE-2023-21887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21912/">CVE-2023-21912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21912">CVE-2023-21912 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21913/">CVE-2023-21913 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21913">CVE-2023-21913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21917/">CVE-2023-21917 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21917">CVE-2023-21917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21963/">CVE-2023-21963 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21963">CVE-2023-21963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22015/">CVE-2023-22015 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22015">CVE-2023-22015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22026/">CVE-2023-22026 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22026">CVE-2023-22026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22028/">CVE-2023-22028 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22028">CVE-2023-22028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842235" comment="mecab-0.996-2.module+el8.8.0+18436+8918dd75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842236" comment="mecab-devel-0.996-2.module+el8.8.0+18436+8918dd75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832264" comment="mecab-ipadic-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832265" comment="mecab-ipadic-EUCJP-2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842237" comment="mysql-8.0.32-1.module+el8.8.0+18446+fca6280e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842238" comment="mysql-common-8.0.32-1.module+el8.8.0+18446+fca6280e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842239" comment="mysql-devel-8.0.32-1.module+el8.8.0+18446+fca6280e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842240" comment="mysql-errmsg-8.0.32-1.module+el8.8.0+18446+fca6280e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842241" comment="mysql-libs-8.0.32-1.module+el8.8.0+18446+fca6280e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842242" comment="mysql-server-8.0.32-1.module+el8.8.0+18446+fca6280e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842243" comment="mysql-test-8.0.32-1.module+el8.8.0+18446+fca6280e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2633" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-23009" ref_url="https://www.suse.com/security/cve/CVE-2023-23009/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3095.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3095.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23009/">CVE-2023-23009 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23009">CVE-2023-23009 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842244" comment="libreswan-4.9-2.el8_8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2634" version="1" class="patch">
	<metadata>
		<title>security update for gssntlmssp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-25563" ref_url="https://www.suse.com/security/cve/CVE-2023-25563/" source="CVE"/>
		<reference ref_id="CVE-2023-25564" ref_url="https://www.suse.com/security/cve/CVE-2023-25564/" source="CVE"/>
		<reference ref_id="CVE-2023-25565" ref_url="https://www.suse.com/security/cve/CVE-2023-25565/" source="CVE"/>
		<reference ref_id="CVE-2023-25566" ref_url="https://www.suse.com/security/cve/CVE-2023-25566/" source="CVE"/>
		<reference ref_id="CVE-2023-25567" ref_url="https://www.suse.com/security/cve/CVE-2023-25567/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3097.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3097.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25563/">CVE-2023-25563 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25563">CVE-2023-25563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25564/">CVE-2023-25564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25564">CVE-2023-25564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25565/">CVE-2023-25565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25565">CVE-2023-25565 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25566/">CVE-2023-25566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25566">CVE-2023-25566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25567/">CVE-2023-25567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25567">CVE-2023-25567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842245" comment="gssntlmssp-1.2.0-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2635" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-2491" ref_url="https://www.suse.com/security/cve/CVE-2023-2491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3104.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3104.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2491/">CVE-2023-2491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2491">CVE-2023-2491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842246" comment="emacs-26.1-10.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842247" comment="emacs-common-26.1-10.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842248" comment="emacs-filesystem-26.1-10.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842249" comment="emacs-lucid-26.1-10.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842250" comment="emacs-nox-26.1-10.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842251" comment="emacs-terminal-26.1-10.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2636" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-27535" ref_url="https://www.suse.com/security/cve/CVE-2023-27535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3106.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3106.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27535/">CVE-2023-27535 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842252" comment="curl-7.61.1-30.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842253" comment="libcurl-7.61.1-30.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842254" comment="libcurl-devel-7.61.1-30.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842255" comment="libcurl-minimal-7.61.1-30.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2637" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-2295" ref_url="https://www.suse.com/security/cve/CVE-2023-2295/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3107.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3107.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2295/">CVE-2023-2295 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2295">CVE-2023-2295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842256" comment="libreswan-4.9-3.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2638" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-2203" ref_url="https://www.suse.com/security/cve/CVE-2023-2203/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3108.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3108.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2203/">CVE-2023-2203 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2203">CVE-2023-2203 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842257" comment="webkit2gtk3-2.38.5-1.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842258" comment="webkit2gtk3-devel-2.38.5-1.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842259" comment="webkit2gtk3-jsc-2.38.5-1.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842260" comment="webkit2gtk3-jsc-devel-2.38.5-1.el8_8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2639" version="1" class="patch">
	<metadata>
		<title>security update for apr-util (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3109.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3109.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842261" comment="apr-util-1.6.1-6.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842262" comment="apr-util-bdb-1.6.1-6.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842263" comment="apr-util-devel-1.6.1-6.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842264" comment="apr-util-ldap-1.6.1-6.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842265" comment="apr-util-mysql-1.6.1-6.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842266" comment="apr-util-odbc-1.6.1-6.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842267" comment="apr-util-openssl-1.6.1-6.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842268" comment="apr-util-pgsql-1.6.1-6.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842269" comment="apr-util-sqlite-1.6.1-6.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2640" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3220.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3220.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842270" comment="firefox-102.11.0-2.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2641" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3221.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3221.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842271" comment="thunderbird-102.11.0-1.el8_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2642" version="1" class="patch">
	<metadata>
		<title>security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22490" ref_url="https://www.suse.com/security/cve/CVE-2023-22490/" source="CVE"/>
		<reference ref_id="CVE-2023-23946" ref_url="https://www.suse.com/security/cve/CVE-2023-23946/" source="CVE"/>
		<reference ref_id="CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652/" source="CVE"/>
		<reference ref_id="CVE-2023-25815" ref_url="https://www.suse.com/security/cve/CVE-2023-25815/" source="CVE"/>
		<reference ref_id="CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3246.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3246.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22490/">CVE-2023-22490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23946/">CVE-2023-23946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-25815/">CVE-2023-25815 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842272" comment="git-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842273" comment="git-all-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842274" comment="git-core-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842275" comment="git-core-doc-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842276" comment="git-credential-libsecret-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842277" comment="git-daemon-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842278" comment="git-email-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842279" comment="git-gui-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842280" comment="git-instaweb-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842281" comment="git-subtree-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842282" comment="git-svn-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842283" comment="gitk-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842284" comment="gitweb-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842285" comment="perl-Git-2.39.3-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842286" comment="perl-Git-SVN-2.39.3-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2643" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24532" ref_url="https://www.suse.com/security/cve/CVE-2023-24532/" source="CVE"/>
		<reference ref_id="CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534/" source="CVE"/>
		<reference ref_id="CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536/" source="CVE"/>
		<reference ref_id="CVE-2023-24537" ref_url="https://www.suse.com/security/cve/CVE-2023-24537/" source="CVE"/>
		<reference ref_id="CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538/" source="CVE"/>
		<reference ref_id="CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539/" source="CVE"/>
		<reference ref_id="CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540/" source="CVE"/>
		<reference ref_id="CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3319.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3319.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24532/">CVE-2023-24532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24537/">CVE-2023-24537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842226" comment="delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842287" comment="go-toolset-1.19.9-1.module+el8.8.0+18857+fca43658 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842288" comment="golang-1.19.9-1.module+el8.8.0+18857+fca43658 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842289" comment="golang-bin-1.19.9-1.module+el8.8.0+18857+fca43658 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842290" comment="golang-docs-1.19.9-1.module+el8.8.0+18857+fca43658 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842291" comment="golang-misc-1.19.9-1.module+el8.8.0+18857+fca43658 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842292" comment="golang-race-1.19.9-1.module+el8.8.0+18857+fca43658 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842293" comment="golang-src-1.19.9-1.module+el8.8.0+18857+fca43658 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842294" comment="golang-tests-1.19.9-1.module+el8.8.0+18857+fca43658 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2644" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233/" source="CVE"/>
		<reference ref_id="CVE-2023-54325" ref_url="https://www.suse.com/security/cve/CVE-2023-54325/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3349.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3349.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54325/">CVE-2023-54325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54325">CVE-2023-54325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842295" comment="bpftool-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842296" comment="kernel-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842297" comment="kernel-abi-stablelists-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842298" comment="kernel-core-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842299" comment="kernel-cross-headers-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842300" comment="kernel-debug-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842301" comment="kernel-debug-core-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842303" comment="kernel-debug-modules-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842304" comment="kernel-debug-modules-extra-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842306" comment="kernel-doc-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842307" comment="kernel-headers-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842308" comment="kernel-modules-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842309" comment="kernel-modules-extra-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842310" comment="kernel-tools-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842311" comment="kernel-tools-libs-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842313" comment="perf-4.18.0-477.13.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842314" comment="python3-perf-4.18.0-477.13.1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2645" version="1" class="patch">
	<metadata>
		<title>security update for cups-filters (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24805" ref_url="https://www.suse.com/security/cve/CVE-2023-24805/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3425.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3425.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24805/">CVE-2023-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24805">CVE-2023-24805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842315" comment="cups-filters-1.20.0-29.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842316" comment="cups-filters-devel-1.20.0-29.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842317" comment="cups-filters-libs-1.20.0-29.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2646" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28204" ref_url="https://www.suse.com/security/cve/CVE-2023-28204/" source="CVE"/>
		<reference ref_id="CVE-2023-32373" ref_url="https://www.suse.com/security/cve/CVE-2023-32373/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3433.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3433.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28204/">CVE-2023-28204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28204">CVE-2023-28204 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32373/">CVE-2023-32373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32373">CVE-2023-32373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842318" comment="webkit2gtk3-2.38.5-1.el8_8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842319" comment="webkit2gtk3-devel-2.38.5-1.el8_8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842320" comment="webkit2gtk3-jsc-2.38.5-1.el8_8.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842321" comment="webkit2gtk3-jsc-devel-2.38.5-1.el8_8.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2647" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24936" ref_url="https://www.suse.com/security/cve/CVE-2023-24936/" source="CVE"/>
		<reference ref_id="CVE-2023-29331" ref_url="https://www.suse.com/security/cve/CVE-2023-29331/" source="CVE"/>
		<reference ref_id="CVE-2023-29337" ref_url="https://www.suse.com/security/cve/CVE-2023-29337/" source="CVE"/>
		<reference ref_id="CVE-2023-33128" ref_url="https://www.suse.com/security/cve/CVE-2023-33128/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24936/">CVE-2023-24936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24936">CVE-2023-24936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29331/">CVE-2023-29331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29331">CVE-2023-29331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29337/">CVE-2023-29337 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29337">CVE-2023-29337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33128/">CVE-2023-33128 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33128">CVE-2023-33128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842322" comment="aspnetcore-runtime-6.0-6.0.18-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842323" comment="aspnetcore-targeting-pack-6.0-6.0.18-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842324" comment="dotnet-apphost-pack-6.0-6.0.18-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842325" comment="dotnet-hostfxr-6.0-6.0.18-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842326" comment="dotnet-runtime-6.0-6.0.18-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842327" comment="dotnet-sdk-6.0-6.0.118-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842328" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842329" comment="dotnet-targeting-pack-6.0-6.0.18-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842330" comment="dotnet-templates-6.0-6.0.118-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2648" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3584.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3584.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842331" comment="c-ares-1.13.0-6.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842332" comment="c-ares-devel-1.13.0-6.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2649" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3588.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3588.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842333" comment="thunderbird-102.12.0-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2650" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3590.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3590.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842334" comment="firefox-102.12.0-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2651" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842335" comment="platform-python-3.6.8-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842336" comment="platform-python-debug-3.6.8-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842337" comment="platform-python-devel-3.6.8-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842338" comment="python3-idle-3.6.8-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842339" comment="python3-libs-3.6.8-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842340" comment="python3-test-3.6.8-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842341" comment="python3-tkinter-3.6.8-51.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2652" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24936" ref_url="https://www.suse.com/security/cve/CVE-2023-24936/" source="CVE"/>
		<reference ref_id="CVE-2023-29331" ref_url="https://www.suse.com/security/cve/CVE-2023-29331/" source="CVE"/>
		<reference ref_id="CVE-2023-29337" ref_url="https://www.suse.com/security/cve/CVE-2023-29337/" source="CVE"/>
		<reference ref_id="CVE-2023-32032" ref_url="https://www.suse.com/security/cve/CVE-2023-32032/" source="CVE"/>
		<reference ref_id="CVE-2023-33128" ref_url="https://www.suse.com/security/cve/CVE-2023-33128/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3593.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3593.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24936/">CVE-2023-24936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24936">CVE-2023-24936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29331/">CVE-2023-29331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29331">CVE-2023-29331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29337/">CVE-2023-29337 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29337">CVE-2023-29337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32032/">CVE-2023-32032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32032">CVE-2023-32032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33128/">CVE-2023-33128 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33128">CVE-2023-33128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842342" comment="aspnetcore-runtime-7.0-7.0.7-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842343" comment="aspnetcore-targeting-pack-7.0-7.0.7-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842344" comment="dotnet-7.0.107-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842345" comment="dotnet-apphost-pack-7.0-7.0.7-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842346" comment="dotnet-host-7.0.7-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842347" comment="dotnet-hostfxr-7.0-7.0.7-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842348" comment="dotnet-runtime-7.0-7.0.7-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842349" comment="dotnet-sdk-7.0-7.0.107-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842350" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842351" comment="dotnet-targeting-pack-7.0-7.0.7-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842352" comment="dotnet-templates-7.0-7.0.107-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842353" comment="netstandard-targeting-pack-2.1-7.0.107-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2653" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3594.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3594.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842354" comment="python3.11-3.11.2-2.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842355" comment="python3.11-debug-3.11.2-2.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842356" comment="python3.11-devel-3.11.2-2.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842357" comment="python3.11-idle-3.11.2-2.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842358" comment="python3.11-libs-3.11.2-2.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842359" comment="python3.11-rpm-macros-3.11.2-2.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842360" comment="python3.11-test-3.11.2-2.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842361" comment="python3.11-tkinter-3.11.2-2.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2654" version="1" class="patch">
	<metadata>
		<title>security update for texlive (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32700" ref_url="https://www.suse.com/security/cve/CVE-2023-32700/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3661.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3661.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32700/">CVE-2023-32700 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32700">CVE-2023-32700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009806093" comment="texlive-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806094" comment="texlive-adjustbox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806095" comment="texlive-ae-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806096" comment="texlive-algorithms-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806097" comment="texlive-alphalph-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806098" comment="texlive-amscls-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806099" comment="texlive-amsfonts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806100" comment="texlive-amsmath-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806101" comment="texlive-anyfontsize-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806102" comment="texlive-anysize-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806103" comment="texlive-appendix-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806104" comment="texlive-arabxetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806105" comment="texlive-arphic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806106" comment="texlive-atbegshi-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806107" comment="texlive-attachfile-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806108" comment="texlive-attachfile2-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806109" comment="texlive-atveryend-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806110" comment="texlive-auxhook-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806111" comment="texlive-avantgar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806112" comment="texlive-awesomebox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806113" comment="texlive-babel-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806114" comment="texlive-babel-english-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806115" comment="texlive-babelbib-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806116" comment="texlive-base-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806117" comment="texlive-beamer-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806118" comment="texlive-bera-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806119" comment="texlive-beton-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806120" comment="texlive-bibtex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806121" comment="texlive-bibtopic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806122" comment="texlive-bidi-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806123" comment="texlive-bigfoot-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806124" comment="texlive-bigintcalc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806125" comment="texlive-bitset-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806126" comment="texlive-bookman-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806127" comment="texlive-bookmark-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806128" comment="texlive-booktabs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806129" comment="texlive-breakurl-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806130" comment="texlive-breqn-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806131" comment="texlive-capt-of-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806132" comment="texlive-caption-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806133" comment="texlive-carlisle-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806134" comment="texlive-catchfile-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806135" comment="texlive-changebar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806136" comment="texlive-changepage-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806137" comment="texlive-charter-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806138" comment="texlive-chngcntr-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806139" comment="texlive-cite-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806140" comment="texlive-cjk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806141" comment="texlive-classpack-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806142" comment="texlive-cm-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806143" comment="texlive-cm-lgc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806144" comment="texlive-cm-super-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806145" comment="texlive-cmap-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806146" comment="texlive-cmextra-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806147" comment="texlive-cns-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806148" comment="texlive-collectbox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806149" comment="texlive-collection-basic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806150" comment="texlive-collection-fontsrecommended-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806151" comment="texlive-collection-htmlxml-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806152" comment="texlive-collection-latex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806153" comment="texlive-collection-latexrecommended-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806154" comment="texlive-collection-xetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806155" comment="texlive-colorprofiles-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806156" comment="texlive-colortbl-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806157" comment="texlive-context-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806158" comment="texlive-courier-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806159" comment="texlive-crop-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806160" comment="texlive-csquotes-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806161" comment="texlive-ctable-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806162" comment="texlive-ctablestack-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806163" comment="texlive-currfile-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806164" comment="texlive-datetime-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806165" comment="texlive-dehyph-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806166" comment="texlive-dvipdfmx-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806167" comment="texlive-dvipng-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806168" comment="texlive-dvips-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806169" comment="texlive-dvisvgm-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806170" comment="texlive-ec-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806171" comment="texlive-eepic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806172" comment="texlive-enctex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806173" comment="texlive-enumitem-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806174" comment="texlive-environ-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806175" comment="texlive-epsf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806176" comment="texlive-epstopdf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806177" comment="texlive-epstopdf-pkg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806178" comment="texlive-eqparbox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806179" comment="texlive-eso-pic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806180" comment="texlive-etex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806181" comment="texlive-etex-pkg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806182" comment="texlive-etexcmds-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806183" comment="texlive-etoc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806184" comment="texlive-etoolbox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806185" comment="texlive-euenc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806186" comment="texlive-euler-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806187" comment="texlive-euro-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806188" comment="texlive-eurosym-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806189" comment="texlive-extsizes-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806190" comment="texlive-fancybox-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806191" comment="texlive-fancyhdr-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806192" comment="texlive-fancyref-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806193" comment="texlive-fancyvrb-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806194" comment="texlive-filecontents-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806195" comment="texlive-filehook-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806196" comment="texlive-finstrut-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806197" comment="texlive-fix2col-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806198" comment="texlive-fixlatvian-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806199" comment="texlive-float-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806200" comment="texlive-fmtcount-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806201" comment="texlive-fncychap-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806202" comment="texlive-fontawesome-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806203" comment="texlive-fontbook-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806204" comment="texlive-fonts-tlwg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806205" comment="texlive-fontspec-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806206" comment="texlive-fontware-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806207" comment="texlive-fontwrap-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806208" comment="texlive-footmisc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806209" comment="texlive-footnotehyper-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806210" comment="texlive-fp-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806211" comment="texlive-fpl-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806212" comment="texlive-framed-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806213" comment="texlive-garuda-c90-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806214" comment="texlive-geometry-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806215" comment="texlive-gettitlestring-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806216" comment="texlive-glyphlist-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806217" comment="texlive-gnu-freefont-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806218" comment="texlive-graphics-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806219" comment="texlive-graphics-cfg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806220" comment="texlive-graphics-def-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806221" comment="texlive-grfext-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806222" comment="texlive-grffile-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806223" comment="texlive-gsftopk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806224" comment="texlive-hanging-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806225" comment="texlive-helvetic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806226" comment="texlive-hobsub-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806227" comment="texlive-hologo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806228" comment="texlive-hycolor-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806229" comment="texlive-hyperref-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806230" comment="texlive-hyph-utf8-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806231" comment="texlive-hyphen-base-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806232" comment="texlive-hyphenat-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806233" comment="texlive-hyphenex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806234" comment="texlive-ifetex-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806235" comment="texlive-ifluatex-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806236" comment="texlive-ifmtarg-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806237" comment="texlive-ifoddpage-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806238" comment="texlive-ifplatform-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806239" comment="texlive-iftex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806240" comment="texlive-ifxetex-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806241" comment="texlive-import-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806242" comment="texlive-index-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806243" comment="texlive-infwarerr-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806244" comment="texlive-intcalc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806245" comment="texlive-jadetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806246" comment="texlive-jknapltx-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806247" comment="texlive-kastrup-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806248" comment="texlive-kerkis-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806249" comment="texlive-knuth-lib-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806250" comment="texlive-knuth-local-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806251" comment="texlive-koma-script-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806252" comment="texlive-kpathsea-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806253" comment="texlive-kvdefinekeys-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806254" comment="texlive-kvoptions-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806255" comment="texlive-kvsetkeys-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806256" comment="texlive-l3backend-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806257" comment="texlive-l3experimental-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806258" comment="texlive-l3kernel-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806259" comment="texlive-l3packages-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806260" comment="texlive-lastpage-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806261" comment="texlive-latex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806262" comment="texlive-latex-fonts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806263" comment="texlive-latex2man-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806264" comment="texlive-latexbug-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806265" comment="texlive-latexconfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806266" comment="texlive-letltxmacro-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806267" comment="texlive-lettrine-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806268" comment="texlive-lib-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806269" comment="texlive-lib-devel-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806270" comment="texlive-linegoal-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806271" comment="texlive-lineno-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806272" comment="texlive-listings-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806273" comment="texlive-listofitems-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806274" comment="texlive-lm-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806275" comment="texlive-lm-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806276" comment="texlive-ltabptch-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806277" comment="texlive-ltxcmds-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806278" comment="texlive-ltxmisc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806279" comment="texlive-lua-alt-getopt-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806280" comment="texlive-luahbtex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806281" comment="texlive-lualatex-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806282" comment="texlive-lualibs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806283" comment="texlive-luaotfload-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806284" comment="texlive-luatex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806285" comment="texlive-luatex85-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806286" comment="texlive-luatexbase-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806287" comment="texlive-lwarp-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806288" comment="texlive-makecmds-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806289" comment="texlive-makeindex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806290" comment="texlive-manfnt-font-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806291" comment="texlive-marginnote-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806292" comment="texlive-marvosym-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806293" comment="texlive-mathpazo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806294" comment="texlive-mathspec-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806295" comment="texlive-mathtools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806296" comment="texlive-mdwtools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806297" comment="texlive-memoir-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806298" comment="texlive-metafont-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806299" comment="texlive-metalogo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806300" comment="texlive-metapost-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806301" comment="texlive-mflogo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806302" comment="texlive-mflogo-font-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806303" comment="texlive-mfnfss-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806304" comment="texlive-mfware-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806305" comment="texlive-microtype-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806306" comment="texlive-minitoc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806307" comment="texlive-mnsymbol-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806308" comment="texlive-modes-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806309" comment="texlive-mparhack-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806310" comment="texlive-mptopdf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806311" comment="texlive-ms-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806312" comment="texlive-multido-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806313" comment="texlive-multirow-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806314" comment="texlive-natbib-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806315" comment="texlive-ncctools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806316" comment="texlive-ncntrsbk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806317" comment="texlive-needspace-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806318" comment="texlive-newfloat-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806319" comment="texlive-newunicodechar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806320" comment="texlive-norasi-c90-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806321" comment="texlive-notoccite-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806322" comment="texlive-ntgclass-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806323" comment="texlive-oberdiek-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806324" comment="texlive-obsolete-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806325" comment="texlive-overpic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806326" comment="texlive-palatino-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806327" comment="texlive-paralist-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806328" comment="texlive-parallel-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806329" comment="texlive-parskip-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806330" comment="texlive-passivetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806331" comment="texlive-pdfcolmk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806332" comment="texlive-pdfescape-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806333" comment="texlive-pdflscape-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806334" comment="texlive-pdfpages-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806335" comment="texlive-pdftex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806336" comment="texlive-pdftexcmds-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806337" comment="texlive-pgf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806338" comment="texlive-philokalia-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806339" comment="texlive-placeins-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806340" comment="texlive-plain-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806341" comment="texlive-polyglossia-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806342" comment="texlive-powerdot-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806343" comment="texlive-preprint-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806344" comment="texlive-psfrag-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806345" comment="texlive-pslatex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806346" comment="texlive-psnfss-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806347" comment="texlive-pspicture-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806348" comment="texlive-pst-3d-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806349" comment="texlive-pst-arrow-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806350" comment="texlive-pst-blur-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806351" comment="texlive-pst-coil-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806352" comment="texlive-pst-eps-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806353" comment="texlive-pst-fill-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806354" comment="texlive-pst-grad-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806355" comment="texlive-pst-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806356" comment="texlive-pst-node-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806357" comment="texlive-pst-plot-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806358" comment="texlive-pst-slpe-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806359" comment="texlive-pst-text-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806360" comment="texlive-pst-tools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806361" comment="texlive-pst-tree-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806362" comment="texlive-pstricks-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806363" comment="texlive-pstricks-add-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806364" comment="texlive-ptext-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806365" comment="texlive-pxfonts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806366" comment="texlive-qstest-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806367" comment="texlive-ragged2e-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806368" comment="texlive-rcs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806369" comment="texlive-realscripts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806370" comment="texlive-refcount-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806371" comment="texlive-rerunfilecheck-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806372" comment="texlive-rsfs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806373" comment="texlive-sansmath-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806374" comment="texlive-sansmathaccent-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806375" comment="texlive-sauerj-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806376" comment="texlive-scheme-basic-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806377" comment="texlive-section-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806378" comment="texlive-sectsty-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806379" comment="texlive-seminar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806380" comment="texlive-sepnum-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806381" comment="texlive-setspace-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806382" comment="texlive-showexpl-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806383" comment="texlive-soul-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806384" comment="texlive-stackengine-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806385" comment="texlive-stmaryrd-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806386" comment="texlive-stringenc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806387" comment="texlive-subfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806388" comment="texlive-subfigure-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806389" comment="texlive-svn-prov-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806390" comment="texlive-symbol-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806391" comment="texlive-t2-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806392" comment="texlive-tabu-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806393" comment="texlive-tabulary-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806394" comment="texlive-tetex-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806395" comment="texlive-tex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806396" comment="texlive-tex-gyre-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806397" comment="texlive-tex-gyre-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806398" comment="texlive-tex-ini-files-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806399" comment="texlive-tex4ht-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806400" comment="texlive-texconfig-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806401" comment="texlive-texlive-common-doc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806402" comment="texlive-texlive-docindex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806403" comment="texlive-texlive-en-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806404" comment="texlive-texlive-msg-translations-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806405" comment="texlive-texlive-scripts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806406" comment="texlive-texlive-scripts-extra-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806407" comment="texlive-texlive.infra-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806408" comment="texlive-textcase-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806409" comment="texlive-textpos-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806410" comment="texlive-threeparttable-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806411" comment="texlive-thumbpdf-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806412" comment="texlive-times-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806413" comment="texlive-tipa-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806414" comment="texlive-titlesec-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806415" comment="texlive-titling-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806416" comment="texlive-tocloft-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806417" comment="texlive-tools-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806418" comment="texlive-translator-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806419" comment="texlive-trimspaces-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806420" comment="texlive-txfonts-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806421" comment="texlive-type1cm-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806422" comment="texlive-typehtml-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806423" comment="texlive-ucharcat-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806424" comment="texlive-ucharclasses-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806425" comment="texlive-ucs-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806426" comment="texlive-uhc-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806427" comment="texlive-ulem-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806428" comment="texlive-underscore-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806429" comment="texlive-unicode-data-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806430" comment="texlive-unicode-math-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806431" comment="texlive-uniquecounter-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806432" comment="texlive-unisugar-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806433" comment="texlive-updmap-map-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806434" comment="texlive-upquote-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806435" comment="texlive-url-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806436" comment="texlive-utopia-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806437" comment="texlive-varwidth-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806438" comment="texlive-wadalab-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806439" comment="texlive-was-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806440" comment="texlive-wasy-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806441" comment="texlive-wasy-type1-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806442" comment="texlive-wasy2-ps-20180414-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806443" comment="texlive-wasysym-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806444" comment="texlive-wrapfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806445" comment="texlive-xcolor-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806446" comment="texlive-xdvi-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806447" comment="texlive-xecjk-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806448" comment="texlive-xecolor-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806449" comment="texlive-xecyr-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806450" comment="texlive-xeindex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806451" comment="texlive-xepersian-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806452" comment="texlive-xesearch-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806453" comment="texlive-xetex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806454" comment="texlive-xetex-itrans-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806455" comment="texlive-xetex-pstricks-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806456" comment="texlive-xetex-tibetan-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806457" comment="texlive-xetexconfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806458" comment="texlive-xetexfontinfo-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806459" comment="texlive-xifthen-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806460" comment="texlive-xkeyval-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806461" comment="texlive-xltxtra-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806462" comment="texlive-xmltex-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806463" comment="texlive-xmltexconfig-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806464" comment="texlive-xstring-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806465" comment="texlive-xtab-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806466" comment="texlive-xunicode-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806467" comment="texlive-zapfchan-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806468" comment="texlive-zapfding-20200406-26.el9_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009806469" comment="texlive-zref-20200406-26.el9_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2655" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3780.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3780.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837903" comment="babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837904" comment="python-nose-docs-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835513" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842362" comment="python2-2.7.18-13.module+el8.8.0+19042+06909d2c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837906" comment="python2-babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836757" comment="python2-backports-1.0-16.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836758" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837907" comment="python2-bson-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842363" comment="python2-debug-2.7.18-13.module+el8.8.0+19042+06909d2c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842364" comment="python2-devel-2.7.18-13.module+el8.8.0+19042+06909d2c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837910" comment="python2-jinja2-2.10-9.module+el8.5.0+10541+706bb066 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842365" comment="python2-libs-2.7.18-13.module+el8.8.0+19042+06909d2c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839847" comment="python2-lxml-4.2.3-6.module+el8.6.0+13959+8e368262 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837913" comment="python2-nose-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836763" comment="python2-numpy-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836764" comment="python2-numpy-doc-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836765" comment="python2-numpy-f2py-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839848" comment="python2-pip-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839849" comment="python2-pip-wheel-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837914" comment="python2-pygments-2.2.0-22.module+el8.5.0+10788+a4cea9e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837915" comment="python2-pymongo-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837916" comment="python2-pymongo-gridfs-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837917" comment="python2-scipy-1.0.0-21.module+el8.5.0+10858+05337455 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836766" comment="python2-setuptools-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836767" comment="python2-setuptools-wheel-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836768" comment="python2-six-1.11.0-6.module+el8.4.0+9287+299307c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835522" comment="python2-sqlalchemy-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842366" comment="python2-test-2.7.18-13.module+el8.8.0+19042+06909d2c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842367" comment="python2-tkinter-2.7.18-13.module+el8.8.0+19042+06909d2c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842368" comment="python2-tools-2.7.18-13.module+el8.8.0+19042+06909d2c.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836772" comment="python2-urllib3-1.24.2-3.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842369" comment="python2-virtualenv-15.1.0-22.module+el8.8.0+18977+47894b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837922" comment="python2-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837923" comment="python2-wheel-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2656" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<reference ref_id="CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3821.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3821.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842370" comment="ruby-2.7.8-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842371" comment="ruby-default-gems-2.7.8-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842372" comment="ruby-devel-2.7.8-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842373" comment="ruby-doc-2.7.8-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842374" comment="ruby-libs-2.7.8-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837307" comment="rubygem-abrt-0.4.0-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837308" comment="rubygem-abrt-doc-0.4.0-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842375" comment="rubygem-bigdecimal-2.0.0-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837310" comment="rubygem-bson-4.8.1-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837311" comment="rubygem-bson-doc-4.8.1-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842376" comment="rubygem-bundler-2.2.24-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842377" comment="rubygem-io-console-0.5.6-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842378" comment="rubygem-irb-1.2.6-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842379" comment="rubygem-json-2.3.0-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842380" comment="rubygem-minitest-5.13.0-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837317" comment="rubygem-mongo-2.11.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837318" comment="rubygem-mongo-doc-2.11.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837319" comment="rubygem-mysql2-0.5.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837320" comment="rubygem-mysql2-doc-0.5.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842381" comment="rubygem-net-telnet-0.2.0-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842382" comment="rubygem-openssl-2.1.4-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837323" comment="rubygem-pg-1.2.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837324" comment="rubygem-pg-doc-1.2.3-1.module+el8.3.0+7192+4e3a532a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842383" comment="rubygem-power_assert-1.1.7-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842384" comment="rubygem-psych-3.1.0-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842385" comment="rubygem-rake-13.0.1-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842386" comment="rubygem-rdoc-6.2.1.1-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842387" comment="rubygem-test-unit-3.3.4-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842388" comment="rubygem-xmlrpc-0.3.0-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842389" comment="rubygems-3.1.6-139.module+el8.8.0+18745+f1bef313 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842390" comment="rubygems-devel-3.1.6-139.module+el8.8.0+18745+f1bef313 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2657" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48281" ref_url="https://www.suse.com/security/cve/CVE-2022-48281/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48281/">CVE-2022-48281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48281">CVE-2022-48281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842391" comment="libtiff-4.0.9-28.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842392" comment="libtiff-devel-4.0.9-28.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842393" comment="libtiff-tools-4.0.9-28.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2658" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-26604" ref_url="https://www.suse.com/security/cve/CVE-2023-26604/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26604/">CVE-2023-26604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26604">CVE-2023-26604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842394" comment="systemd-239-74.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842395" comment="systemd-container-239-74.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842396" comment="systemd-devel-239-74.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842397" comment="systemd-journal-remote-239-74.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842398" comment="systemd-libs-239-74.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842399" comment="systemd-pam-239-74.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842400" comment="systemd-tests-239-74.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842401" comment="systemd-udev-239-74.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2659" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667/" source="CVE"/>
		<reference ref_id="CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3839.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3839.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842402" comment="libssh-0.9.6-10.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842403" comment="libssh-config-0.9.6-10.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842404" comment="libssh-devel-0.9.6-10.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2660" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-24736" ref_url="https://www.suse.com/security/cve/CVE-2020-24736/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3840.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3840.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-24736/">CVE-2020-24736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24736">CVE-2020-24736 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842405" comment="lemon-3.26.0-18.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842406" comment="sqlite-3.26.0-18.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842407" comment="sqlite-devel-3.26.0-18.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842408" comment="sqlite-doc-3.26.0-18.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842409" comment="sqlite-libs-3.26.0-18.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2661" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3847.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3847.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842410" comment="bpftool-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842411" comment="kernel-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842412" comment="kernel-abi-stablelists-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842413" comment="kernel-core-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842414" comment="kernel-cross-headers-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842415" comment="kernel-debug-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842416" comment="kernel-debug-core-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842418" comment="kernel-debug-modules-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842419" comment="kernel-debug-modules-extra-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842421" comment="kernel-doc-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842422" comment="kernel-headers-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842423" comment="kernel-modules-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842424" comment="kernel-modules-extra-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842425" comment="kernel-tools-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842426" comment="kernel-tools-libs-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842428" comment="perf-4.18.0-477.15.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842429" comment="python3-perf-4.18.0-477.15.1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2662" version="1" class="patch">
	<metadata>
		<title>security update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-29402" ref_url="https://www.suse.com/security/cve/CVE-2023-29402/" source="CVE"/>
		<reference ref_id="CVE-2023-29403" ref_url="https://www.suse.com/security/cve/CVE-2023-29403/" source="CVE"/>
		<reference ref_id="CVE-2023-29404" ref_url="https://www.suse.com/security/cve/CVE-2023-29404/" source="CVE"/>
		<reference ref_id="CVE-2023-29405" ref_url="https://www.suse.com/security/cve/CVE-2023-29405/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3922.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3922.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29402/">CVE-2023-29402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29403/">CVE-2023-29403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29404/">CVE-2023-29404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29405/">CVE-2023-29405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842226" comment="delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842430" comment="go-toolset-1.19.10-1.module+el8.8.0+19203+782922b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842431" comment="golang-1.19.10-1.module+el8.8.0+19203+782922b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842432" comment="golang-bin-1.19.10-1.module+el8.8.0+19203+782922b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842433" comment="golang-docs-1.19.10-1.module+el8.8.0+19203+782922b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842434" comment="golang-misc-1.19.10-1.module+el8.8.0+19203+782922b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842435" comment="golang-race-1.19.10-1.module+el8.8.0+19203+782922b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842436" comment="golang-src-1.19.10-1.module+el8.8.0+19203+782922b7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842437" comment="golang-tests-1.19.10-1.module+el8.8.0+19203+782922b7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2663" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4034.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4034.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842438" comment="nodejs-16.19.1-2.module+el8.8.0+19038+6f60344f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842439" comment="nodejs-devel-16.19.1-2.module+el8.8.0+19038+6f60344f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842440" comment="nodejs-docs-16.19.1-2.module+el8.8.0+19038+6f60344f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842441" comment="nodejs-full-i18n-16.19.1-2.module+el8.8.0+19038+6f60344f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842442" comment="nodejs-nodemon-2.0.20-3.module+el8.8.0+19038+6f60344f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838910" comment="nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842443" comment="npm-8.19.3-1.16.19.1.2.module+el8.8.0+19038+6f60344f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2664" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4035.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4035.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842444" comment="nodejs-18.14.2-3.module+el8.8.0+19021+4b8b11cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842445" comment="nodejs-devel-18.14.2-3.module+el8.8.0+19021+4b8b11cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842446" comment="nodejs-docs-18.14.2-3.module+el8.8.0+19021+4b8b11cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842447" comment="nodejs-full-i18n-18.14.2-3.module+el8.8.0+19021+4b8b11cc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842448" comment="nodejs-nodemon-2.0.20-2.module+el8.8.0+18432+27f188ac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841358" comment="nodejs-packaging-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841359" comment="nodejs-packaging-bundler-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842449" comment="npm-9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2665" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-33170" ref_url="https://www.suse.com/security/cve/CVE-2023-33170/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4058.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4058.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33170/">CVE-2023-33170 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33170">CVE-2023-33170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842450" comment="aspnetcore-runtime-7.0-7.0.9-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842451" comment="aspnetcore-targeting-pack-7.0-7.0.9-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842452" comment="dotnet-7.0.109-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842453" comment="dotnet-apphost-pack-7.0-7.0.9-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842454" comment="dotnet-host-7.0.9-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842455" comment="dotnet-hostfxr-7.0-7.0.9-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842456" comment="dotnet-runtime-7.0-7.0.9-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842457" comment="dotnet-sdk-7.0-7.0.109-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842458" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842459" comment="dotnet-targeting-pack-7.0-7.0.9-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842460" comment="dotnet-templates-7.0-7.0.109-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842461" comment="netstandard-targeting-pack-2.1-7.0.109-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2666" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-33170" ref_url="https://www.suse.com/security/cve/CVE-2023-33170/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33170/">CVE-2023-33170 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33170">CVE-2023-33170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842462" comment="aspnetcore-runtime-6.0-6.0.20-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842463" comment="aspnetcore-targeting-pack-6.0-6.0.20-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842464" comment="dotnet-apphost-pack-6.0-6.0.20-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842465" comment="dotnet-hostfxr-6.0-6.0.20-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842466" comment="dotnet-runtime-6.0-6.0.20-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842467" comment="dotnet-sdk-6.0-6.0.120-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842468" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842469" comment="dotnet-targeting-pack-6.0-6.0.20-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842470" comment="dotnet-templates-6.0-6.0.120-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2667" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842471" comment="thunderbird-102.13.0-2.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2668" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4076.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4076.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842472" comment="firefox-102.13.0-2.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2669" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4100.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4100.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842473" comment="bind9.16-9.16.23-0.14.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842474" comment="bind9.16-chroot-9.16.23-0.14.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842475" comment="bind9.16-devel-9.16.23-0.14.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842476" comment="bind9.16-dnssec-utils-9.16.23-0.14.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842477" comment="bind9.16-doc-9.16.23-0.14.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842478" comment="bind9.16-libs-9.16.23-0.14.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842479" comment="bind9.16-license-9.16.23-0.14.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842480" comment="bind9.16-utils-9.16.23-0.14.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842481" comment="python3-bind9.16-9.16.23-0.14.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2670" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4102.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4102.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842482" comment="bind-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842483" comment="bind-chroot-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842484" comment="bind-devel-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842485" comment="bind-export-devel-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842486" comment="bind-export-libs-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842487" comment="bind-libs-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842488" comment="bind-libs-lite-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842489" comment="bind-license-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842490" comment="bind-lite-devel-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842491" comment="bind-pkcs11-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842492" comment="bind-pkcs11-devel-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842493" comment="bind-pkcs11-libs-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842494" comment="bind-pkcs11-utils-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842495" comment="bind-sdb-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842496" comment="bind-sdb-chroot-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842497" comment="bind-utils-9.11.36-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842498" comment="python3-bind-9.11.36-8.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2671" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4159.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4159.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842499" comment="java-17-openjdk-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842500" comment="java-17-openjdk-demo-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842501" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842502" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842503" comment="java-17-openjdk-devel-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842504" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842505" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842506" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842507" comment="java-17-openjdk-headless-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842508" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842509" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842510" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842511" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842512" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842513" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842514" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842515" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842516" comment="java-17-openjdk-src-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842517" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842518" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842519" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842520" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842521" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2672" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4175.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4175.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842522" comment="java-11-openjdk-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842523" comment="java-11-openjdk-demo-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842524" comment="java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842525" comment="java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842526" comment="java-11-openjdk-devel-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842527" comment="java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842528" comment="java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842529" comment="java-11-openjdk-fastdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842530" comment="java-11-openjdk-headless-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842531" comment="java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842532" comment="java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842533" comment="java-11-openjdk-javadoc-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842534" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842535" comment="java-11-openjdk-jmods-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842536" comment="java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842537" comment="java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842538" comment="java-11-openjdk-slowdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842539" comment="java-11-openjdk-src-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842540" comment="java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842541" comment="java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842542" comment="java-11-openjdk-static-libs-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842543" comment="java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842544" comment="java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2673" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4176.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4176.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842545" comment="java-1.8.0-openjdk-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842546" comment="java-1.8.0-openjdk-accessibility-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842547" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842548" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842549" comment="java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842550" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842551" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842552" comment="java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842553" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842554" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842555" comment="java-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842556" comment="java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842557" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842558" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842559" comment="java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842560" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842561" comment="java-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842562" comment="java-1.8.0-openjdk-src-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842563" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842564" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2674" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32885" ref_url="https://www.suse.com/security/cve/CVE-2022-32885/" source="CVE"/>
		<reference ref_id="CVE-2023-28198" ref_url="https://www.suse.com/security/cve/CVE-2023-28198/" source="CVE"/>
		<reference ref_id="CVE-2023-32435" ref_url="https://www.suse.com/security/cve/CVE-2023-32435/" source="CVE"/>
		<reference ref_id="CVE-2023-32439" ref_url="https://www.suse.com/security/cve/CVE-2023-32439/" source="CVE"/>
		<reference ref_id="CVE-2023-35074" ref_url="https://www.suse.com/security/cve/CVE-2023-35074/" source="CVE"/>
		<reference ref_id="CVE-2023-37450" ref_url="https://www.suse.com/security/cve/CVE-2023-37450/" source="CVE"/>
		<reference ref_id="CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594/" source="CVE"/>
		<reference ref_id="CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595/" source="CVE"/>
		<reference ref_id="CVE-2023-41074" ref_url="https://www.suse.com/security/cve/CVE-2023-41074/" source="CVE"/>
		<reference ref_id="CVE-2023-41993" ref_url="https://www.suse.com/security/cve/CVE-2023-41993/" source="CVE"/>
		<reference ref_id="CVE-2023-42916" ref_url="https://www.suse.com/security/cve/CVE-2023-42916/" source="CVE"/>
		<reference ref_id="CVE-2024-23222" ref_url="https://www.suse.com/security/cve/CVE-2024-23222/" source="CVE"/>
		<reference ref_id="CVE-2024-23252" ref_url="https://www.suse.com/security/cve/CVE-2024-23252/" source="CVE"/>
		<reference ref_id="CVE-2024-27808" ref_url="https://www.suse.com/security/cve/CVE-2024-27808/" source="CVE"/>
		<reference ref_id="CVE-2024-27833" ref_url="https://www.suse.com/security/cve/CVE-2024-27833/" source="CVE"/>
		<reference ref_id="CVE-2024-27834" ref_url="https://www.suse.com/security/cve/CVE-2024-27834/" source="CVE"/>
		<reference ref_id="CVE-2025-24223" ref_url="https://www.suse.com/security/cve/CVE-2025-24223/" source="CVE"/>
		<reference ref_id="CVE-2025-24264" ref_url="https://www.suse.com/security/cve/CVE-2025-24264/" source="CVE"/>
		<reference ref_id="CVE-2025-31204" ref_url="https://www.suse.com/security/cve/CVE-2025-31204/" source="CVE"/>
		<reference ref_id="CVE-2025-31206" ref_url="https://www.suse.com/security/cve/CVE-2025-31206/" source="CVE"/>
		<reference ref_id="CVE-2025-31215" ref_url="https://www.suse.com/security/cve/CVE-2025-31215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4202.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4202.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32885/">CVE-2022-32885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32885">CVE-2022-32885 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28198/">CVE-2023-28198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28198">CVE-2023-28198 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32435/">CVE-2023-32435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32435">CVE-2023-32435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32439/">CVE-2023-32439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32439">CVE-2023-32439 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35074/">CVE-2023-35074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35074">CVE-2023-35074 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37450/">CVE-2023-37450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37450">CVE-2023-37450 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41074/">CVE-2023-41074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-41993/">CVE-2023-41993 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41993">CVE-2023-41993 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42916/">CVE-2023-42916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42916">CVE-2023-42916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23222/">CVE-2024-23222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23222">CVE-2024-23222 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23252/">CVE-2024-23252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23252">CVE-2024-23252 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27808/">CVE-2024-27808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27808">CVE-2024-27808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27833/">CVE-2024-27833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27833">CVE-2024-27833 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27834/">CVE-2024-27834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27834">CVE-2024-27834 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24223/">CVE-2025-24223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24223">CVE-2025-24223 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24264/">CVE-2025-24264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24264">CVE-2025-24264 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-31204/">CVE-2025-31204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31204">CVE-2025-31204 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31206/">CVE-2025-31206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31206">CVE-2025-31206 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31215/">CVE-2025-31215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31215">CVE-2025-31215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842565" comment="webkit2gtk3-2.38.5-1.el8_8.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842566" comment="webkit2gtk3-devel-2.38.5-1.el8_8.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842567" comment="webkit2gtk3-jsc-2.38.5-1.el8_8.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842568" comment="webkit2gtk3-jsc-devel-2.38.5-1.el8_8.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2675" version="1" class="patch">
	<metadata>
		<title>security update for samba (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3347" ref_url="https://www.suse.com/security/cve/CVE-2023-3347/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4328.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4328.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3347/">CVE-2023-3347 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3347">CVE-2023-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842569" comment="ctdb-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842570" comment="libnetapi-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842571" comment="libnetapi-devel-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842572" comment="libsmbclient-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842573" comment="libsmbclient-devel-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842574" comment="libwbclient-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842575" comment="libwbclient-devel-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842576" comment="python3-samba-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842577" comment="python3-samba-dc-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842578" comment="python3-samba-devel-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842579" comment="python3-samba-test-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842580" comment="samba-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842581" comment="samba-client-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842582" comment="samba-client-libs-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842583" comment="samba-common-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842584" comment="samba-common-libs-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842585" comment="samba-common-tools-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842586" comment="samba-dc-libs-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842587" comment="samba-dcerpc-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842588" comment="samba-devel-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842589" comment="samba-krb5-printing-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842590" comment="samba-ldb-ldap-modules-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842591" comment="samba-libs-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842592" comment="samba-pidl-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842593" comment="samba-test-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842594" comment="samba-test-libs-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842595" comment="samba-tools-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842596" comment="samba-usershares-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842597" comment="samba-vfs-iouring-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842598" comment="samba-winbind-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842599" comment="samba-winbind-clients-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842600" comment="samba-winbind-krb5-locator-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842601" comment="samba-winbind-modules-4.17.5-3.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842602" comment="samba-winexe-4.17.5-3.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2676" version="1" class="patch">
	<metadata>
		<title>security update for cjose (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-37464" ref_url="https://www.suse.com/security/cve/CVE-2023-37464/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4418.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4418.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37464/">CVE-2023-37464 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37464">CVE-2023-37464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842603" comment="cjose-0.6.1-3.module+el8.8.0+19464+578f4546 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842604" comment="cjose-devel-0.6.1-3.module+el8.8.0+19464+578f4546 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842605" comment="mod_auth_openidc-2.4.9.4-1.module+el8.7.0+14797+4085fcb6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2677" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4419.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4419.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842606" comment="openssh-8.0p1-19.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842607" comment="openssh-askpass-8.0p1-19.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842608" comment="openssh-cavs-8.0p1-19.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842609" comment="openssh-clients-8.0p1-19.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842610" comment="openssh-keycat-8.0p1-19.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842611" comment="openssh-ldap-8.0p1-19.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842612" comment="openssh-server-8.0p1-19.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842613" comment="pam_ssh_agent_auth-0.10.3-7.19.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2678" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4468.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4468.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842614" comment="firefox-102.14.0-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2679" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3417" ref_url="https://www.suse.com/security/cve/CVE-2023-3417/" source="CVE"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4497.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4497.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3417/">CVE-2023-3417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3417">CVE-2023-3417 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842615" comment="thunderbird-102.14.0-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2680" version="1" class="patch">
	<metadata>
		<title>security update for dbus (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4498.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4498.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842616" comment="dbus-1.12.8-24.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842617" comment="dbus-common-1.12.8-24.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842618" comment="dbus-daemon-1.12.8-24.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842619" comment="dbus-devel-1.12.8-24.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842620" comment="dbus-libs-1.12.8-24.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842621" comment="dbus-tools-1.12.8-24.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842622" comment="dbus-x11-1.12.8-24.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2681" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2022-49853" ref_url="https://www.suse.com/security/cve/CVE-2022-49853/" source="CVE"/>
		<reference ref_id="CVE-2022-50677" ref_url="https://www.suse.com/security/cve/CVE-2022-50677/" source="CVE"/>
		<reference ref_id="CVE-2023-1281" ref_url="https://www.suse.com/security/cve/CVE-2023-1281/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<reference ref_id="CVE-2023-2194" ref_url="https://www.suse.com/security/cve/CVE-2023-2194/" source="CVE"/>
		<reference ref_id="CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4517.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4517.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49853/">CVE-2022-49853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49853">CVE-2022-49853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50677/">CVE-2022-50677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50677">CVE-2022-50677 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1281/">CVE-2023-1281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1281">CVE-2023-1281 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-2194/">CVE-2023-2194 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842623" comment="bpftool-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842624" comment="kernel-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842625" comment="kernel-abi-stablelists-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842626" comment="kernel-core-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842627" comment="kernel-cross-headers-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842628" comment="kernel-debug-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842629" comment="kernel-debug-core-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842631" comment="kernel-debug-modules-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842632" comment="kernel-debug-modules-extra-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842634" comment="kernel-doc-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842635" comment="kernel-headers-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842636" comment="kernel-modules-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842637" comment="kernel-modules-extra-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842638" comment="kernel-tools-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842639" comment="kernel-tools-libs-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842641" comment="perf-4.18.0-477.21.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842642" comment="python3-perf-4.18.0-477.21.1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2682" version="1" class="patch">
	<metadata>
		<title>security update for python-requests (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4520.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4520.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842643" comment="python3-requests-2.20.0-3.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2683" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-27536" ref_url="https://www.suse.com/security/cve/CVE-2023-27536/" source="CVE"/>
		<reference ref_id="CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4523.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4523.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27536/">CVE-2023-27536 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842644" comment="curl-7.61.1-30.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842645" comment="libcurl-7.61.1-30.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842646" comment="libcurl-devel-7.61.1-30.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842647" comment="libcurl-minimal-7.61.1-30.el8_8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2684" version="1" class="patch">
	<metadata>
		<title>security update for libcap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-2602" ref_url="https://www.suse.com/security/cve/CVE-2023-2602/" source="CVE"/>
		<reference ref_id="CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4524.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4524.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2602/">CVE-2023-2602 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842648" comment="libcap-2.48-5.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842649" comment="libcap-devel-2.48-5.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2685" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484/" source="CVE"/>
		<reference ref_id="CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4529.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4529.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842650" comment="libxml2-2.9.7-16.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842651" comment="libxml2-devel-2.9.7-16.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842652" comment="python3-libxml2-2.9.7-16.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2686" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-30581" ref_url="https://www.suse.com/security/cve/CVE-2023-30581/" source="CVE"/>
		<reference ref_id="CVE-2023-30588" ref_url="https://www.suse.com/security/cve/CVE-2023-30588/" source="CVE"/>
		<reference ref_id="CVE-2023-30589" ref_url="https://www.suse.com/security/cve/CVE-2023-30589/" source="CVE"/>
		<reference ref_id="CVE-2023-30590" ref_url="https://www.suse.com/security/cve/CVE-2023-30590/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4536.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4536.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30581/">CVE-2023-30581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30581">CVE-2023-30581 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30588/">CVE-2023-30588 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30588">CVE-2023-30588 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30589/">CVE-2023-30589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30589">CVE-2023-30589 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-30590/">CVE-2023-30590 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30590">CVE-2023-30590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842653" comment="nodejs-18.16.1-1.module+el8.8.0+19438+94e84959 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842654" comment="nodejs-devel-18.16.1-1.module+el8.8.0+19438+94e84959 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842655" comment="nodejs-docs-18.16.1-1.module+el8.8.0+19438+94e84959 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842656" comment="nodejs-full-i18n-18.16.1-1.module+el8.8.0+19438+94e84959 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842448" comment="nodejs-nodemon-2.0.20-2.module+el8.8.0+18432+27f188ac is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841358" comment="nodejs-packaging-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841359" comment="nodejs-packaging-bundler-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842657" comment="npm-9.5.1-1.18.16.1.1.module+el8.8.0+19438+94e84959 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2687" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-30581" ref_url="https://www.suse.com/security/cve/CVE-2023-30581/" source="CVE"/>
		<reference ref_id="CVE-2023-30588" ref_url="https://www.suse.com/security/cve/CVE-2023-30588/" source="CVE"/>
		<reference ref_id="CVE-2023-30589" ref_url="https://www.suse.com/security/cve/CVE-2023-30589/" source="CVE"/>
		<reference ref_id="CVE-2023-30590" ref_url="https://www.suse.com/security/cve/CVE-2023-30590/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4537.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4537.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30581/">CVE-2023-30581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30581">CVE-2023-30581 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30588/">CVE-2023-30588 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30588">CVE-2023-30588 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30589/">CVE-2023-30589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30589">CVE-2023-30589 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-30590/">CVE-2023-30590 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30590">CVE-2023-30590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842658" comment="nodejs-16.20.1-1.module+el8.8.0+19440+ee8dbee5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842659" comment="nodejs-devel-16.20.1-1.module+el8.8.0+19440+ee8dbee5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842660" comment="nodejs-docs-16.20.1-1.module+el8.8.0+19440+ee8dbee5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842661" comment="nodejs-full-i18n-16.20.1-1.module+el8.8.0+19440+ee8dbee5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842442" comment="nodejs-nodemon-2.0.20-3.module+el8.8.0+19038+6f60344f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009838910" comment="nodejs-packaging-25-1.module+el8.5.0+10992+fac5fe06 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842662" comment="npm-8.19.4-1.16.20.1.1.module+el8.8.0+19440+ee8dbee5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2688" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4570.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4570.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842663" comment="iperf3-3.5-7.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2689" version="1" class="patch">
	<metadata>
		<title>security update for rust (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38497" ref_url="https://www.suse.com/security/cve/CVE-2023-38497/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4635.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4635.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38497/">CVE-2023-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842664" comment="cargo-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842665" comment="clippy-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842666" comment="rust-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842667" comment="rust-analysis-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842668" comment="rust-analyzer-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842669" comment="rust-debugger-common-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842670" comment="rust-doc-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842671" comment="rust-gdb-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842672" comment="rust-lldb-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842673" comment="rust-src-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842674" comment="rust-std-static-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842675" comment="rust-std-static-wasm32-unknown-unknown-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842676" comment="rust-std-static-wasm32-wasi-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842677" comment="rust-toolset-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842678" comment="rustfmt-1.66.1-2.module+el8.8.0+19613+f0bba33b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2690" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-35390" ref_url="https://www.suse.com/security/cve/CVE-2023-35390/" source="CVE"/>
		<reference ref_id="CVE-2023-38180" ref_url="https://www.suse.com/security/cve/CVE-2023-38180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4643.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4643.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-35390/">CVE-2023-35390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35390">CVE-2023-35390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38180/">CVE-2023-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38180">CVE-2023-38180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842679" comment="aspnetcore-runtime-7.0-7.0.10-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842680" comment="aspnetcore-targeting-pack-7.0-7.0.10-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842681" comment="dotnet-7.0.110-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842682" comment="dotnet-apphost-pack-7.0-7.0.10-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842683" comment="dotnet-host-7.0.10-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842684" comment="dotnet-hostfxr-7.0-7.0.10-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842685" comment="dotnet-runtime-7.0-7.0.10-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842686" comment="dotnet-sdk-7.0-7.0.110-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842687" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842688" comment="dotnet-targeting-pack-7.0-7.0.10-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842689" comment="dotnet-templates-7.0-7.0.110-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842690" comment="netstandard-targeting-pack-2.1-7.0.110-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2691" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-35390" ref_url="https://www.suse.com/security/cve/CVE-2023-35390/" source="CVE"/>
		<reference ref_id="CVE-2023-38180" ref_url="https://www.suse.com/security/cve/CVE-2023-38180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4645.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4645.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-35390/">CVE-2023-35390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35390">CVE-2023-35390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38180/">CVE-2023-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38180">CVE-2023-38180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842691" comment="aspnetcore-runtime-6.0-6.0.21-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842692" comment="aspnetcore-targeting-pack-6.0-6.0.21-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842693" comment="dotnet-apphost-pack-6.0-6.0.21-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842694" comment="dotnet-hostfxr-6.0-6.0.21-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842695" comment="dotnet-runtime-6.0-6.0.21-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842696" comment="dotnet-sdk-6.0-6.0.121-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842697" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842698" comment="dotnet-targeting-pack-6.0-6.0.21-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842699" comment="dotnet-templates-6.0-6.0.121-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2692" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4864.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4864.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842700" comment="cups-2.2.6-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842701" comment="cups-client-2.2.6-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842702" comment="cups-devel-2.2.6-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842703" comment="cups-filesystem-2.2.6-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842704" comment="cups-ipptool-2.2.6-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842705" comment="cups-libs-2.2.6-51.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842706" comment="cups-lpd-2.2.6-51.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2693" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4952.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4952.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842707" comment="firefox-102.15.0-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2694" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4954.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4954.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842708" comment="thunderbird-102.15.0-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2695" version="1" class="patch">
	<metadata>
		<title>security update for flac (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-22219" ref_url="https://www.suse.com/security/cve/CVE-2020-22219/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22219/">CVE-2020-22219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22219">CVE-2020-22219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842709" comment="flac-1.3.2-9.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842710" comment="flac-devel-1.3.2-9.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842711" comment="flac-libs-1.3.2-9.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2696" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-27522" ref_url="https://www.suse.com/security/cve/CVE-2023-27522/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27522/">CVE-2023-27522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27522">CVE-2023-27522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842712" comment="httpd-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842713" comment="httpd-devel-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842714" comment="httpd-filesystem-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842715" comment="httpd-manual-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842716" comment="httpd-tools-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842717" comment="mod_http2-1.15.7-8.module+el8.8.0+18751+b4557bca.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842718" comment="mod_ldap-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831134" comment="mod_md-2.0.8-8.module+el8.3.0+6814+67d1e611 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842719" comment="mod_proxy_html-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842720" comment="mod_session-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842721" comment="mod_ssl-2.4.37-56.module+el8.8.0+19808+379766d6.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2697" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5144.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5144.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842722" comment="aspnetcore-runtime-6.0-6.0.22-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842723" comment="aspnetcore-targeting-pack-6.0-6.0.22-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842724" comment="dotnet-apphost-pack-6.0-6.0.22-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842725" comment="dotnet-hostfxr-6.0-6.0.22-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842726" comment="dotnet-runtime-6.0-6.0.22-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842727" comment="dotnet-sdk-6.0-6.0.122-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842728" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.122-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842729" comment="dotnet-targeting-pack-6.0-6.0.22-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842730" comment="dotnet-templates-6.0-6.0.122-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2698" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842731" comment="aspnetcore-runtime-7.0-7.0.11-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842732" comment="aspnetcore-targeting-pack-7.0-7.0.11-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842733" comment="dotnet-7.0.111-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842734" comment="dotnet-apphost-pack-7.0-7.0.11-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842735" comment="dotnet-host-7.0.11-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842736" comment="dotnet-hostfxr-7.0-7.0.11-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842737" comment="dotnet-runtime-7.0-7.0.11-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842738" comment="dotnet-sdk-7.0-7.0.111-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842739" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.111-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842740" comment="dotnet-targeting-pack-7.0-7.0.11-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842741" comment="dotnet-templates-7.0-7.0.111-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842742" comment="netstandard-targeting-pack-2.1-7.0.111-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2699" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842743" comment="firefox-102.15.1-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2700" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842744" comment="thunderbird-102.15.1-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2701" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5219.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5219.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842745" comment="frr-7.5.1-7.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842746" comment="frr-selinux-7.5.1-7.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2702" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637/" source="CVE"/>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090/" source="CVE"/>
		<reference ref_id="CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="CVE-2023-44466" ref_url="https://www.suse.com/security/cve/CVE-2023-44466/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5244.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5244.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-44466/">CVE-2023-44466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44466">CVE-2023-44466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842747" comment="bpftool-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842748" comment="kernel-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842749" comment="kernel-abi-stablelists-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842750" comment="kernel-core-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842751" comment="kernel-cross-headers-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842752" comment="kernel-debug-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842753" comment="kernel-debug-core-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842755" comment="kernel-debug-modules-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842756" comment="kernel-debug-modules-extra-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842758" comment="kernel-doc-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842759" comment="kernel-headers-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842760" comment="kernel-modules-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842761" comment="kernel-modules-extra-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842762" comment="kernel-tools-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842763" comment="kernel-tools-libs-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842765" comment="perf-4.18.0-477.27.1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842766" comment="python3-perf-4.18.0-477.27.1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2703" version="1" class="patch">
	<metadata>
		<title>security update for ncurses (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-29491" ref_url="https://www.suse.com/security/cve/CVE-2023-29491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5249.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5249.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29491/">CVE-2023-29491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842767" comment="ncurses-6.1-9.20180224.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842768" comment="ncurses-base-6.1-9.20180224.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842769" comment="ncurses-c++-libs-6.1-9.20180224.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842770" comment="ncurses-compat-libs-6.1-9.20180224.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842771" comment="ncurses-devel-6.1-9.20180224.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842772" comment="ncurses-libs-6.1-9.20180224.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842773" comment="ncurses-term-6.1-9.20180224.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2704" version="1" class="patch">
	<metadata>
		<title>security update for dmidecode (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-30630" ref_url="https://www.suse.com/security/cve/CVE-2023-30630/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5252.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5252.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30630/">CVE-2023-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30630">CVE-2023-30630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842774" comment="dmidecode-3.3-4.el8_8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2705" version="1" class="patch">
	<metadata>
		<title>security update for libwebp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5309.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5309.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842775" comment="libwebp-1.0.0-8.el8_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842776" comment="libwebp-devel-1.0.0-8.el8_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2706" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5312.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5312.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842777" comment="open-vm-tools-12.1.5-2.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842778" comment="open-vm-tools-desktop-12.1.5-2.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842779" comment="open-vm-tools-salt-minion-12.1.5-2.el8_8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842780" comment="open-vm-tools-sdmp-12.1.5-2.el8_8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2707" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800/" source="CVE"/>
		<reference ref_id="CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801/" source="CVE"/>
		<reference ref_id="CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802/" source="CVE"/>
		<reference ref_id="CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803/" source="CVE"/>
		<reference ref_id="CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5353.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5353.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842781" comment="libtiff-4.0.9-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842782" comment="libtiff-devel-4.0.9-29.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842783" comment="libtiff-tools-4.0.9-29.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2708" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-25883" ref_url="https://www.suse.com/security/cve/CVE-2022-25883/" source="CVE"/>
		<reference ref_id="CVE-2023-32002" ref_url="https://www.suse.com/security/cve/CVE-2023-32002/" source="CVE"/>
		<reference ref_id="CVE-2023-32006" ref_url="https://www.suse.com/security/cve/CVE-2023-32006/" source="CVE"/>
		<reference ref_id="CVE-2023-32559" ref_url="https://www.suse.com/security/cve/CVE-2023-32559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5360.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5360.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-25883/">CVE-2022-25883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25883">CVE-2022-25883 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-32002/">CVE-2023-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32002">CVE-2023-32002 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32006/">CVE-2023-32006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32006">CVE-2023-32006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32559/">CVE-2023-32559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32559">CVE-2023-32559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842784" comment="nodejs-16.20.2-2.module+el8.8.0+19898+ab99ba34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842785" comment="nodejs-devel-16.20.2-2.module+el8.8.0+19898+ab99ba34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842786" comment="nodejs-docs-16.20.2-2.module+el8.8.0+19898+ab99ba34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842787" comment="nodejs-full-i18n-16.20.2-2.module+el8.8.0+19898+ab99ba34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842788" comment="nodejs-nodemon-3.0.1-1.module+el8.8.0+19764+7eed1ca3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842789" comment="nodejs-packaging-26-1.module+el8.8.0+19857+6d2a104d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842790" comment="npm-8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2709" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-25883" ref_url="https://www.suse.com/security/cve/CVE-2022-25883/" source="CVE"/>
		<reference ref_id="CVE-2023-32002" ref_url="https://www.suse.com/security/cve/CVE-2023-32002/" source="CVE"/>
		<reference ref_id="CVE-2023-32006" ref_url="https://www.suse.com/security/cve/CVE-2023-32006/" source="CVE"/>
		<reference ref_id="CVE-2023-32559" ref_url="https://www.suse.com/security/cve/CVE-2023-32559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5362.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5362.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-25883/">CVE-2022-25883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25883">CVE-2022-25883 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-32002/">CVE-2023-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32002">CVE-2023-32002 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32006/">CVE-2023-32006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32006">CVE-2023-32006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32559/">CVE-2023-32559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32559">CVE-2023-32559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842791" comment="nodejs-18.17.1-1.module+el8.8.0+19757+8ca87034 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842792" comment="nodejs-devel-18.17.1-1.module+el8.8.0+19757+8ca87034 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842793" comment="nodejs-docs-18.17.1-1.module+el8.8.0+19757+8ca87034 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842794" comment="nodejs-full-i18n-18.17.1-1.module+el8.8.0+19757+8ca87034 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842795" comment="nodejs-nodemon-3.0.1-1.module+el8.8.0+19757+8ca87034 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841358" comment="nodejs-packaging-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841359" comment="nodejs-packaging-bundler-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842796" comment="npm-9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2710" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5428.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5428.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842797" comment="thunderbird-115.3.1-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2711" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5433.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5433.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842798" comment="firefox-115.3.1-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2712" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4527" ref_url="https://www.suse.com/security/cve/CVE-2023-4527/" source="CVE"/>
		<reference ref_id="CVE-2023-4806" ref_url="https://www.suse.com/security/cve/CVE-2023-4806/" source="CVE"/>
		<reference ref_id="CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813/" source="CVE"/>
		<reference ref_id="CVE-2023-4911" ref_url="https://www.suse.com/security/cve/CVE-2023-4911/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5455.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5455.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4527/">CVE-2023-4527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4806/">CVE-2023-4806 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4911/">CVE-2023-4911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842799" comment="compat-libpthread-nonshared-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842800" comment="glibc-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842801" comment="glibc-all-langpacks-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842802" comment="glibc-benchtests-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842803" comment="glibc-common-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842804" comment="glibc-devel-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842805" comment="glibc-doc-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842806" comment="glibc-gconv-extra-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842807" comment="glibc-headers-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842808" comment="glibc-langpack-aa-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842809" comment="glibc-langpack-af-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842810" comment="glibc-langpack-agr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842811" comment="glibc-langpack-ak-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842812" comment="glibc-langpack-am-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842813" comment="glibc-langpack-an-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842814" comment="glibc-langpack-anp-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842815" comment="glibc-langpack-ar-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842816" comment="glibc-langpack-as-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842817" comment="glibc-langpack-ast-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842818" comment="glibc-langpack-ayc-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842819" comment="glibc-langpack-az-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842820" comment="glibc-langpack-be-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842821" comment="glibc-langpack-bem-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842822" comment="glibc-langpack-ber-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842823" comment="glibc-langpack-bg-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842824" comment="glibc-langpack-bhb-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842825" comment="glibc-langpack-bho-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842826" comment="glibc-langpack-bi-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842827" comment="glibc-langpack-bn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842828" comment="glibc-langpack-bo-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842829" comment="glibc-langpack-br-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842830" comment="glibc-langpack-brx-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842831" comment="glibc-langpack-bs-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842832" comment="glibc-langpack-byn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842833" comment="glibc-langpack-ca-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842834" comment="glibc-langpack-ce-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842835" comment="glibc-langpack-chr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842836" comment="glibc-langpack-cmn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842837" comment="glibc-langpack-crh-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842838" comment="glibc-langpack-cs-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842839" comment="glibc-langpack-csb-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842840" comment="glibc-langpack-cv-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842841" comment="glibc-langpack-cy-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842842" comment="glibc-langpack-da-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842843" comment="glibc-langpack-de-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842844" comment="glibc-langpack-doi-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842845" comment="glibc-langpack-dsb-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842846" comment="glibc-langpack-dv-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842847" comment="glibc-langpack-dz-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842848" comment="glibc-langpack-el-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842849" comment="glibc-langpack-en-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842850" comment="glibc-langpack-eo-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842851" comment="glibc-langpack-es-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842852" comment="glibc-langpack-et-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842853" comment="glibc-langpack-eu-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842854" comment="glibc-langpack-fa-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842855" comment="glibc-langpack-ff-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842856" comment="glibc-langpack-fi-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842857" comment="glibc-langpack-fil-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842858" comment="glibc-langpack-fo-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842859" comment="glibc-langpack-fr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842860" comment="glibc-langpack-fur-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842861" comment="glibc-langpack-fy-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842862" comment="glibc-langpack-ga-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842863" comment="glibc-langpack-gd-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842864" comment="glibc-langpack-gez-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842865" comment="glibc-langpack-gl-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842866" comment="glibc-langpack-gu-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842867" comment="glibc-langpack-gv-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842868" comment="glibc-langpack-ha-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842869" comment="glibc-langpack-hak-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842870" comment="glibc-langpack-he-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842871" comment="glibc-langpack-hi-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842872" comment="glibc-langpack-hif-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842873" comment="glibc-langpack-hne-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842874" comment="glibc-langpack-hr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842875" comment="glibc-langpack-hsb-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842876" comment="glibc-langpack-ht-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842877" comment="glibc-langpack-hu-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842878" comment="glibc-langpack-hy-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842879" comment="glibc-langpack-ia-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842880" comment="glibc-langpack-id-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842881" comment="glibc-langpack-ig-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842882" comment="glibc-langpack-ik-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842883" comment="glibc-langpack-is-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842884" comment="glibc-langpack-it-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842885" comment="glibc-langpack-iu-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842886" comment="glibc-langpack-ja-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842887" comment="glibc-langpack-ka-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842888" comment="glibc-langpack-kab-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842889" comment="glibc-langpack-kk-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842890" comment="glibc-langpack-kl-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842891" comment="glibc-langpack-km-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842892" comment="glibc-langpack-kn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842893" comment="glibc-langpack-ko-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842894" comment="glibc-langpack-kok-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842895" comment="glibc-langpack-ks-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842896" comment="glibc-langpack-ku-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842897" comment="glibc-langpack-kw-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842898" comment="glibc-langpack-ky-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842899" comment="glibc-langpack-lb-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842900" comment="glibc-langpack-lg-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842901" comment="glibc-langpack-li-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842902" comment="glibc-langpack-lij-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842903" comment="glibc-langpack-ln-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842904" comment="glibc-langpack-lo-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842905" comment="glibc-langpack-lt-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842906" comment="glibc-langpack-lv-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842907" comment="glibc-langpack-lzh-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842908" comment="glibc-langpack-mag-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842909" comment="glibc-langpack-mai-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842910" comment="glibc-langpack-mfe-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842911" comment="glibc-langpack-mg-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842912" comment="glibc-langpack-mhr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842913" comment="glibc-langpack-mi-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842914" comment="glibc-langpack-miq-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842915" comment="glibc-langpack-mjw-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842916" comment="glibc-langpack-mk-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842917" comment="glibc-langpack-ml-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842918" comment="glibc-langpack-mn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842919" comment="glibc-langpack-mni-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842920" comment="glibc-langpack-mr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842921" comment="glibc-langpack-ms-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842922" comment="glibc-langpack-mt-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842923" comment="glibc-langpack-my-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842924" comment="glibc-langpack-nan-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842925" comment="glibc-langpack-nb-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842926" comment="glibc-langpack-nds-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842927" comment="glibc-langpack-ne-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842928" comment="glibc-langpack-nhn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842929" comment="glibc-langpack-niu-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842930" comment="glibc-langpack-nl-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842931" comment="glibc-langpack-nn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842932" comment="glibc-langpack-nr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842933" comment="glibc-langpack-nso-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842934" comment="glibc-langpack-oc-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842935" comment="glibc-langpack-om-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842936" comment="glibc-langpack-or-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842937" comment="glibc-langpack-os-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842938" comment="glibc-langpack-pa-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842939" comment="glibc-langpack-pap-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842940" comment="glibc-langpack-pl-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842941" comment="glibc-langpack-ps-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842942" comment="glibc-langpack-pt-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842943" comment="glibc-langpack-quz-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842944" comment="glibc-langpack-raj-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842945" comment="glibc-langpack-ro-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842946" comment="glibc-langpack-ru-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842947" comment="glibc-langpack-rw-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842948" comment="glibc-langpack-sa-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842949" comment="glibc-langpack-sah-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842950" comment="glibc-langpack-sat-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842951" comment="glibc-langpack-sc-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842952" comment="glibc-langpack-sd-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842953" comment="glibc-langpack-se-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842954" comment="glibc-langpack-sgs-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842955" comment="glibc-langpack-shn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842956" comment="glibc-langpack-shs-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842957" comment="glibc-langpack-si-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842958" comment="glibc-langpack-sid-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842959" comment="glibc-langpack-sk-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842960" comment="glibc-langpack-sl-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842961" comment="glibc-langpack-sm-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842962" comment="glibc-langpack-so-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842963" comment="glibc-langpack-sq-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842964" comment="glibc-langpack-sr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842965" comment="glibc-langpack-ss-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842966" comment="glibc-langpack-st-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842967" comment="glibc-langpack-sv-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842968" comment="glibc-langpack-sw-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842969" comment="glibc-langpack-szl-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842970" comment="glibc-langpack-ta-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842971" comment="glibc-langpack-tcy-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842972" comment="glibc-langpack-te-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842973" comment="glibc-langpack-tg-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842974" comment="glibc-langpack-th-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842975" comment="glibc-langpack-the-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842976" comment="glibc-langpack-ti-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842977" comment="glibc-langpack-tig-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842978" comment="glibc-langpack-tk-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842979" comment="glibc-langpack-tl-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842980" comment="glibc-langpack-tn-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842981" comment="glibc-langpack-to-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842982" comment="glibc-langpack-tpi-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842983" comment="glibc-langpack-tr-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842984" comment="glibc-langpack-ts-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842985" comment="glibc-langpack-tt-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842986" comment="glibc-langpack-ug-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842987" comment="glibc-langpack-uk-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842988" comment="glibc-langpack-unm-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842989" comment="glibc-langpack-ur-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842990" comment="glibc-langpack-uz-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842991" comment="glibc-langpack-ve-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842992" comment="glibc-langpack-vi-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842993" comment="glibc-langpack-wa-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842994" comment="glibc-langpack-wae-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842995" comment="glibc-langpack-wal-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842996" comment="glibc-langpack-wo-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842997" comment="glibc-langpack-xh-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842998" comment="glibc-langpack-yi-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842999" comment="glibc-langpack-yo-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843000" comment="glibc-langpack-yue-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843001" comment="glibc-langpack-yuw-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843002" comment="glibc-langpack-zh-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843003" comment="glibc-langpack-zu-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843004" comment="glibc-locale-source-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843005" comment="glibc-minimal-langpack-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843006" comment="glibc-nss-devel-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843007" comment="glibc-static-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843008" comment="glibc-utils-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843009" comment="libnsl-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843010" comment="nscd-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843011" comment="nss_db-2.28-225.el8_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843012" comment="nss_hesiod-2.28-225.el8_8.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2713" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5460.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5460.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843013" comment="bind9.16-9.16.23-0.14.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843014" comment="bind9.16-chroot-9.16.23-0.14.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843015" comment="bind9.16-devel-9.16.23-0.14.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843016" comment="bind9.16-dnssec-utils-9.16.23-0.14.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843017" comment="bind9.16-doc-9.16.23-0.14.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843018" comment="bind9.16-libs-9.16.23-0.14.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843019" comment="bind9.16-license-9.16.23-0.14.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843020" comment="bind9.16-utils-9.16.23-0.14.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843021" comment="python3-bind9.16-9.16.23-0.14.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2714" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5463.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5463.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843022" comment="python3.11-3.11.2-2.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843023" comment="python3.11-debug-3.11.2-2.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843024" comment="python3.11-devel-3.11.2-2.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843025" comment="python3.11-idle-3.11.2-2.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843026" comment="python3.11-libs-3.11.2-2.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843027" comment="python3.11-rpm-macros-3.11.2-2.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843028" comment="python3.11-test-3.11.2-2.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843029" comment="python3.11-tkinter-3.11.2-2.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2715" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5474.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5474.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843030" comment="bind-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843031" comment="bind-chroot-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843032" comment="bind-devel-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843033" comment="bind-export-devel-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843034" comment="bind-export-libs-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843035" comment="bind-libs-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843036" comment="bind-libs-lite-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843037" comment="bind-license-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843038" comment="bind-lite-devel-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843039" comment="bind-pkcs11-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843040" comment="bind-pkcs11-devel-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843041" comment="bind-pkcs11-libs-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843042" comment="bind-pkcs11-utils-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843043" comment="bind-sdb-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843044" comment="bind-sdb-chroot-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843045" comment="bind-utils-9.11.36-8.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843046" comment="python3-bind-9.11.36-8.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2716" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5537.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5537.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843047" comment="libvpx-1.7.0-10.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843048" comment="libvpx-devel-1.7.0-10.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2717" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32081" ref_url="https://www.suse.com/security/cve/CVE-2022-32081/" source="CVE"/>
		<reference ref_id="CVE-2022-32082" ref_url="https://www.suse.com/security/cve/CVE-2022-32082/" source="CVE"/>
		<reference ref_id="CVE-2022-32084" ref_url="https://www.suse.com/security/cve/CVE-2022-32084/" source="CVE"/>
		<reference ref_id="CVE-2022-32089" ref_url="https://www.suse.com/security/cve/CVE-2022-32089/" source="CVE"/>
		<reference ref_id="CVE-2022-32091" ref_url="https://www.suse.com/security/cve/CVE-2022-32091/" source="CVE"/>
		<reference ref_id="CVE-2022-38791" ref_url="https://www.suse.com/security/cve/CVE-2022-38791/" source="CVE"/>
		<reference ref_id="CVE-2022-47015" ref_url="https://www.suse.com/security/cve/CVE-2022-47015/" source="CVE"/>
		<reference ref_id="CVE-2023-5157" ref_url="https://www.suse.com/security/cve/CVE-2023-5157/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5683.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5683.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32081/">CVE-2022-32081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32081">CVE-2022-32081 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32082/">CVE-2022-32082 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32082">CVE-2022-32082 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32084/">CVE-2022-32084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32084">CVE-2022-32084 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32089/">CVE-2022-32089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32089">CVE-2022-32089 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32091/">CVE-2022-32091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32091">CVE-2022-32091 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38791/">CVE-2022-38791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38791">CVE-2022-38791 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47015/">CVE-2022-47015 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47015">CVE-2022-47015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5157/">CVE-2023-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5157">CVE-2023-5157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009839662" comment="Judy-1.0.5-18.module+el8.4.0+9031+9abc7af9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843049" comment="galera-26.4.14-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843050" comment="mariadb-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843051" comment="mariadb-backup-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843052" comment="mariadb-common-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843053" comment="mariadb-devel-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843054" comment="mariadb-embedded-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843055" comment="mariadb-embedded-devel-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843056" comment="mariadb-errmsg-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843057" comment="mariadb-gssapi-server-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843058" comment="mariadb-oqgraph-engine-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843059" comment="mariadb-pam-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843060" comment="mariadb-server-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843061" comment="mariadb-server-galera-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843062" comment="mariadb-server-utils-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843063" comment="mariadb-test-10.5.22-1.module+el8.8.0+20134+a92c7654 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2718" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5709.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5709.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843064" comment="aspnetcore-runtime-7.0-7.0.12-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843065" comment="aspnetcore-targeting-pack-7.0-7.0.12-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843066" comment="dotnet-7.0.112-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843067" comment="dotnet-apphost-pack-7.0-7.0.12-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843068" comment="dotnet-host-7.0.12-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843069" comment="dotnet-hostfxr-7.0-7.0.12-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843070" comment="dotnet-runtime-7.0-7.0.12-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843071" comment="dotnet-sdk-7.0-7.0.112-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843072" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843073" comment="dotnet-targeting-pack-7.0-7.0.12-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843074" comment="dotnet-templates-7.0-7.0.112-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843075" comment="netstandard-targeting-pack-2.1-7.0.112-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2719" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5710.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5710.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843076" comment="aspnetcore-runtime-6.0-6.0.23-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843077" comment="aspnetcore-targeting-pack-6.0-6.0.23-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843078" comment="dotnet-apphost-pack-6.0-6.0.23-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843079" comment="dotnet-hostfxr-6.0-6.0.23-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843080" comment="dotnet-runtime-6.0-6.0.23-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843081" comment="dotnet-sdk-6.0-6.0.123-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843082" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843083" comment="dotnet-targeting-pack-6.0-6.0.23-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843084" comment="dotnet-templates-6.0-6.0.123-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2720" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5712.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5712.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843085" comment="nginx-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843086" comment="nginx-all-modules-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843087" comment="nginx-filesystem-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843088" comment="nginx-mod-devel-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843089" comment="nginx-mod-http-image-filter-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843090" comment="nginx-mod-http-perl-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843091" comment="nginx-mod-http-xslt-filter-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843092" comment="nginx-mod-mail-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843093" comment="nginx-mod-stream-1.20.1-1.module+el8.8.0+20359+9bd89172.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2721" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5713.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5713.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843094" comment="nginx-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843095" comment="nginx-all-modules-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843096" comment="nginx-filesystem-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843097" comment="nginx-mod-devel-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843098" comment="nginx-mod-http-image-filter-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843099" comment="nginx-mod-http-perl-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843100" comment="nginx-mod-http-xslt-filter-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843101" comment="nginx-mod-mail-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843102" comment="nginx-mod-stream-1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2722" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5721.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5721.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009842226" comment="delve-1.9.1-1.module+el8.8.0+16778+5fbb74f5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843103" comment="go-toolset-1.19.13-1.module+el8.8.0+20380+7171fefb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843104" comment="golang-1.19.13-1.module+el8.8.0+20373+d9cd605c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843105" comment="golang-bin-1.19.13-1.module+el8.8.0+20373+d9cd605c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843106" comment="golang-docs-1.19.13-1.module+el8.8.0+20373+d9cd605c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843107" comment="golang-misc-1.19.13-1.module+el8.8.0+20373+d9cd605c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843108" comment="golang-race-1.19.13-1.module+el8.8.0+20373+d9cd605c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843109" comment="golang-src-1.19.13-1.module+el8.8.0+20373+d9cd605c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843110" comment="golang-tests-1.19.13-1.module+el8.8.0+20373+d9cd605c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2723" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40433" ref_url="https://www.suse.com/security/cve/CVE-2022-40433/" source="CVE"/>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5731.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5731.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40433/">CVE-2022-40433 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40433">CVE-2022-40433 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843111" comment="java-1.8.0-openjdk-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843112" comment="java-1.8.0-openjdk-accessibility-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843113" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843114" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843115" comment="java-1.8.0-openjdk-demo-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843116" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843117" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843118" comment="java-1.8.0-openjdk-devel-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843119" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843120" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843121" comment="java-1.8.0-openjdk-fastdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843122" comment="java-1.8.0-openjdk-headless-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843123" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843124" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843125" comment="java-1.8.0-openjdk-javadoc-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843126" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843127" comment="java-1.8.0-openjdk-slowdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843128" comment="java-1.8.0-openjdk-src-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843129" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843130" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2724" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5742.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5742.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843131" comment="java-11-openjdk-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843132" comment="java-11-openjdk-demo-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843133" comment="java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843134" comment="java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843135" comment="java-11-openjdk-devel-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843136" comment="java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843137" comment="java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843138" comment="java-11-openjdk-fastdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843139" comment="java-11-openjdk-headless-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843140" comment="java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843141" comment="java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843142" comment="java-11-openjdk-javadoc-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843143" comment="java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843144" comment="java-11-openjdk-jmods-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843145" comment="java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843146" comment="java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843147" comment="java-11-openjdk-slowdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843148" comment="java-11-openjdk-src-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843149" comment="java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843150" comment="java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843151" comment="java-11-openjdk-static-libs-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843152" comment="java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843153" comment="java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2725" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5751.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5751.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843154" comment="java-17-openjdk-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843155" comment="java-17-openjdk-demo-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843156" comment="java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843157" comment="java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843158" comment="java-17-openjdk-devel-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843159" comment="java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843160" comment="java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843161" comment="java-17-openjdk-fastdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843162" comment="java-17-openjdk-headless-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843163" comment="java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843164" comment="java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843165" comment="java-17-openjdk-javadoc-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843166" comment="java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843167" comment="java-17-openjdk-jmods-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843168" comment="java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843169" comment="java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843170" comment="java-17-openjdk-slowdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843171" comment="java-17-openjdk-src-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843172" comment="java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843173" comment="java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843174" comment="java-17-openjdk-static-libs-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843175" comment="java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843176" comment="java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2726" version="1" class="patch">
	<metadata>
		<title>security update for python-reportlab (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19450" ref_url="https://www.suse.com/security/cve/CVE-2019-19450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5790.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5790.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-19450/">CVE-2019-19450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19450">CVE-2019-19450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843177" comment="python3-reportlab-3.4.0-8.el8_8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2727" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843178" comment="libnghttp2-1.33.0-5.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843179" comment="libnghttp2-devel-1.33.0-5.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843180" comment="nghttp2-1.33.0-5.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2728" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5850.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5850.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843181" comment="nodejs-16.20.2-3.module+el8.8.0+20386+0b1f3093 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843182" comment="nodejs-devel-16.20.2-3.module+el8.8.0+20386+0b1f3093 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843183" comment="nodejs-docs-16.20.2-3.module+el8.8.0+20386+0b1f3093 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843184" comment="nodejs-full-i18n-16.20.2-3.module+el8.8.0+20386+0b1f3093 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842788" comment="nodejs-nodemon-3.0.1-1.module+el8.8.0+19764+7eed1ca3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842789" comment="nodejs-packaging-26-1.module+el8.8.0+19857+6d2a104d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843185" comment="npm-8.19.4-1.16.20.2.3.module+el8.8.0+20386+0b1f3093 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2729" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5863.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5863.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843186" comment="grafana-7.5.15-5.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2730" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38552" ref_url="https://www.suse.com/security/cve/CVE-2023-38552/" source="CVE"/>
		<reference ref_id="CVE-2023-39333" ref_url="https://www.suse.com/security/cve/CVE-2023-39333/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45143" ref_url="https://www.suse.com/security/cve/CVE-2023-45143/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5869.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5869.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38552/">CVE-2023-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38552">CVE-2023-38552 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-39333/">CVE-2023-39333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39333">CVE-2023-39333 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45143/">CVE-2023-45143 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45143">CVE-2023-45143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843187" comment="nodejs-18.18.2-1.module+el8.8.0+20407+c11d40bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843188" comment="nodejs-devel-18.18.2-1.module+el8.8.0+20407+c11d40bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843189" comment="nodejs-docs-18.18.2-1.module+el8.8.0+20407+c11d40bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843190" comment="nodejs-full-i18n-18.18.2-1.module+el8.8.0+20407+c11d40bd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842795" comment="nodejs-nodemon-3.0.1-1.module+el8.8.0+19757+8ca87034 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841358" comment="nodejs-packaging-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009841359" comment="nodejs-packaging-bundler-2021.06-4.module+el8.7.0+15582+19c314fa is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843191" comment="npm-9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2731" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0567" ref_url="https://www.suse.com/security/cve/CVE-2023-0567/" source="CVE"/>
		<reference ref_id="CVE-2023-0568" ref_url="https://www.suse.com/security/cve/CVE-2023-0568/" source="CVE"/>
		<reference ref_id="CVE-2023-0662" ref_url="https://www.suse.com/security/cve/CVE-2023-0662/" source="CVE"/>
		<reference ref_id="CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247/" source="CVE"/>
		<reference ref_id="CVE-2023-3823" ref_url="https://www.suse.com/security/cve/CVE-2023-3823/" source="CVE"/>
		<reference ref_id="CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5927.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5927.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0567/">CVE-2023-0567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0568/">CVE-2023-0568 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0662/">CVE-2023-0662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0662">CVE-2023-0662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3823/">CVE-2023-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009840372" comment="apcu-panel-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840373" comment="libzip-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840374" comment="libzip-devel-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840375" comment="libzip-tools-1.7.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843192" comment="php-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843193" comment="php-bcmath-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843194" comment="php-cli-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843195" comment="php-common-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843196" comment="php-dba-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843197" comment="php-dbg-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843198" comment="php-devel-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843199" comment="php-embedded-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843200" comment="php-enchant-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843201" comment="php-ffi-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843202" comment="php-fpm-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843203" comment="php-gd-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843204" comment="php-gmp-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843205" comment="php-intl-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843206" comment="php-ldap-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843207" comment="php-mbstring-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843208" comment="php-mysqlnd-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843209" comment="php-odbc-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843210" comment="php-opcache-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843211" comment="php-pdo-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840396" comment="php-pear-1.10.13-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840397" comment="php-pecl-apcu-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840398" comment="php-pecl-apcu-devel-5.1.20-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840399" comment="php-pecl-rrd-2.0.3-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840400" comment="php-pecl-xdebug3-3.1.2-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009840401" comment="php-pecl-zip-1.19.2-1.module+el8.6.0+13671+84712317 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843212" comment="php-pgsql-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843213" comment="php-process-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843214" comment="php-snmp-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843215" comment="php-soap-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843216" comment="php-xml-8.0.30-1.module+el8.8.0+20302+42d2b711 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2732" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843217" comment="tomcat-9.0.62-5.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843218" comment="tomcat-admin-webapps-9.0.62-5.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843219" comment="tomcat-docs-webapp-9.0.62-5.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843220" comment="tomcat-el-3.0-api-9.0.62-5.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843221" comment="tomcat-jsp-2.3-api-9.0.62-5.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843222" comment="tomcat-lib-9.0.62-5.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843223" comment="tomcat-servlet-4.0-api-9.0.62-5.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843224" comment="tomcat-webapps-9.0.62-5.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2733" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5989.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5989.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843225" comment="varnish-6.0.8-3.module+el8.8.0+20455+bdc2c048.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843226" comment="varnish-devel-6.0.8-3.module+el8.8.0+20455+bdc2c048.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843227" comment="varnish-docs-6.0.8-3.module+el8.8.0+20455+bdc2c048.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839144" comment="varnish-modules-0.15.0-6.module+el8.5.0+11976+0b4af72d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2734" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5994.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5994.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009837903" comment="babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837904" comment="python-nose-docs-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832450" comment="python-psycopg2-doc-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835513" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843228" comment="python2-2.7.18-13.module+el8.8.0+20144+beed974d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832453" comment="python2-Cython-0.28.1-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832454" comment="python2-PyMySQL-0.8.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832455" comment="python2-attrs-17.4.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837906" comment="python2-babel-2.5.1-10.module+el8.5.0+11014+88fc0d0b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836757" comment="python2-backports-1.0-16.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836758" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837907" comment="python2-bson-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832460" comment="python2-chardet-3.0.4-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832461" comment="python2-coverage-4.5.1-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843229" comment="python2-debug-2.7.18-13.module+el8.8.0+20144+beed974d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843230" comment="python2-devel-2.7.18-13.module+el8.8.0+20144+beed974d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832464" comment="python2-dns-1.15.0-10.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832465" comment="python2-docs-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832466" comment="python2-docs-info-2.7.16-2.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832467" comment="python2-docutils-0.14-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832468" comment="python2-funcsigs-1.0.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832469" comment="python2-idna-2.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832470" comment="python2-ipaddress-1.0.18-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837910" comment="python2-jinja2-2.10-9.module+el8.5.0+10541+706bb066 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843231" comment="python2-libs-2.7.18-13.module+el8.8.0+20144+beed974d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839847" comment="python2-lxml-4.2.3-6.module+el8.6.0+13959+8e368262 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832474" comment="python2-markupsafe-0.23-19.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832475" comment="python2-mock-2.0.0-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837913" comment="python2-nose-1.3.7-31.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836763" comment="python2-numpy-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836764" comment="python2-numpy-doc-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836765" comment="python2-numpy-f2py-1.14.2-16.module+el8.4.0+9406+221a4565 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839848" comment="python2-pip-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009839849" comment="python2-pip-wheel-9.0.3-19.module+el8.6.0+13001+ad200bd9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832482" comment="python2-pluggy-0.6.0-8.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832483" comment="python2-psycopg2-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832484" comment="python2-psycopg2-debug-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832485" comment="python2-psycopg2-tests-2.7.5-7.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832486" comment="python2-py-1.5.3-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837914" comment="python2-pygments-2.2.0-22.module+el8.5.0+10788+a4cea9e0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837915" comment="python2-pymongo-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837916" comment="python2-pymongo-gridfs-3.7.0-1.module+el8.5.0+10264+e5753a40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832490" comment="python2-pysocks-1.6.8-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832491" comment="python2-pytest-3.4.2-13.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832492" comment="python2-pytest-mock-1.9.0-4.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832493" comment="python2-pytz-2017.2-12.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832494" comment="python2-pyyaml-3.12-16.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009833774" comment="python2-requests-2.20.0-3.module+el8.2.0+4577+feefd9b8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832496" comment="python2-rpm-macros-3-38.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837917" comment="python2-scipy-1.0.0-21.module+el8.5.0+10858+05337455 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836766" comment="python2-setuptools-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836767" comment="python2-setuptools-wheel-39.0.1-13.module+el8.4.0+9442+27d0e81c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009832500" comment="python2-setuptools_scm-1.15.7-6.module+el8.1.0+3111+de3f2d8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836768" comment="python2-six-1.11.0-6.module+el8.4.0+9287+299307c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009835522" comment="python2-sqlalchemy-1.3.2-2.module+el8.3.0+6647+8d010749 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843232" comment="python2-test-2.7.18-13.module+el8.8.0+20144+beed974d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843233" comment="python2-tkinter-2.7.18-13.module+el8.8.0+20144+beed974d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843234" comment="python2-tools-2.7.18-13.module+el8.8.0+20144+beed974d.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009836772" comment="python2-urllib3-1.24.2-3.module+el8.4.0+9193+f3daf6ef is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009842369" comment="python2-virtualenv-15.1.0-22.module+el8.8.0+18977+47894b34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837922" comment="python2-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009837923" comment="python2-wheel-wheel-0.31.1-3.module+el8.5.0+12203+77770ab7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2735" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5997.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5997.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843235" comment="platform-python-3.6.8-51.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843236" comment="platform-python-debug-3.6.8-51.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843237" comment="platform-python-devel-3.6.8-51.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843238" comment="python3-idle-3.6.8-51.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843239" comment="python3-libs-3.6.8-51.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843240" comment="python3-test-3.6.8-51.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843241" comment="python3-tkinter-3.6.8-51.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2736" version="1" class="patch">
	<metadata>
		<title>security update for PyYAML (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5998.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5998.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843242" comment="python39-3.9.16-1.module+el8.8.0+20025+f2100191.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843243" comment="python39-Cython-0.29.21-5.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831092" comment="python39-PyMySQL-0.10.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843244" comment="python39-attrs-20.3.0-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831093" comment="python39-cffi-1.14.3-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831094" comment="python39-chardet-3.0.4-19.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831095" comment="python39-cryptography-3.3.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843245" comment="python39-debug-3.9.16-1.module+el8.8.0+20025+f2100191.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843246" comment="python39-devel-3.9.16-1.module+el8.8.0+20025+f2100191.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843247" comment="python39-idle-3.9.16-1.module+el8.8.0+20025+f2100191.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831098" comment="python39-idna-2.10-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843248" comment="python39-iniconfig-1.1.1-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843249" comment="python39-libs-3.9.16-1.module+el8.8.0+20025+f2100191.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831153" comment="python39-lxml-4.6.5-1.module+el8.6.0+13933+9cf0c87c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831380" comment="python39-mod_wsgi-4.7.1-5.module+el8.7.0+16654+645aad7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843250" comment="python39-more-itertools-8.5.0-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831102" comment="python39-numpy-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831103" comment="python39-numpy-doc-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831104" comment="python39-numpy-f2py-1.19.4-3.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843251" comment="python39-packaging-20.4-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831154" comment="python39-pip-20.2.4-7.module+el8.6.0+13003+6bb2c488 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831155" comment="python39-pip-wheel-20.2.4-7.module+el8.6.0+13003+6bb2c488 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843252" comment="python39-pluggy-0.13.1-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831107" comment="python39-ply-3.11-10.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831108" comment="python39-psutil-5.8.0-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831109" comment="python39-psycopg2-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831110" comment="python39-psycopg2-doc-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831111" comment="python39-psycopg2-tests-2.8.6-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843253" comment="python39-py-1.10.0-1.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843254" comment="python39-pybind11-2.7.1-1.module+el8.6.0+12838+640e6226 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843255" comment="python39-pybind11-devel-2.7.1-1.module+el8.6.0+12838+640e6226 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831112" comment="python39-pycparser-2.20-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843256" comment="python39-pyparsing-2.4.7-5.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831113" comment="python39-pysocks-1.7.1-4.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843257" comment="python39-pytest-6.0.2-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831114" comment="python39-pyyaml-5.4.1-1.module+el8.5.0+10613+59a13ec4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831115" comment="python39-requests-2.25.0-2.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843258" comment="python39-rpm-macros-3.9.16-1.module+el8.8.0+20025+f2100191.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831117" comment="python39-scipy-1.5.4-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831118" comment="python39-setuptools-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831119" comment="python39-setuptools-wheel-50.3.2-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831120" comment="python39-six-1.15.0-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843259" comment="python39-test-3.9.16-1.module+el8.8.0+20025+f2100191.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843260" comment="python39-tkinter-3.9.16-1.module+el8.8.0+20025+f2100191.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831123" comment="python39-toml-0.10.1-5.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831124" comment="python39-urllib3-1.25.10-4.module+el8.5.0+11712+ea2d2be1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843261" comment="python39-wcwidth-0.2.5-3.module+el8.4.0+9822+20bf1249 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831125" comment="python39-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831126" comment="python39-wheel-wheel-0.35.1-4.module+el8.5.0+12204+54860423 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2737" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488/" source="CVE"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6187.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6187.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843262" comment="firefox-115.4.0-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2738" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488/" source="CVE"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843263" comment="thunderbird-115.4.1-1.el8_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2739" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4285" ref_url="https://www.suse.com/security/cve/CVE-2022-4285/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6236.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6236.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4285/">CVE-2022-4285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843264" comment="binutils-2.30-119.el8_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843265" comment="binutils-devel-2.30-119.el8_8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2740" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6245.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6245.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843266" comment="aspnetcore-runtime-6.0-6.0.24-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843267" comment="aspnetcore-targeting-pack-6.0-6.0.24-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843268" comment="dotnet-apphost-pack-6.0-6.0.24-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843269" comment="dotnet-hostfxr-6.0-6.0.24-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843270" comment="dotnet-runtime-6.0-6.0.24-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843271" comment="dotnet-sdk-6.0-6.0.124-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843272" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843273" comment="dotnet-targeting-pack-6.0-6.0.24-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843274" comment="dotnet-templates-6.0-6.0.124-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2741" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6247.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6247.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843275" comment="aspnetcore-runtime-7.0-7.0.13-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843276" comment="aspnetcore-targeting-pack-7.0-7.0.13-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843277" comment="dotnet-7.0.113-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843278" comment="dotnet-apphost-pack-7.0-7.0.13-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843279" comment="dotnet-host-7.0.13-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843280" comment="dotnet-hostfxr-7.0-7.0.13-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843281" comment="dotnet-runtime-7.0-7.0.13-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843282" comment="dotnet-sdk-7.0-7.0.113-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843283" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843284" comment="dotnet-targeting-pack-7.0-7.0.13-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843285" comment="dotnet-templates-7.0-7.0.113-1.el8_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843286" comment="netstandard-targeting-pack-2.1-7.0.113-1.el8_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2742" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6887.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6887.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843287" comment="java-21-openjdk-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843288" comment="java-21-openjdk-demo-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843289" comment="java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843290" comment="java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843291" comment="java-21-openjdk-devel-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843292" comment="java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843293" comment="java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843294" comment="java-21-openjdk-fastdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843295" comment="java-21-openjdk-headless-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843296" comment="java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843297" comment="java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843298" comment="java-21-openjdk-javadoc-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843299" comment="java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843300" comment="java-21-openjdk-jmods-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843301" comment="java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843302" comment="java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843303" comment="java-21-openjdk-slowdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843304" comment="java-21-openjdk-src-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843305" comment="java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843306" comment="java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843307" comment="java-21-openjdk-static-libs-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843308" comment="java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843309" comment="java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2743" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-pip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6914.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6914.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843310" comment="python3.11-pip-22.3.1-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843311" comment="python3.11-pip-wheel-22.3.1-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2744" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6916.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6916.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843312" comment="xorg-x11-server-Xdmx-1.20.11-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843313" comment="xorg-x11-server-Xephyr-1.20.11-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843314" comment="xorg-x11-server-Xnest-1.20.11-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843315" comment="xorg-x11-server-Xorg-1.20.11-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843316" comment="xorg-x11-server-Xvfb-1.20.11-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843317" comment="xorg-x11-server-common-1.20.11-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843318" comment="xorg-x11-server-devel-1.20.11-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843319" comment="xorg-x11-server-source-1.20.11-17.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2745" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6917.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6917.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843320" comment="xorg-x11-server-Xwayland-21.1.3-12.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2746" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6919.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6919.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14560">CVE-2019-14560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843321" comment="edk2-ovmf-20220126gitbb1bba3d77-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2747" version="1" class="patch">
	<metadata>
		<title>security update for cjose (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-23527" ref_url="https://www.suse.com/security/cve/CVE-2022-23527/" source="CVE"/>
		<reference ref_id="CVE-2023-28625" ref_url="https://www.suse.com/security/cve/CVE-2023-28625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6940.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6940.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23527/">CVE-2022-23527 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23527">CVE-2022-23527 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28625/">CVE-2023-28625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28625">CVE-2023-28625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843322" comment="cjose-0.6.1-4.module+el8.9.0+19469+5b493da9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843323" comment="cjose-devel-0.6.1-4.module+el8.9.0+19469+5b493da9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843324" comment="mod_auth_openidc-2.4.9.4-5.module+el8.9.0+18723+672ccf5d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2748" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1786" ref_url="https://www.suse.com/security/cve/CVE-2023-1786/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6943.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6943.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1786/">CVE-2023-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1786">CVE-2023-1786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843325" comment="cloud-init-23.1.1-10.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2749" version="1" class="patch">
	<metadata>
		<title>security update for protobuf-c (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48468" ref_url="https://www.suse.com/security/cve/CVE-2022-48468/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6944.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6944.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48468/">CVE-2022-48468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48468">CVE-2022-48468 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843326" comment="protobuf-c-1.3.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843327" comment="protobuf-c-compiler-1.3.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843328" comment="protobuf-c-devel-1.3.0-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2750" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtsvg (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6961.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6961.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843329" comment="qt5-qtsvg-5.15.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843330" comment="qt5-qtsvg-devel-5.15.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843331" comment="qt5-qtsvg-examples-5.15.3-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2751" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285/" source="CVE"/>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<reference ref_id="CVE-2023-37369" ref_url="https://www.suse.com/security/cve/CVE-2023-37369/" source="CVE"/>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6967.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6967.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37369/">CVE-2023-37369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37369">CVE-2023-37369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843332" comment="qt5-qtbase-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843333" comment="qt5-qtbase-common-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843334" comment="qt5-qtbase-devel-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843335" comment="qt5-qtbase-examples-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843336" comment="qt5-qtbase-gui-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843337" comment="qt5-qtbase-mysql-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843338" comment="qt5-qtbase-odbc-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843339" comment="qt5-qtbase-postgresql-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843340" comment="qt5-qtbase-private-devel-5.15.3-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843341" comment="qt5-qtbase-static-5.15.3-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2752" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3128" ref_url="https://www.suse.com/security/cve/CVE-2023-3128/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6972.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6972.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-3128/">CVE-2023-3128 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3128">CVE-2023-3128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843342" comment="grafana-9.2.10-7.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2753" version="1" class="patch">
	<metadata>
		<title>security update for libfastjson (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6976.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6976.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843343" comment="libfastjson-0.99.9-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2754" version="1" class="patch">
	<metadata>
		<title>security update for sysstat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-33204" ref_url="https://www.suse.com/security/cve/CVE-2023-33204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7010.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7010.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33204/">CVE-2023-33204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33204">CVE-2023-33204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843344" comment="sysstat-11.7.3-11.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2755" version="1" class="patch">
	<metadata>
		<title>security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0666" ref_url="https://www.suse.com/security/cve/CVE-2023-0666/" source="CVE"/>
		<reference ref_id="CVE-2023-2856" ref_url="https://www.suse.com/security/cve/CVE-2023-2856/" source="CVE"/>
		<reference ref_id="CVE-2023-2858" ref_url="https://www.suse.com/security/cve/CVE-2023-2858/" source="CVE"/>
		<reference ref_id="CVE-2023-2952" ref_url="https://www.suse.com/security/cve/CVE-2023-2952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7015.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7015.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0666/">CVE-2023-0666 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0666">CVE-2023-0666 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2856/">CVE-2023-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2856">CVE-2023-2856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2858/">CVE-2023-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2858">CVE-2023-2858 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2952/">CVE-2023-2952 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2952">CVE-2023-2952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843345" comment="wireshark-2.6.2-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843346" comment="wireshark-cli-2.6.2-17.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843347" comment="wireshark-devel-2.6.2-17.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2756" version="1" class="patch">
	<metadata>
		<title>security update for libpq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7016.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7016.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843348" comment="libpq-13.11-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843349" comment="libpq-devel-13.11-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2757" version="1" class="patch">
	<metadata>
		<title>security update for tang (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1672" ref_url="https://www.suse.com/security/cve/CVE-2023-1672/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7022.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7022.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1672/">CVE-2023-1672 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1672">CVE-2023-1672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843350" comment="tang-7-8.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2758" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2023-41105" ref_url="https://www.suse.com/security/cve/CVE-2023-41105/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41105/">CVE-2023-41105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843351" comment="python3.11-3.11.5-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843352" comment="python3.11-debug-3.11.5-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843353" comment="python3.11-devel-3.11.5-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843354" comment="python3.11-idle-3.11.5-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843355" comment="python3.11-libs-3.11.5-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843356" comment="python3.11-rpm-macros-3.11.5-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843357" comment="python3.11-test-3.11.5-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843358" comment="python3.11-tkinter-3.11.5-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2759" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<reference ref_id="CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7025.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7025.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843359" comment="ruby-2.5.9-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843360" comment="ruby-devel-2.5.9-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843361" comment="ruby-doc-2.5.9-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843362" comment="ruby-irb-2.5.9-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843363" comment="ruby-libs-2.5.9-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843364" comment="rubygem-abrt-0.3.0-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843365" comment="rubygem-abrt-doc-0.3.0-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843366" comment="rubygem-bigdecimal-1.3.4-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843367" comment="rubygem-bson-4.3.0-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843368" comment="rubygem-bson-doc-4.3.0-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843369" comment="rubygem-bundler-1.16.1-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843370" comment="rubygem-bundler-doc-1.16.1-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843371" comment="rubygem-did_you_mean-1.2.0-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843372" comment="rubygem-io-console-0.4.6-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843373" comment="rubygem-json-2.1.0-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843374" comment="rubygem-minitest-5.10.3-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843375" comment="rubygem-mongo-2.5.1-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843376" comment="rubygem-mongo-doc-2.5.1-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843377" comment="rubygem-mysql2-0.4.10-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843378" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843379" comment="rubygem-net-telnet-0.1.1-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843380" comment="rubygem-openssl-2.1.2-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843381" comment="rubygem-pg-1.0.0-3.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843382" comment="rubygem-pg-doc-1.0.0-3.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843383" comment="rubygem-power_assert-1.1.1-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843384" comment="rubygem-psych-3.0.2-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843385" comment="rubygem-rake-12.3.3-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843386" comment="rubygem-rdoc-6.0.1.1-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843387" comment="rubygem-test-unit-3.2.7-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843388" comment="rubygem-xmlrpc-0.3.0-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843389" comment="rubygems-2.7.6.3-111.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843390" comment="rubygems-devel-2.7.6.3-111.module+el8.9.0+19193+435404ae is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2760" version="1" class="patch">
	<metadata>
		<title>security update for libX11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7029.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7029.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843391" comment="libX11-1.6.8-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843392" comment="libX11-common-1.6.8-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843393" comment="libX11-devel-1.6.8-6.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843394" comment="libX11-xcb-1.6.8-6.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2761" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28100" ref_url="https://www.suse.com/security/cve/CVE-2023-28100/" source="CVE"/>
		<reference ref_id="CVE-2023-28101" ref_url="https://www.suse.com/security/cve/CVE-2023-28101/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7038.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7038.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28100/">CVE-2023-28100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28100">CVE-2023-28100 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28101/">CVE-2023-28101 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28101">CVE-2023-28101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843395" comment="flatpak-1.10.8-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843396" comment="flatpak-devel-1.10.8-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843397" comment="flatpak-libs-1.10.8-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843398" comment="flatpak-selinux-1.10.8-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843399" comment="flatpak-session-helper-1.10.8-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2762" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7042.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7042.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843400" comment="babel-2.5.1-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843401" comment="python-nose-docs-1.3.7-31.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843402" comment="python-psycopg2-doc-2.7.5-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843403" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843404" comment="python2-2.7.18-15.module+el8.9.0+20125+68111a8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843405" comment="python2-Cython-0.28.1-7.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843406" comment="python2-PyMySQL-0.8.0-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843407" comment="python2-attrs-17.4.0-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843408" comment="python2-babel-2.5.1-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843409" comment="python2-backports-1.0-16.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843410" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843411" comment="python2-bson-3.7.0-1.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843412" comment="python2-chardet-3.0.4-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843413" comment="python2-coverage-4.5.1-5.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843414" comment="python2-debug-2.7.18-15.module+el8.9.0+20125+68111a8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843415" comment="python2-devel-2.7.18-15.module+el8.9.0+20125+68111a8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843416" comment="python2-dns-1.15.0-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843417" comment="python2-docs-2.7.16-2.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843418" comment="python2-docs-info-2.7.16-2.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843419" comment="python2-docutils-0.14-12.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843420" comment="python2-funcsigs-1.0.2-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843421" comment="python2-idna-2.5-7.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843422" comment="python2-ipaddress-1.0.18-6.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843423" comment="python2-jinja2-2.10-9.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843424" comment="python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843425" comment="python2-lxml-4.2.3-6.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843426" comment="python2-markupsafe-0.23-19.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843427" comment="python2-mock-2.0.0-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843428" comment="python2-nose-1.3.7-31.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843429" comment="python2-numpy-1.14.2-16.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843430" comment="python2-numpy-doc-1.14.2-16.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843431" comment="python2-numpy-f2py-1.14.2-16.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843432" comment="python2-pip-9.0.3-19.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843433" comment="python2-pip-wheel-9.0.3-19.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843434" comment="python2-pluggy-0.6.0-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843435" comment="python2-psycopg2-2.7.5-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843436" comment="python2-psycopg2-debug-2.7.5-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843437" comment="python2-psycopg2-tests-2.7.5-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843438" comment="python2-py-1.5.3-6.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843439" comment="python2-pygments-2.2.0-22.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843440" comment="python2-pymongo-3.7.0-1.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843441" comment="python2-pymongo-gridfs-3.7.0-1.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843442" comment="python2-pysocks-1.6.8-6.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843443" comment="python2-pytest-3.4.2-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843444" comment="python2-pytest-mock-1.9.0-4.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843445" comment="python2-pytz-2017.2-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843446" comment="python2-pyyaml-3.12-16.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843447" comment="python2-requests-2.20.0-4.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843448" comment="python2-rpm-macros-3-38.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843449" comment="python2-scipy-1.0.0-22.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843450" comment="python2-setuptools-39.0.1-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843451" comment="python2-setuptools-wheel-39.0.1-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843452" comment="python2-setuptools_scm-1.15.7-6.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843453" comment="python2-six-1.11.0-6.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843454" comment="python2-sqlalchemy-1.3.2-2.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843455" comment="python2-test-2.7.18-15.module+el8.9.0+20125+68111a8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843456" comment="python2-tkinter-2.7.18-15.module+el8.9.0+20125+68111a8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843457" comment="python2-tools-2.7.18-15.module+el8.9.0+20125+68111a8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843458" comment="python2-urllib3-1.24.2-3.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843459" comment="python2-virtualenv-15.1.0-22.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843460" comment="python2-wheel-0.31.1-3.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843461" comment="python2-wheel-wheel-0.31.1-3.module+el8.9.0+19487+7dc18407 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2763" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843462" comment="dnsmasq-2.79-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843463" comment="dnsmasq-utils-2.79-31.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2764" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38710" ref_url="https://www.suse.com/security/cve/CVE-2023-38710/" source="CVE"/>
		<reference ref_id="CVE-2023-38711" ref_url="https://www.suse.com/security/cve/CVE-2023-38711/" source="CVE"/>
		<reference ref_id="CVE-2023-38712" ref_url="https://www.suse.com/security/cve/CVE-2023-38712/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7052.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7052.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38710/">CVE-2023-38710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38710">CVE-2023-38710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38711/">CVE-2023-38711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38711">CVE-2023-38711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38712/">CVE-2023-38712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38712">CVE-2023-38712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843464" comment="libreswan-4.12-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2765" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28879" ref_url="https://www.suse.com/security/cve/CVE-2023-28879/" source="CVE"/>
		<reference ref_id="CVE-2023-38559" ref_url="https://www.suse.com/security/cve/CVE-2023-38559/" source="CVE"/>
		<reference ref_id="CVE-2023-4042" ref_url="https://www.suse.com/security/cve/CVE-2023-4042/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7053.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7053.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28879/">CVE-2023-28879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28879">CVE-2023-28879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38559/">CVE-2023-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38559">CVE-2023-38559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4042/">CVE-2023-4042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4042">CVE-2023-4042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843465" comment="ghostscript-9.27-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843466" comment="ghostscript-doc-9.27-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843467" comment="ghostscript-tools-dvipdf-9.27-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843468" comment="ghostscript-tools-fonts-9.27-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843469" comment="ghostscript-tools-printing-9.27-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843470" comment="ghostscript-x11-9.27-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843471" comment="libgs-9.27-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843472" comment="libgs-devel-9.27-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2766" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-32885" ref_url="https://www.suse.com/security/cve/CVE-2022-32885/" source="CVE"/>
		<reference ref_id="CVE-2022-32919" ref_url="https://www.suse.com/security/cve/CVE-2022-32919/" source="CVE"/>
		<reference ref_id="CVE-2022-32933" ref_url="https://www.suse.com/security/cve/CVE-2022-32933/" source="CVE"/>
		<reference ref_id="CVE-2022-46705" ref_url="https://www.suse.com/security/cve/CVE-2022-46705/" source="CVE"/>
		<reference ref_id="CVE-2022-46725" ref_url="https://www.suse.com/security/cve/CVE-2022-46725/" source="CVE"/>
		<reference ref_id="CVE-2023-27932" ref_url="https://www.suse.com/security/cve/CVE-2023-27932/" source="CVE"/>
		<reference ref_id="CVE-2023-27954" ref_url="https://www.suse.com/security/cve/CVE-2023-27954/" source="CVE"/>
		<reference ref_id="CVE-2023-28198" ref_url="https://www.suse.com/security/cve/CVE-2023-28198/" source="CVE"/>
		<reference ref_id="CVE-2023-32370" ref_url="https://www.suse.com/security/cve/CVE-2023-32370/" source="CVE"/>
		<reference ref_id="CVE-2023-32393" ref_url="https://www.suse.com/security/cve/CVE-2023-32393/" source="CVE"/>
		<reference ref_id="CVE-2023-38133" ref_url="https://www.suse.com/security/cve/CVE-2023-38133/" source="CVE"/>
		<reference ref_id="CVE-2023-38572" ref_url="https://www.suse.com/security/cve/CVE-2023-38572/" source="CVE"/>
		<reference ref_id="CVE-2023-38592" ref_url="https://www.suse.com/security/cve/CVE-2023-38592/" source="CVE"/>
		<reference ref_id="CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594/" source="CVE"/>
		<reference ref_id="CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595/" source="CVE"/>
		<reference ref_id="CVE-2023-38597" ref_url="https://www.suse.com/security/cve/CVE-2023-38597/" source="CVE"/>
		<reference ref_id="CVE-2023-38599" ref_url="https://www.suse.com/security/cve/CVE-2023-38599/" source="CVE"/>
		<reference ref_id="CVE-2023-38600" ref_url="https://www.suse.com/security/cve/CVE-2023-38600/" source="CVE"/>
		<reference ref_id="CVE-2023-38611" ref_url="https://www.suse.com/security/cve/CVE-2023-38611/" source="CVE"/>
		<reference ref_id="CVE-2023-40397" ref_url="https://www.suse.com/security/cve/CVE-2023-40397/" source="CVE"/>
		<reference ref_id="CVE-2023-40451" ref_url="https://www.suse.com/security/cve/CVE-2023-40451/" source="CVE"/>
		<reference ref_id="CVE-2023-42833" ref_url="https://www.suse.com/security/cve/CVE-2023-42833/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7055.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7055.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32885/">CVE-2022-32885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32885">CVE-2022-32885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32919/">CVE-2022-32919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32919">CVE-2022-32919 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32933/">CVE-2022-32933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32933">CVE-2022-32933 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46705/">CVE-2022-46705 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46705">CVE-2022-46705 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46725/">CVE-2022-46725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46725">CVE-2022-46725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27932/">CVE-2023-27932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27932">CVE-2023-27932 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-27954/">CVE-2023-27954 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27954">CVE-2023-27954 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28198/">CVE-2023-28198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28198">CVE-2023-28198 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-32370/">CVE-2023-32370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32370">CVE-2023-32370 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32393/">CVE-2023-32393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32393">CVE-2023-32393 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38133/">CVE-2023-38133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38133">CVE-2023-38133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38572/">CVE-2023-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38572">CVE-2023-38572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38592/">CVE-2023-38592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38592">CVE-2023-38592 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38597/">CVE-2023-38597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38597">CVE-2023-38597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38599/">CVE-2023-38599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38599">CVE-2023-38599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38600/">CVE-2023-38600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38600">CVE-2023-38600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38611/">CVE-2023-38611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38611">CVE-2023-38611 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40397/">CVE-2023-40397 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40397">CVE-2023-40397 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40451/">CVE-2023-40451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42833/">CVE-2023-42833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42833">CVE-2023-42833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843473" comment="webkit2gtk3-2.40.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843474" comment="webkit2gtk3-devel-2.40.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843475" comment="webkit2gtk3-jsc-2.40.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843476" comment="webkit2gtk3-jsc-devel-2.40.5-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2767" version="1" class="patch">
	<metadata>
		<title>security update for yajl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-33460" ref_url="https://www.suse.com/security/cve/CVE-2023-33460/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7057.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7057.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33460/">CVE-2023-33460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33460">CVE-2023-33460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843477" comment="yajl-2.1.0-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843478" comment="yajl-devel-2.1.0-12.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2768" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<reference ref_id="CVE-2023-28708" ref_url="https://www.suse.com/security/cve/CVE-2023-28708/" source="CVE"/>
		<reference ref_id="CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7065.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7065.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28708/">CVE-2023-28708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28708">CVE-2023-28708 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843479" comment="tomcat-9.0.62-27.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843480" comment="tomcat-admin-webapps-9.0.62-27.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843481" comment="tomcat-docs-webapp-9.0.62-27.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843482" comment="tomcat-el-3.0-api-9.0.62-27.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843483" comment="tomcat-jsp-2.3-api-9.0.62-27.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843484" comment="tomcat-lib-9.0.62-27.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843485" comment="tomcat-servlet-4.0-api-9.0.62-27.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843486" comment="tomcat-webapps-9.0.62-27.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2769" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594/" source="CVE"/>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457/" source="CVE"/>
		<reference ref_id="CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133/" source="CVE"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895/" source="CVE"/>
		<reference ref_id="CVE-2022-45869" ref_url="https://www.suse.com/security/cve/CVE-2022-45869/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988/" source="CVE"/>
		<reference ref_id="CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997/" source="CVE"/>
		<reference ref_id="CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028/" source="CVE"/>
		<reference ref_id="CVE-2022-49080" ref_url="https://www.suse.com/security/cve/CVE-2022-49080/" source="CVE"/>
		<reference ref_id="CVE-2022-49180" ref_url="https://www.suse.com/security/cve/CVE-2022-49180/" source="CVE"/>
		<reference ref_id="CVE-2022-49356" ref_url="https://www.suse.com/security/cve/CVE-2022-49356/" source="CVE"/>
		<reference ref_id="CVE-2022-49401" ref_url="https://www.suse.com/security/cve/CVE-2022-49401/" source="CVE"/>
		<reference ref_id="CVE-2022-49492" ref_url="https://www.suse.com/security/cve/CVE-2022-49492/" source="CVE"/>
		<reference ref_id="CVE-2022-49639" ref_url="https://www.suse.com/security/cve/CVE-2022-49639/" source="CVE"/>
		<reference ref_id="CVE-2022-49647" ref_url="https://www.suse.com/security/cve/CVE-2022-49647/" source="CVE"/>
		<reference ref_id="CVE-2022-49675" ref_url="https://www.suse.com/security/cve/CVE-2022-49675/" source="CVE"/>
		<reference ref_id="CVE-2022-49752" ref_url="https://www.suse.com/security/cve/CVE-2022-49752/" source="CVE"/>
		<reference ref_id="CVE-2022-49773" ref_url="https://www.suse.com/security/cve/CVE-2022-49773/" source="CVE"/>
		<reference ref_id="CVE-2022-49827" ref_url="https://www.suse.com/security/cve/CVE-2022-49827/" source="CVE"/>
		<reference ref_id="CVE-2022-49853" ref_url="https://www.suse.com/security/cve/CVE-2022-49853/" source="CVE"/>
		<reference ref_id="CVE-2022-49862" ref_url="https://www.suse.com/security/cve/CVE-2022-49862/" source="CVE"/>
		<reference ref_id="CVE-2022-49864" ref_url="https://www.suse.com/security/cve/CVE-2022-49864/" source="CVE"/>
		<reference ref_id="CVE-2022-49890" ref_url="https://www.suse.com/security/cve/CVE-2022-49890/" source="CVE"/>
		<reference ref_id="CVE-2022-49903" ref_url="https://www.suse.com/security/cve/CVE-2022-49903/" source="CVE"/>
		<reference ref_id="CVE-2022-49944" ref_url="https://www.suse.com/security/cve/CVE-2022-49944/" source="CVE"/>
		<reference ref_id="CVE-2022-49995" ref_url="https://www.suse.com/security/cve/CVE-2022-49995/" source="CVE"/>
		<reference ref_id="CVE-2022-50003" ref_url="https://www.suse.com/security/cve/CVE-2022-50003/" source="CVE"/>
		<reference ref_id="CVE-2022-50046" ref_url="https://www.suse.com/security/cve/CVE-2022-50046/" source="CVE"/>
		<reference ref_id="CVE-2022-50066" ref_url="https://www.suse.com/security/cve/CVE-2022-50066/" source="CVE"/>
		<reference ref_id="CVE-2022-50083" ref_url="https://www.suse.com/security/cve/CVE-2022-50083/" source="CVE"/>
		<reference ref_id="CVE-2022-50148" ref_url="https://www.suse.com/security/cve/CVE-2022-50148/" source="CVE"/>
		<reference ref_id="CVE-2022-50246" ref_url="https://www.suse.com/security/cve/CVE-2022-50246/" source="CVE"/>
		<reference ref_id="CVE-2022-50247" ref_url="https://www.suse.com/security/cve/CVE-2022-50247/" source="CVE"/>
		<reference ref_id="CVE-2022-50258" ref_url="https://www.suse.com/security/cve/CVE-2022-50258/" source="CVE"/>
		<reference ref_id="CVE-2022-50269" ref_url="https://www.suse.com/security/cve/CVE-2022-50269/" source="CVE"/>
		<reference ref_id="CVE-2022-50275" ref_url="https://www.suse.com/security/cve/CVE-2022-50275/" source="CVE"/>
		<reference ref_id="CVE-2022-50279" ref_url="https://www.suse.com/security/cve/CVE-2022-50279/" source="CVE"/>
		<reference ref_id="CVE-2022-50287" ref_url="https://www.suse.com/security/cve/CVE-2022-50287/" source="CVE"/>
		<reference ref_id="CVE-2022-50290" ref_url="https://www.suse.com/security/cve/CVE-2022-50290/" source="CVE"/>
		<reference ref_id="CVE-2022-50297" ref_url="https://www.suse.com/security/cve/CVE-2022-50297/" source="CVE"/>
		<reference ref_id="CVE-2022-50303" ref_url="https://www.suse.com/security/cve/CVE-2022-50303/" source="CVE"/>
		<reference ref_id="CVE-2022-50317" ref_url="https://www.suse.com/security/cve/CVE-2022-50317/" source="CVE"/>
		<reference ref_id="CVE-2022-50318" ref_url="https://www.suse.com/security/cve/CVE-2022-50318/" source="CVE"/>
		<reference ref_id="CVE-2022-50348" ref_url="https://www.suse.com/security/cve/CVE-2022-50348/" source="CVE"/>
		<reference ref_id="CVE-2022-50354" ref_url="https://www.suse.com/security/cve/CVE-2022-50354/" source="CVE"/>
		<reference ref_id="CVE-2022-50356" ref_url="https://www.suse.com/security/cve/CVE-2022-50356/" source="CVE"/>
		<reference ref_id="CVE-2022-50365" ref_url="https://www.suse.com/security/cve/CVE-2022-50365/" source="CVE"/>
		<reference ref_id="CVE-2022-50369" ref_url="https://www.suse.com/security/cve/CVE-2022-50369/" source="CVE"/>
		<reference ref_id="CVE-2022-50385" ref_url="https://www.suse.com/security/cve/CVE-2022-50385/" source="CVE"/>
		<reference ref_id="CVE-2022-50388" ref_url="https://www.suse.com/security/cve/CVE-2022-50388/" source="CVE"/>
		<reference ref_id="CVE-2022-50389" ref_url="https://www.suse.com/security/cve/CVE-2022-50389/" source="CVE"/>
		<reference ref_id="CVE-2022-50390" ref_url="https://www.suse.com/security/cve/CVE-2022-50390/" source="CVE"/>
		<reference ref_id="CVE-2022-50393" ref_url="https://www.suse.com/security/cve/CVE-2022-50393/" source="CVE"/>
		<reference ref_id="CVE-2022-50396" ref_url="https://www.suse.com/security/cve/CVE-2022-50396/" source="CVE"/>
		<reference ref_id="CVE-2022-50405" ref_url="https://www.suse.com/security/cve/CVE-2022-50405/" source="CVE"/>
		<reference ref_id="CVE-2022-50406" ref_url="https://www.suse.com/security/cve/CVE-2022-50406/" source="CVE"/>
		<reference ref_id="CVE-2022-50412" ref_url="https://www.suse.com/security/cve/CVE-2022-50412/" source="CVE"/>
		<reference ref_id="CVE-2022-50440" ref_url="https://www.suse.com/security/cve/CVE-2022-50440/" source="CVE"/>
		<reference ref_id="CVE-2022-50452" ref_url="https://www.suse.com/security/cve/CVE-2022-50452/" source="CVE"/>
		<reference ref_id="CVE-2022-50464" ref_url="https://www.suse.com/security/cve/CVE-2022-50464/" source="CVE"/>
		<reference ref_id="CVE-2022-50470" ref_url="https://www.suse.com/security/cve/CVE-2022-50470/" source="CVE"/>
		<reference ref_id="CVE-2022-50472" ref_url="https://www.suse.com/security/cve/CVE-2022-50472/" source="CVE"/>
		<reference ref_id="CVE-2022-50473" ref_url="https://www.suse.com/security/cve/CVE-2022-50473/" source="CVE"/>
		<reference ref_id="CVE-2022-50475" ref_url="https://www.suse.com/security/cve/CVE-2022-50475/" source="CVE"/>
		<reference ref_id="CVE-2022-50479" ref_url="https://www.suse.com/security/cve/CVE-2022-50479/" source="CVE"/>
		<reference ref_id="CVE-2022-50489" ref_url="https://www.suse.com/security/cve/CVE-2022-50489/" source="CVE"/>
		<reference ref_id="CVE-2022-50515" ref_url="https://www.suse.com/security/cve/CVE-2022-50515/" source="CVE"/>
		<reference ref_id="CVE-2022-50520" ref_url="https://www.suse.com/security/cve/CVE-2022-50520/" source="CVE"/>
		<reference ref_id="CVE-2022-50527" ref_url="https://www.suse.com/security/cve/CVE-2022-50527/" source="CVE"/>
		<reference ref_id="CVE-2022-50528" ref_url="https://www.suse.com/security/cve/CVE-2022-50528/" source="CVE"/>
		<reference ref_id="CVE-2022-50532" ref_url="https://www.suse.com/security/cve/CVE-2022-50532/" source="CVE"/>
		<reference ref_id="CVE-2022-50535" ref_url="https://www.suse.com/security/cve/CVE-2022-50535/" source="CVE"/>
		<reference ref_id="CVE-2022-50544" ref_url="https://www.suse.com/security/cve/CVE-2022-50544/" source="CVE"/>
		<reference ref_id="CVE-2022-50555" ref_url="https://www.suse.com/security/cve/CVE-2022-50555/" source="CVE"/>
		<reference ref_id="CVE-2022-50556" ref_url="https://www.suse.com/security/cve/CVE-2022-50556/" source="CVE"/>
		<reference ref_id="CVE-2022-50562" ref_url="https://www.suse.com/security/cve/CVE-2022-50562/" source="CVE"/>
		<reference ref_id="CVE-2022-50578" ref_url="https://www.suse.com/security/cve/CVE-2022-50578/" source="CVE"/>
		<reference ref_id="CVE-2022-50617" ref_url="https://www.suse.com/security/cve/CVE-2022-50617/" source="CVE"/>
		<reference ref_id="CVE-2022-50619" ref_url="https://www.suse.com/security/cve/CVE-2022-50619/" source="CVE"/>
		<reference ref_id="CVE-2022-50626" ref_url="https://www.suse.com/security/cve/CVE-2022-50626/" source="CVE"/>
		<reference ref_id="CVE-2022-50627" ref_url="https://www.suse.com/security/cve/CVE-2022-50627/" source="CVE"/>
		<reference ref_id="CVE-2022-50628" ref_url="https://www.suse.com/security/cve/CVE-2022-50628/" source="CVE"/>
		<reference ref_id="CVE-2022-50667" ref_url="https://www.suse.com/security/cve/CVE-2022-50667/" source="CVE"/>
		<reference ref_id="CVE-2022-50677" ref_url="https://www.suse.com/security/cve/CVE-2022-50677/" source="CVE"/>
		<reference ref_id="CVE-2022-50699" ref_url="https://www.suse.com/security/cve/CVE-2022-50699/" source="CVE"/>
		<reference ref_id="CVE-2022-50700" ref_url="https://www.suse.com/security/cve/CVE-2022-50700/" source="CVE"/>
		<reference ref_id="CVE-2022-50701" ref_url="https://www.suse.com/security/cve/CVE-2022-50701/" source="CVE"/>
		<reference ref_id="CVE-2022-50710" ref_url="https://www.suse.com/security/cve/CVE-2022-50710/" source="CVE"/>
		<reference ref_id="CVE-2022-50717" ref_url="https://www.suse.com/security/cve/CVE-2022-50717/" source="CVE"/>
		<reference ref_id="CVE-2022-50718" ref_url="https://www.suse.com/security/cve/CVE-2022-50718/" source="CVE"/>
		<reference ref_id="CVE-2022-50728" ref_url="https://www.suse.com/security/cve/CVE-2022-50728/" source="CVE"/>
		<reference ref_id="CVE-2022-50733" ref_url="https://www.suse.com/security/cve/CVE-2022-50733/" source="CVE"/>
		<reference ref_id="CVE-2022-50735" ref_url="https://www.suse.com/security/cve/CVE-2022-50735/" source="CVE"/>
		<reference ref_id="CVE-2022-50740" ref_url="https://www.suse.com/security/cve/CVE-2022-50740/" source="CVE"/>
		<reference ref_id="CVE-2022-50750" ref_url="https://www.suse.com/security/cve/CVE-2022-50750/" source="CVE"/>
		<reference ref_id="CVE-2022-50760" ref_url="https://www.suse.com/security/cve/CVE-2022-50760/" source="CVE"/>
		<reference ref_id="CVE-2022-50778" ref_url="https://www.suse.com/security/cve/CVE-2022-50778/" source="CVE"/>
		<reference ref_id="CVE-2022-50781" ref_url="https://www.suse.com/security/cve/CVE-2022-50781/" source="CVE"/>
		<reference ref_id="CVE-2022-50784" ref_url="https://www.suse.com/security/cve/CVE-2022-50784/" source="CVE"/>
		<reference ref_id="CVE-2022-50809" ref_url="https://www.suse.com/security/cve/CVE-2022-50809/" source="CVE"/>
		<reference ref_id="CVE-2022-50816" ref_url="https://www.suse.com/security/cve/CVE-2022-50816/" source="CVE"/>
		<reference ref_id="CVE-2022-50819" ref_url="https://www.suse.com/security/cve/CVE-2022-50819/" source="CVE"/>
		<reference ref_id="CVE-2022-50822" ref_url="https://www.suse.com/security/cve/CVE-2022-50822/" source="CVE"/>
		<reference ref_id="CVE-2022-50824" ref_url="https://www.suse.com/security/cve/CVE-2022-50824/" source="CVE"/>
		<reference ref_id="CVE-2022-50829" ref_url="https://www.suse.com/security/cve/CVE-2022-50829/" source="CVE"/>
		<reference ref_id="CVE-2022-50842" ref_url="https://www.suse.com/security/cve/CVE-2022-50842/" source="CVE"/>
		<reference ref_id="CVE-2022-50844" ref_url="https://www.suse.com/security/cve/CVE-2022-50844/" source="CVE"/>
		<reference ref_id="CVE-2022-50847" ref_url="https://www.suse.com/security/cve/CVE-2022-50847/" source="CVE"/>
		<reference ref_id="CVE-2022-50861" ref_url="https://www.suse.com/security/cve/CVE-2022-50861/" source="CVE"/>
		<reference ref_id="CVE-2022-50878" ref_url="https://www.suse.com/security/cve/CVE-2022-50878/" source="CVE"/>
		<reference ref_id="CVE-2022-50881" ref_url="https://www.suse.com/security/cve/CVE-2022-50881/" source="CVE"/>
		<reference ref_id="CVE-2022-50882" ref_url="https://www.suse.com/security/cve/CVE-2022-50882/" source="CVE"/>
		<reference ref_id="CVE-2022-50884" ref_url="https://www.suse.com/security/cve/CVE-2022-50884/" source="CVE"/>
		<reference ref_id="CVE-2023-0458" ref_url="https://www.suse.com/security/cve/CVE-2023-0458/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597/" source="CVE"/>
		<reference ref_id="CVE-2023-1073" ref_url="https://www.suse.com/security/cve/CVE-2023-1073/" source="CVE"/>
		<reference ref_id="CVE-2023-1074" ref_url="https://www.suse.com/security/cve/CVE-2023-1074/" source="CVE"/>
		<reference ref_id="CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075/" source="CVE"/>
		<reference ref_id="CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079/" source="CVE"/>
		<reference ref_id="CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-1252" ref_url="https://www.suse.com/security/cve/CVE-2023-1252/" source="CVE"/>
		<reference ref_id="CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382/" source="CVE"/>
		<reference ref_id="CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855/" source="CVE"/>
		<reference ref_id="CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989/" source="CVE"/>
		<reference ref_id="CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998/" source="CVE"/>
		<reference ref_id="CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269/" source="CVE"/>
		<reference ref_id="CVE-2023-23455" ref_url="https://www.suse.com/security/cve/CVE-2023-23455/" source="CVE"/>
		<reference ref_id="CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513/" source="CVE"/>
		<reference ref_id="CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545/" source="CVE"/>
		<reference ref_id="CVE-2023-28328" ref_url="https://www.suse.com/security/cve/CVE-2023-28328/" source="CVE"/>
		<reference ref_id="CVE-2023-28772" ref_url="https://www.suse.com/security/cve/CVE-2023-28772/" source="CVE"/>
		<reference ref_id="CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-31436" ref_url="https://www.suse.com/security/cve/CVE-2023-31436/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-33203" ref_url="https://www.suse.com/security/cve/CVE-2023-33203/" source="CVE"/>
		<reference ref_id="CVE-2023-33951" ref_url="https://www.suse.com/security/cve/CVE-2023-33951/" source="CVE"/>
		<reference ref_id="CVE-2023-33952" ref_url="https://www.suse.com/security/cve/CVE-2023-33952/" source="CVE"/>
		<reference ref_id="CVE-2023-35823" ref_url="https://www.suse.com/security/cve/CVE-2023-35823/" source="CVE"/>
		<reference ref_id="CVE-2023-35824" ref_url="https://www.suse.com/security/cve/CVE-2023-35824/" source="CVE"/>
		<reference ref_id="CVE-2023-35825" ref_url="https://www.suse.com/security/cve/CVE-2023-35825/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4132" ref_url="https://www.suse.com/security/cve/CVE-2023-4132/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-4206" ref_url="https://www.suse.com/security/cve/CVE-2023-4206/" source="CVE"/>
		<reference ref_id="CVE-2023-4207" ref_url="https://www.suse.com/security/cve/CVE-2023-4207/" source="CVE"/>
		<reference ref_id="CVE-2023-4208" ref_url="https://www.suse.com/security/cve/CVE-2023-4208/" source="CVE"/>
		<reference ref_id="CVE-2023-4732" ref_url="https://www.suse.com/security/cve/CVE-2023-4732/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-52734" ref_url="https://www.suse.com/security/cve/CVE-2023-52734/" source="CVE"/>
		<reference ref_id="CVE-2023-52931" ref_url="https://www.suse.com/security/cve/CVE-2023-52931/" source="CVE"/>
		<reference ref_id="CVE-2023-52937" ref_url="https://www.suse.com/security/cve/CVE-2023-52937/" source="CVE"/>
		<reference ref_id="CVE-2023-52938" ref_url="https://www.suse.com/security/cve/CVE-2023-52938/" source="CVE"/>
		<reference ref_id="CVE-2023-52977" ref_url="https://www.suse.com/security/cve/CVE-2023-52977/" source="CVE"/>
		<reference ref_id="CVE-2023-52981" ref_url="https://www.suse.com/security/cve/CVE-2023-52981/" source="CVE"/>
		<reference ref_id="CVE-2023-52991" ref_url="https://www.suse.com/security/cve/CVE-2023-52991/" source="CVE"/>
		<reference ref_id="CVE-2023-52997" ref_url="https://www.suse.com/security/cve/CVE-2023-52997/" source="CVE"/>
		<reference ref_id="CVE-2023-53002" ref_url="https://www.suse.com/security/cve/CVE-2023-53002/" source="CVE"/>
		<reference ref_id="CVE-2023-53009" ref_url="https://www.suse.com/security/cve/CVE-2023-53009/" source="CVE"/>
		<reference ref_id="CVE-2023-53010" ref_url="https://www.suse.com/security/cve/CVE-2023-53010/" source="CVE"/>
		<reference ref_id="CVE-2023-53013" ref_url="https://www.suse.com/security/cve/CVE-2023-53013/" source="CVE"/>
		<reference ref_id="CVE-2023-53015" ref_url="https://www.suse.com/security/cve/CVE-2023-53015/" source="CVE"/>
		<reference ref_id="CVE-2023-53021" ref_url="https://www.suse.com/security/cve/CVE-2023-53021/" source="CVE"/>
		<reference ref_id="CVE-2023-53026" ref_url="https://www.suse.com/security/cve/CVE-2023-53026/" source="CVE"/>
		<reference ref_id="CVE-2023-53028" ref_url="https://www.suse.com/security/cve/CVE-2023-53028/" source="CVE"/>
		<reference ref_id="CVE-2023-53036" ref_url="https://www.suse.com/security/cve/CVE-2023-53036/" source="CVE"/>
		<reference ref_id="CVE-2023-53039" ref_url="https://www.suse.com/security/cve/CVE-2023-53039/" source="CVE"/>
		<reference ref_id="CVE-2023-53042" ref_url="https://www.suse.com/security/cve/CVE-2023-53042/" source="CVE"/>
		<reference ref_id="CVE-2023-53044" ref_url="https://www.suse.com/security/cve/CVE-2023-53044/" source="CVE"/>
		<reference ref_id="CVE-2023-53050" ref_url="https://www.suse.com/security/cve/CVE-2023-53050/" source="CVE"/>
		<reference ref_id="CVE-2023-53051" ref_url="https://www.suse.com/security/cve/CVE-2023-53051/" source="CVE"/>
		<reference ref_id="CVE-2023-53056" ref_url="https://www.suse.com/security/cve/CVE-2023-53056/" source="CVE"/>
		<reference ref_id="CVE-2023-53058" ref_url="https://www.suse.com/security/cve/CVE-2023-53058/" source="CVE"/>
		<reference ref_id="CVE-2023-53060" ref_url="https://www.suse.com/security/cve/CVE-2023-53060/" source="CVE"/>
		<reference ref_id="CVE-2023-53071" ref_url="https://www.suse.com/security/cve/CVE-2023-53071/" source="CVE"/>
		<reference ref_id="CVE-2023-53077" ref_url="https://www.suse.com/security/cve/CVE-2023-53077/" source="CVE"/>
		<reference ref_id="CVE-2023-53078" ref_url="https://www.suse.com/security/cve/CVE-2023-53078/" source="CVE"/>
		<reference ref_id="CVE-2023-53079" ref_url="https://www.suse.com/security/cve/CVE-2023-53079/" source="CVE"/>
		<reference ref_id="CVE-2023-53084" ref_url="https://www.suse.com/security/cve/CVE-2023-53084/" source="CVE"/>
		<reference ref_id="CVE-2023-53085" ref_url="https://www.suse.com/security/cve/CVE-2023-53085/" source="CVE"/>
		<reference ref_id="CVE-2023-53086" ref_url="https://www.suse.com/security/cve/CVE-2023-53086/" source="CVE"/>
		<reference ref_id="CVE-2023-53087" ref_url="https://www.suse.com/security/cve/CVE-2023-53087/" source="CVE"/>
		<reference ref_id="CVE-2023-53090" ref_url="https://www.suse.com/security/cve/CVE-2023-53090/" source="CVE"/>
		<reference ref_id="CVE-2023-53095" ref_url="https://www.suse.com/security/cve/CVE-2023-53095/" source="CVE"/>
		<reference ref_id="CVE-2023-53102" ref_url="https://www.suse.com/security/cve/CVE-2023-53102/" source="CVE"/>
		<reference ref_id="CVE-2023-53105" ref_url="https://www.suse.com/security/cve/CVE-2023-53105/" source="CVE"/>
		<reference ref_id="CVE-2023-53108" ref_url="https://www.suse.com/security/cve/CVE-2023-53108/" source="CVE"/>
		<reference ref_id="CVE-2023-53110" ref_url="https://www.suse.com/security/cve/CVE-2023-53110/" source="CVE"/>
		<reference ref_id="CVE-2023-53112" ref_url="https://www.suse.com/security/cve/CVE-2023-53112/" source="CVE"/>
		<reference ref_id="CVE-2023-53113" ref_url="https://www.suse.com/security/cve/CVE-2023-53113/" source="CVE"/>
		<reference ref_id="CVE-2023-53120" ref_url="https://www.suse.com/security/cve/CVE-2023-53120/" source="CVE"/>
		<reference ref_id="CVE-2023-53124" ref_url="https://www.suse.com/security/cve/CVE-2023-53124/" source="CVE"/>
		<reference ref_id="CVE-2023-53126" ref_url="https://www.suse.com/security/cve/CVE-2023-53126/" source="CVE"/>
		<reference ref_id="CVE-2023-53132" ref_url="https://www.suse.com/security/cve/CVE-2023-53132/" source="CVE"/>
		<reference ref_id="CVE-2023-53147" ref_url="https://www.suse.com/security/cve/CVE-2023-53147/" source="CVE"/>
		<reference ref_id="CVE-2023-53185" ref_url="https://www.suse.com/security/cve/CVE-2023-53185/" source="CVE"/>
		<reference ref_id="CVE-2023-53188" ref_url="https://www.suse.com/security/cve/CVE-2023-53188/" source="CVE"/>
		<reference ref_id="CVE-2023-53197" ref_url="https://www.suse.com/security/cve/CVE-2023-53197/" source="CVE"/>
		<reference ref_id="CVE-2023-53211" ref_url="https://www.suse.com/security/cve/CVE-2023-53211/" source="CVE"/>
		<reference ref_id="CVE-2023-53213" ref_url="https://www.suse.com/security/cve/CVE-2023-53213/" source="CVE"/>
		<reference ref_id="CVE-2023-53229" ref_url="https://www.suse.com/security/cve/CVE-2023-53229/" source="CVE"/>
		<reference ref_id="CVE-2023-53232" ref_url="https://www.suse.com/security/cve/CVE-2023-53232/" source="CVE"/>
		<reference ref_id="CVE-2023-53233" ref_url="https://www.suse.com/security/cve/CVE-2023-53233/" source="CVE"/>
		<reference ref_id="CVE-2023-53241" ref_url="https://www.suse.com/security/cve/CVE-2023-53241/" source="CVE"/>
		<reference ref_id="CVE-2023-53245" ref_url="https://www.suse.com/security/cve/CVE-2023-53245/" source="CVE"/>
		<reference ref_id="CVE-2023-53254" ref_url="https://www.suse.com/security/cve/CVE-2023-53254/" source="CVE"/>
		<reference ref_id="CVE-2023-53288" ref_url="https://www.suse.com/security/cve/CVE-2023-53288/" source="CVE"/>
		<reference ref_id="CVE-2023-53296" ref_url="https://www.suse.com/security/cve/CVE-2023-53296/" source="CVE"/>
		<reference ref_id="CVE-2023-53299" ref_url="https://www.suse.com/security/cve/CVE-2023-53299/" source="CVE"/>
		<reference ref_id="CVE-2023-53320" ref_url="https://www.suse.com/security/cve/CVE-2023-53320/" source="CVE"/>
		<reference ref_id="CVE-2023-53359" ref_url="https://www.suse.com/security/cve/CVE-2023-53359/" source="CVE"/>
		<reference ref_id="CVE-2023-53372" ref_url="https://www.suse.com/security/cve/CVE-2023-53372/" source="CVE"/>
		<reference ref_id="CVE-2023-53376" ref_url="https://www.suse.com/security/cve/CVE-2023-53376/" source="CVE"/>
		<reference ref_id="CVE-2023-53390" ref_url="https://www.suse.com/security/cve/CVE-2023-53390/" source="CVE"/>
		<reference ref_id="CVE-2023-53398" ref_url="https://www.suse.com/security/cve/CVE-2023-53398/" source="CVE"/>
		<reference ref_id="CVE-2023-53400" ref_url="https://www.suse.com/security/cve/CVE-2023-53400/" source="CVE"/>
		<reference ref_id="CVE-2023-53409" ref_url="https://www.suse.com/security/cve/CVE-2023-53409/" source="CVE"/>
		<reference ref_id="CVE-2023-53410" ref_url="https://www.suse.com/security/cve/CVE-2023-53410/" source="CVE"/>
		<reference ref_id="CVE-2023-53421" ref_url="https://www.suse.com/security/cve/CVE-2023-53421/" source="CVE"/>
		<reference ref_id="CVE-2023-53422" ref_url="https://www.suse.com/security/cve/CVE-2023-53422/" source="CVE"/>
		<reference ref_id="CVE-2023-53430" ref_url="https://www.suse.com/security/cve/CVE-2023-53430/" source="CVE"/>
		<reference ref_id="CVE-2023-53431" ref_url="https://www.suse.com/security/cve/CVE-2023-53431/" source="CVE"/>
		<reference ref_id="CVE-2023-53437" ref_url="https://www.suse.com/security/cve/CVE-2023-53437/" source="CVE"/>
		<reference ref_id="CVE-2023-53443" ref_url="https://www.suse.com/security/cve/CVE-2023-53443/" source="CVE"/>
		<reference ref_id="CVE-2023-53453" ref_url="https://www.suse.com/security/cve/CVE-2023-53453/" source="CVE"/>
		<reference ref_id="CVE-2023-53466" ref_url="https://www.suse.com/security/cve/CVE-2023-53466/" source="CVE"/>
		<reference ref_id="CVE-2023-53512" ref_url="https://www.suse.com/security/cve/CVE-2023-53512/" source="CVE"/>
		<reference ref_id="CVE-2023-53517" ref_url="https://www.suse.com/security/cve/CVE-2023-53517/" source="CVE"/>
		<reference ref_id="CVE-2023-53521" ref_url="https://www.suse.com/security/cve/CVE-2023-53521/" source="CVE"/>
		<reference ref_id="CVE-2023-53524" ref_url="https://www.suse.com/security/cve/CVE-2023-53524/" source="CVE"/>
		<reference ref_id="CVE-2023-53532" ref_url="https://www.suse.com/security/cve/CVE-2023-53532/" source="CVE"/>
		<reference ref_id="CVE-2023-53553" ref_url="https://www.suse.com/security/cve/CVE-2023-53553/" source="CVE"/>
		<reference ref_id="CVE-2023-53556" ref_url="https://www.suse.com/security/cve/CVE-2023-53556/" source="CVE"/>
		<reference ref_id="CVE-2023-53575" ref_url="https://www.suse.com/security/cve/CVE-2023-53575/" source="CVE"/>
		<reference ref_id="CVE-2023-53578" ref_url="https://www.suse.com/security/cve/CVE-2023-53578/" source="CVE"/>
		<reference ref_id="CVE-2023-53582" ref_url="https://www.suse.com/security/cve/CVE-2023-53582/" source="CVE"/>
		<reference ref_id="CVE-2023-53591" ref_url="https://www.suse.com/security/cve/CVE-2023-53591/" source="CVE"/>
		<reference ref_id="CVE-2023-53594" ref_url="https://www.suse.com/security/cve/CVE-2023-53594/" source="CVE"/>
		<reference ref_id="CVE-2023-53598" ref_url="https://www.suse.com/security/cve/CVE-2023-53598/" source="CVE"/>
		<reference ref_id="CVE-2023-53602" ref_url="https://www.suse.com/security/cve/CVE-2023-53602/" source="CVE"/>
		<reference ref_id="CVE-2023-53605" ref_url="https://www.suse.com/security/cve/CVE-2023-53605/" source="CVE"/>
		<reference ref_id="CVE-2023-53607" ref_url="https://www.suse.com/security/cve/CVE-2023-53607/" source="CVE"/>
		<reference ref_id="CVE-2023-53620" ref_url="https://www.suse.com/security/cve/CVE-2023-53620/" source="CVE"/>
		<reference ref_id="CVE-2023-53624" ref_url="https://www.suse.com/security/cve/CVE-2023-53624/" source="CVE"/>
		<reference ref_id="CVE-2023-53625" ref_url="https://www.suse.com/security/cve/CVE-2023-53625/" source="CVE"/>
		<reference ref_id="CVE-2023-53639" ref_url="https://www.suse.com/security/cve/CVE-2023-53639/" source="CVE"/>
		<reference ref_id="CVE-2023-53641" ref_url="https://www.suse.com/security/cve/CVE-2023-53641/" source="CVE"/>
		<reference ref_id="CVE-2023-53646" ref_url="https://www.suse.com/security/cve/CVE-2023-53646/" source="CVE"/>
		<reference ref_id="CVE-2023-53675" ref_url="https://www.suse.com/security/cve/CVE-2023-53675/" source="CVE"/>
		<reference ref_id="CVE-2023-53677" ref_url="https://www.suse.com/security/cve/CVE-2023-53677/" source="CVE"/>
		<reference ref_id="CVE-2023-53678" ref_url="https://www.suse.com/security/cve/CVE-2023-53678/" source="CVE"/>
		<reference ref_id="CVE-2023-53679" ref_url="https://www.suse.com/security/cve/CVE-2023-53679/" source="CVE"/>
		<reference ref_id="CVE-2023-53710" ref_url="https://www.suse.com/security/cve/CVE-2023-53710/" source="CVE"/>
		<reference ref_id="CVE-2023-53717" ref_url="https://www.suse.com/security/cve/CVE-2023-53717/" source="CVE"/>
		<reference ref_id="CVE-2023-53753" ref_url="https://www.suse.com/security/cve/CVE-2023-53753/" source="CVE"/>
		<reference ref_id="CVE-2023-53755" ref_url="https://www.suse.com/security/cve/CVE-2023-53755/" source="CVE"/>
		<reference ref_id="CVE-2023-53764" ref_url="https://www.suse.com/security/cve/CVE-2023-53764/" source="CVE"/>
		<reference ref_id="CVE-2023-53765" ref_url="https://www.suse.com/security/cve/CVE-2023-53765/" source="CVE"/>
		<reference ref_id="CVE-2023-53767" ref_url="https://www.suse.com/security/cve/CVE-2023-53767/" source="CVE"/>
		<reference ref_id="CVE-2023-53769" ref_url="https://www.suse.com/security/cve/CVE-2023-53769/" source="CVE"/>
		<reference ref_id="CVE-2023-53780" ref_url="https://www.suse.com/security/cve/CVE-2023-53780/" source="CVE"/>
		<reference ref_id="CVE-2023-53786" ref_url="https://www.suse.com/security/cve/CVE-2023-53786/" source="CVE"/>
		<reference ref_id="CVE-2023-53793" ref_url="https://www.suse.com/security/cve/CVE-2023-53793/" source="CVE"/>
		<reference ref_id="CVE-2023-53803" ref_url="https://www.suse.com/security/cve/CVE-2023-53803/" source="CVE"/>
		<reference ref_id="CVE-2023-53816" ref_url="https://www.suse.com/security/cve/CVE-2023-53816/" source="CVE"/>
		<reference ref_id="CVE-2023-53832" ref_url="https://www.suse.com/security/cve/CVE-2023-53832/" source="CVE"/>
		<reference ref_id="CVE-2023-53844" ref_url="https://www.suse.com/security/cve/CVE-2023-53844/" source="CVE"/>
		<reference ref_id="CVE-2023-53866" ref_url="https://www.suse.com/security/cve/CVE-2023-53866/" source="CVE"/>
		<reference ref_id="CVE-2023-54011" ref_url="https://www.suse.com/security/cve/CVE-2023-54011/" source="CVE"/>
		<reference ref_id="CVE-2023-54015" ref_url="https://www.suse.com/security/cve/CVE-2023-54015/" source="CVE"/>
		<reference ref_id="CVE-2023-54029" ref_url="https://www.suse.com/security/cve/CVE-2023-54029/" source="CVE"/>
		<reference ref_id="CVE-2023-54036" ref_url="https://www.suse.com/security/cve/CVE-2023-54036/" source="CVE"/>
		<reference ref_id="CVE-2023-54037" ref_url="https://www.suse.com/security/cve/CVE-2023-54037/" source="CVE"/>
		<reference ref_id="CVE-2023-54040" ref_url="https://www.suse.com/security/cve/CVE-2023-54040/" source="CVE"/>
		<reference ref_id="CVE-2023-54053" ref_url="https://www.suse.com/security/cve/CVE-2023-54053/" source="CVE"/>
		<reference ref_id="CVE-2023-54055" ref_url="https://www.suse.com/security/cve/CVE-2023-54055/" source="CVE"/>
		<reference ref_id="CVE-2023-54071" ref_url="https://www.suse.com/security/cve/CVE-2023-54071/" source="CVE"/>
		<reference ref_id="CVE-2023-54074" ref_url="https://www.suse.com/security/cve/CVE-2023-54074/" source="CVE"/>
		<reference ref_id="CVE-2023-54091" ref_url="https://www.suse.com/security/cve/CVE-2023-54091/" source="CVE"/>
		<reference ref_id="CVE-2023-54098" ref_url="https://www.suse.com/security/cve/CVE-2023-54098/" source="CVE"/>
		<reference ref_id="CVE-2023-54102" ref_url="https://www.suse.com/security/cve/CVE-2023-54102/" source="CVE"/>
		<reference ref_id="CVE-2023-54108" ref_url="https://www.suse.com/security/cve/CVE-2023-54108/" source="CVE"/>
		<reference ref_id="CVE-2023-54123" ref_url="https://www.suse.com/security/cve/CVE-2023-54123/" source="CVE"/>
		<reference ref_id="CVE-2023-54131" ref_url="https://www.suse.com/security/cve/CVE-2023-54131/" source="CVE"/>
		<reference ref_id="CVE-2023-54144" ref_url="https://www.suse.com/security/cve/CVE-2023-54144/" source="CVE"/>
		<reference ref_id="CVE-2023-54191" ref_url="https://www.suse.com/security/cve/CVE-2023-54191/" source="CVE"/>
		<reference ref_id="CVE-2023-54202" ref_url="https://www.suse.com/security/cve/CVE-2023-54202/" source="CVE"/>
		<reference ref_id="CVE-2023-54206" ref_url="https://www.suse.com/security/cve/CVE-2023-54206/" source="CVE"/>
		<reference ref_id="CVE-2023-54216" ref_url="https://www.suse.com/security/cve/CVE-2023-54216/" source="CVE"/>
		<reference ref_id="CVE-2023-54233" ref_url="https://www.suse.com/security/cve/CVE-2023-54233/" source="CVE"/>
		<reference ref_id="CVE-2023-54234" ref_url="https://www.suse.com/security/cve/CVE-2023-54234/" source="CVE"/>
		<reference ref_id="CVE-2023-54238" ref_url="https://www.suse.com/security/cve/CVE-2023-54238/" source="CVE"/>
		<reference ref_id="CVE-2023-54259" ref_url="https://www.suse.com/security/cve/CVE-2023-54259/" source="CVE"/>
		<reference ref_id="CVE-2023-54262" ref_url="https://www.suse.com/security/cve/CVE-2023-54262/" source="CVE"/>
		<reference ref_id="CVE-2023-54265" ref_url="https://www.suse.com/security/cve/CVE-2023-54265/" source="CVE"/>
		<reference ref_id="CVE-2023-54270" ref_url="https://www.suse.com/security/cve/CVE-2023-54270/" source="CVE"/>
		<reference ref_id="CVE-2023-54275" ref_url="https://www.suse.com/security/cve/CVE-2023-54275/" source="CVE"/>
		<reference ref_id="CVE-2023-54286" ref_url="https://www.suse.com/security/cve/CVE-2023-54286/" source="CVE"/>
		<reference ref_id="CVE-2023-54294" ref_url="https://www.suse.com/security/cve/CVE-2023-54294/" source="CVE"/>
		<reference ref_id="CVE-2023-54300" ref_url="https://www.suse.com/security/cve/CVE-2023-54300/" source="CVE"/>
		<reference ref_id="CVE-2023-54308" ref_url="https://www.suse.com/security/cve/CVE-2023-54308/" source="CVE"/>
		<reference ref_id="CVE-2023-54317" ref_url="https://www.suse.com/security/cve/CVE-2023-54317/" source="CVE"/>
		<reference ref_id="CVE-2023-54321" ref_url="https://www.suse.com/security/cve/CVE-2023-54321/" source="CVE"/>
		<reference ref_id="CVE-2023-54325" ref_url="https://www.suse.com/security/cve/CVE-2023-54325/" source="CVE"/>
		<reference ref_id="CVE-2024-0443" ref_url="https://www.suse.com/security/cve/CVE-2024-0443/" source="CVE"/>
		<reference ref_id="CVE-2024-57876" ref_url="https://www.suse.com/security/cve/CVE-2024-57876/" source="CVE"/>
		<reference ref_id="CVE-2025-38393" ref_url="https://www.suse.com/security/cve/CVE-2025-38393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7077.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7077.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45869/">CVE-2022-45869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49080/">CVE-2022-49080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49080">CVE-2022-49080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49180/">CVE-2022-49180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49180">CVE-2022-49180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49356/">CVE-2022-49356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49356">CVE-2022-49356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49401/">CVE-2022-49401 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49401">CVE-2022-49401 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49492/">CVE-2022-49492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49492">CVE-2022-49492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49639/">CVE-2022-49639 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49639">CVE-2022-49639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49647/">CVE-2022-49647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49647">CVE-2022-49647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49675/">CVE-2022-49675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49675">CVE-2022-49675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49752/">CVE-2022-49752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49752">CVE-2022-49752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49773/">CVE-2022-49773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49773">CVE-2022-49773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49827/">CVE-2022-49827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49827">CVE-2022-49827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49853/">CVE-2022-49853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49853">CVE-2022-49853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49862/">CVE-2022-49862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49862">CVE-2022-49862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49864/">CVE-2022-49864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49864">CVE-2022-49864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49890/">CVE-2022-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49890">CVE-2022-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49903/">CVE-2022-49903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49903">CVE-2022-49903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49944/">CVE-2022-49944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49944">CVE-2022-49944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49995/">CVE-2022-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49995">CVE-2022-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50003/">CVE-2022-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50003">CVE-2022-50003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50046/">CVE-2022-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50046">CVE-2022-50046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50066/">CVE-2022-50066 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50066">CVE-2022-50066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50083/">CVE-2022-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50083">CVE-2022-50083 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50148/">CVE-2022-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50148">CVE-2022-50148 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50246/">CVE-2022-50246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50246">CVE-2022-50246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50247/">CVE-2022-50247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50247">CVE-2022-50247 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50258/">CVE-2022-50258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50258">CVE-2022-50258 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50269/">CVE-2022-50269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50269">CVE-2022-50269 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50275/">CVE-2022-50275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50275">CVE-2022-50275 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50279/">CVE-2022-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50279">CVE-2022-50279 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50287/">CVE-2022-50287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50287">CVE-2022-50287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50290/">CVE-2022-50290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50290">CVE-2022-50290 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50297/">CVE-2022-50297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50297">CVE-2022-50297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50303/">CVE-2022-50303 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50303">CVE-2022-50303 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50317/">CVE-2022-50317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50317">CVE-2022-50317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50318/">CVE-2022-50318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50318">CVE-2022-50318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50348/">CVE-2022-50348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50348">CVE-2022-50348 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50354/">CVE-2022-50354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50354">CVE-2022-50354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50356/">CVE-2022-50356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50356">CVE-2022-50356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50365/">CVE-2022-50365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50365">CVE-2022-50365 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50369/">CVE-2022-50369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50369">CVE-2022-50369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50385/">CVE-2022-50385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50385">CVE-2022-50385 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50388/">CVE-2022-50388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50388">CVE-2022-50388 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50389/">CVE-2022-50389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50389">CVE-2022-50389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50390/">CVE-2022-50390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50390">CVE-2022-50390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50393/">CVE-2022-50393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50393">CVE-2022-50393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50396/">CVE-2022-50396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50396">CVE-2022-50396 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50405/">CVE-2022-50405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50405">CVE-2022-50405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50406/">CVE-2022-50406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50406">CVE-2022-50406 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50412/">CVE-2022-50412 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50412">CVE-2022-50412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50440/">CVE-2022-50440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50440">CVE-2022-50440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50452/">CVE-2022-50452 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50452">CVE-2022-50452 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50464/">CVE-2022-50464 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50464">CVE-2022-50464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50470/">CVE-2022-50470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50470">CVE-2022-50470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50472/">CVE-2022-50472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50472">CVE-2022-50472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50473/">CVE-2022-50473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50473">CVE-2022-50473 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50475/">CVE-2022-50475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50475">CVE-2022-50475 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50479/">CVE-2022-50479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50479">CVE-2022-50479 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50489/">CVE-2022-50489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50489">CVE-2022-50489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50515/">CVE-2022-50515 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50515">CVE-2022-50515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50520/">CVE-2022-50520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50520">CVE-2022-50520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50527/">CVE-2022-50527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50527">CVE-2022-50527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50528/">CVE-2022-50528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50528">CVE-2022-50528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50532/">CVE-2022-50532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50532">CVE-2022-50532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50535/">CVE-2022-50535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50535">CVE-2022-50535 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50544/">CVE-2022-50544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50544">CVE-2022-50544 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50555/">CVE-2022-50555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50555">CVE-2022-50555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50556/">CVE-2022-50556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50556">CVE-2022-50556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50562/">CVE-2022-50562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50562">CVE-2022-50562 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50578/">CVE-2022-50578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50578">CVE-2022-50578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50617/">CVE-2022-50617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50617">CVE-2022-50617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50619/">CVE-2022-50619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50619">CVE-2022-50619 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50626/">CVE-2022-50626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50626">CVE-2022-50626 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50627/">CVE-2022-50627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50627">CVE-2022-50627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50628/">CVE-2022-50628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50628">CVE-2022-50628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50667/">CVE-2022-50667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50667">CVE-2022-50667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50677/">CVE-2022-50677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50677">CVE-2022-50677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50699/">CVE-2022-50699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50699">CVE-2022-50699 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50700/">CVE-2022-50700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50700">CVE-2022-50700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50701/">CVE-2022-50701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50701">CVE-2022-50701 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50710/">CVE-2022-50710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50710">CVE-2022-50710 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50717/">CVE-2022-50717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50717">CVE-2022-50717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50718/">CVE-2022-50718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50718">CVE-2022-50718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50728/">CVE-2022-50728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50728">CVE-2022-50728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50733/">CVE-2022-50733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50733">CVE-2022-50733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50735/">CVE-2022-50735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50735">CVE-2022-50735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50740/">CVE-2022-50740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50740">CVE-2022-50740 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50750/">CVE-2022-50750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50750">CVE-2022-50750 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50760/">CVE-2022-50760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50760">CVE-2022-50760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50778/">CVE-2022-50778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50778">CVE-2022-50778 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50781/">CVE-2022-50781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50781">CVE-2022-50781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50784/">CVE-2022-50784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50784">CVE-2022-50784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50809/">CVE-2022-50809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50809">CVE-2022-50809 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50816/">CVE-2022-50816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50816">CVE-2022-50816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50819/">CVE-2022-50819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50819">CVE-2022-50819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50822/">CVE-2022-50822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50822">CVE-2022-50822 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50824/">CVE-2022-50824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50824">CVE-2022-50824 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50829/">CVE-2022-50829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50829">CVE-2022-50829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50842/">CVE-2022-50842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50842">CVE-2022-50842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50844/">CVE-2022-50844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50844">CVE-2022-50844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50847/">CVE-2022-50847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50847">CVE-2022-50847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50861/">CVE-2022-50861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50861">CVE-2022-50861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50878/">CVE-2022-50878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50878">CVE-2022-50878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50881/">CVE-2022-50881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50881">CVE-2022-50881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50882/">CVE-2022-50882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50882">CVE-2022-50882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50884/">CVE-2022-50884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50884">CVE-2022-50884 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0458/">CVE-2023-0458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0458">CVE-2023-0458 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0597">CVE-2023-0597 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1073/">CVE-2023-1073 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1074/">CVE-2023-1074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1074">CVE-2023-1074 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1252/">CVE-2023-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1252">CVE-2023-1252 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23455/">CVE-2023-23455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28328/">CVE-2023-28328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28328">CVE-2023-28328 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28772/">CVE-2023-28772 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28772">CVE-2023-28772 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31436/">CVE-2023-31436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33203/">CVE-2023-33203 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33203">CVE-2023-33203 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33951/">CVE-2023-33951 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-33952/">CVE-2023-33952 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35823/">CVE-2023-35823 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35824/">CVE-2023-35824 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35825/">CVE-2023-35825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-35825">CVE-2023-35825 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4132/">CVE-2023-4132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4132">CVE-2023-4132 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4206/">CVE-2023-4206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4207/">CVE-2023-4207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4208/">CVE-2023-4208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4732/">CVE-2023-4732 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4732">CVE-2023-4732 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52734/">CVE-2023-52734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52734">CVE-2023-52734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52931/">CVE-2023-52931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52931">CVE-2023-52931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52937/">CVE-2023-52937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52937">CVE-2023-52937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52938/">CVE-2023-52938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52938">CVE-2023-52938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52977/">CVE-2023-52977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52977">CVE-2023-52977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52981/">CVE-2023-52981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52981">CVE-2023-52981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52991/">CVE-2023-52991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52991">CVE-2023-52991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52997/">CVE-2023-52997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52997">CVE-2023-52997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53002/">CVE-2023-53002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53002">CVE-2023-53002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53009/">CVE-2023-53009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53009">CVE-2023-53009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53010/">CVE-2023-53010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53010">CVE-2023-53010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53013/">CVE-2023-53013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53013">CVE-2023-53013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53015/">CVE-2023-53015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53015">CVE-2023-53015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53021/">CVE-2023-53021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53021">CVE-2023-53021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53026/">CVE-2023-53026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53026">CVE-2023-53026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53028/">CVE-2023-53028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53028">CVE-2023-53028 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53036/">CVE-2023-53036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53036">CVE-2023-53036 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53039/">CVE-2023-53039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53039">CVE-2023-53039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53042/">CVE-2023-53042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53042">CVE-2023-53042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53044/">CVE-2023-53044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53044">CVE-2023-53044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53050/">CVE-2023-53050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53050">CVE-2023-53050 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53051/">CVE-2023-53051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53051">CVE-2023-53051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53056/">CVE-2023-53056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53056">CVE-2023-53056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53058/">CVE-2023-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53058">CVE-2023-53058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53060/">CVE-2023-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53060">CVE-2023-53060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53071/">CVE-2023-53071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53071">CVE-2023-53071 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53077/">CVE-2023-53077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53077">CVE-2023-53077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53078/">CVE-2023-53078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53078">CVE-2023-53078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53079/">CVE-2023-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53079">CVE-2023-53079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53084/">CVE-2023-53084 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53084">CVE-2023-53084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53085/">CVE-2023-53085 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53085">CVE-2023-53085 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53086/">CVE-2023-53086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53086">CVE-2023-53086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53087/">CVE-2023-53087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53087">CVE-2023-53087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53090/">CVE-2023-53090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53090">CVE-2023-53090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53095/">CVE-2023-53095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53095">CVE-2023-53095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53102/">CVE-2023-53102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53102">CVE-2023-53102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53105/">CVE-2023-53105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53105">CVE-2023-53105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53108/">CVE-2023-53108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53108">CVE-2023-53108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53110/">CVE-2023-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53110">CVE-2023-53110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53112/">CVE-2023-53112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53112">CVE-2023-53112 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53113/">CVE-2023-53113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53113">CVE-2023-53113 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53120/">CVE-2023-53120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53120">CVE-2023-53120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53124/">CVE-2023-53124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53124">CVE-2023-53124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53126/">CVE-2023-53126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53126">CVE-2023-53126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53132/">CVE-2023-53132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53132">CVE-2023-53132 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53147/">CVE-2023-53147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53147">CVE-2023-53147 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53185/">CVE-2023-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53185">CVE-2023-53185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53188/">CVE-2023-53188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53188">CVE-2023-53188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53197/">CVE-2023-53197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53197">CVE-2023-53197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53211/">CVE-2023-53211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53211">CVE-2023-53211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53213/">CVE-2023-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53213">CVE-2023-53213 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53229/">CVE-2023-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53229">CVE-2023-53229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53232/">CVE-2023-53232 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53232">CVE-2023-53232 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53233/">CVE-2023-53233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53233">CVE-2023-53233 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53241/">CVE-2023-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53241">CVE-2023-53241 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53245/">CVE-2023-53245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53245">CVE-2023-53245 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53254/">CVE-2023-53254 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53254">CVE-2023-53254 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53288/">CVE-2023-53288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53288">CVE-2023-53288 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53296/">CVE-2023-53296 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53296">CVE-2023-53296 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53299/">CVE-2023-53299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53299">CVE-2023-53299 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53320/">CVE-2023-53320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53320">CVE-2023-53320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53359/">CVE-2023-53359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53359">CVE-2023-53359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53372/">CVE-2023-53372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53372">CVE-2023-53372 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53376/">CVE-2023-53376 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53376">CVE-2023-53376 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53390/">CVE-2023-53390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53390">CVE-2023-53390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53398/">CVE-2023-53398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53398">CVE-2023-53398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53400/">CVE-2023-53400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53400">CVE-2023-53400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53409/">CVE-2023-53409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53409">CVE-2023-53409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53410/">CVE-2023-53410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53410">CVE-2023-53410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53421/">CVE-2023-53421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53421">CVE-2023-53421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53422/">CVE-2023-53422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53422">CVE-2023-53422 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53430/">CVE-2023-53430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53430">CVE-2023-53430 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53431/">CVE-2023-53431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53431">CVE-2023-53431 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53437/">CVE-2023-53437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53437">CVE-2023-53437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53443/">CVE-2023-53443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53443">CVE-2023-53443 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53453/">CVE-2023-53453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53453">CVE-2023-53453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53466/">CVE-2023-53466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53466">CVE-2023-53466 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53512/">CVE-2023-53512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53512">CVE-2023-53512 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53517/">CVE-2023-53517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53517">CVE-2023-53517 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53521/">CVE-2023-53521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53521">CVE-2023-53521 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53524/">CVE-2023-53524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53524">CVE-2023-53524 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53532/">CVE-2023-53532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53532">CVE-2023-53532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53553/">CVE-2023-53553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53553">CVE-2023-53553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53556/">CVE-2023-53556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53556">CVE-2023-53556 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53575/">CVE-2023-53575 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53575">CVE-2023-53575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53578/">CVE-2023-53578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53578">CVE-2023-53578 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53582/">CVE-2023-53582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53582">CVE-2023-53582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53591/">CVE-2023-53591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53591">CVE-2023-53591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53594/">CVE-2023-53594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53594">CVE-2023-53594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53598/">CVE-2023-53598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53598">CVE-2023-53598 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53602/">CVE-2023-53602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53602">CVE-2023-53602 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53605/">CVE-2023-53605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53605">CVE-2023-53605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53607/">CVE-2023-53607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53607">CVE-2023-53607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53620/">CVE-2023-53620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53620">CVE-2023-53620 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53624/">CVE-2023-53624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53624">CVE-2023-53624 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53625/">CVE-2023-53625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53625">CVE-2023-53625 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53639/">CVE-2023-53639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53639">CVE-2023-53639 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53641/">CVE-2023-53641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53641">CVE-2023-53641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53646/">CVE-2023-53646 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53646">CVE-2023-53646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53675/">CVE-2023-53675 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53675">CVE-2023-53675 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53677/">CVE-2023-53677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53677">CVE-2023-53677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53678/">CVE-2023-53678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53678">CVE-2023-53678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53679/">CVE-2023-53679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53679">CVE-2023-53679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53710/">CVE-2023-53710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53710">CVE-2023-53710 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53717/">CVE-2023-53717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53717">CVE-2023-53717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53753/">CVE-2023-53753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53753">CVE-2023-53753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53755/">CVE-2023-53755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53755">CVE-2023-53755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53764/">CVE-2023-53764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53764">CVE-2023-53764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53765/">CVE-2023-53765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53765">CVE-2023-53765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53767/">CVE-2023-53767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53767">CVE-2023-53767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53769/">CVE-2023-53769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53769">CVE-2023-53769 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53780/">CVE-2023-53780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53780">CVE-2023-53780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53786/">CVE-2023-53786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53786">CVE-2023-53786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53793/">CVE-2023-53793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53793">CVE-2023-53793 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53803/">CVE-2023-53803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53803">CVE-2023-53803 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-53816/">CVE-2023-53816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53816">CVE-2023-53816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53832/">CVE-2023-53832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53832">CVE-2023-53832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53844/">CVE-2023-53844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53844">CVE-2023-53844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53866/">CVE-2023-53866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53866">CVE-2023-53866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54011/">CVE-2023-54011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54011">CVE-2023-54011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54015/">CVE-2023-54015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54015">CVE-2023-54015 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-54029/">CVE-2023-54029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54029">CVE-2023-54029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54036/">CVE-2023-54036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54036">CVE-2023-54036 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54037/">CVE-2023-54037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54037">CVE-2023-54037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54040/">CVE-2023-54040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54040">CVE-2023-54040 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54053/">CVE-2023-54053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54053">CVE-2023-54053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54055/">CVE-2023-54055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54055">CVE-2023-54055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54071/">CVE-2023-54071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54071">CVE-2023-54071 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54074/">CVE-2023-54074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54074">CVE-2023-54074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54091/">CVE-2023-54091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54091">CVE-2023-54091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54098/">CVE-2023-54098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54098">CVE-2023-54098 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54102/">CVE-2023-54102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54102">CVE-2023-54102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54108/">CVE-2023-54108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54108">CVE-2023-54108 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54123/">CVE-2023-54123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54123">CVE-2023-54123 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54131/">CVE-2023-54131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54131">CVE-2023-54131 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54144/">CVE-2023-54144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54144">CVE-2023-54144 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54191/">CVE-2023-54191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54191">CVE-2023-54191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54202/">CVE-2023-54202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54202">CVE-2023-54202 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54206/">CVE-2023-54206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54206">CVE-2023-54206 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54216/">CVE-2023-54216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54216">CVE-2023-54216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54233/">CVE-2023-54233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54233">CVE-2023-54233 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54234/">CVE-2023-54234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54234">CVE-2023-54234 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54238/">CVE-2023-54238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54238">CVE-2023-54238 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54259/">CVE-2023-54259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54259">CVE-2023-54259 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54262/">CVE-2023-54262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54262">CVE-2023-54262 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54265/">CVE-2023-54265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54265">CVE-2023-54265 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54270/">CVE-2023-54270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54270">CVE-2023-54270 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54275/">CVE-2023-54275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54275">CVE-2023-54275 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54286/">CVE-2023-54286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54286">CVE-2023-54286 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54294/">CVE-2023-54294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54294">CVE-2023-54294 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54300/">CVE-2023-54300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54300">CVE-2023-54300 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54308/">CVE-2023-54308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54308">CVE-2023-54308 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54317/">CVE-2023-54317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54317">CVE-2023-54317 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54321/">CVE-2023-54321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-54321">CVE-2023-54321 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54325/">CVE-2023-54325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54325">CVE-2023-54325 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0443/">CVE-2024-0443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0443">CVE-2024-0443 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57876/">CVE-2024-57876 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38393/">CVE-2025-38393 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843487" comment="bpftool-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843488" comment="kernel-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843489" comment="kernel-abi-stablelists-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843490" comment="kernel-core-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843491" comment="kernel-cross-headers-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843492" comment="kernel-debug-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843493" comment="kernel-debug-core-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843495" comment="kernel-debug-modules-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843496" comment="kernel-debug-modules-extra-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843498" comment="kernel-doc-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843499" comment="kernel-headers-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843500" comment="kernel-modules-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843501" comment="kernel-modules-extra-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843502" comment="kernel-tools-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843503" comment="kernel-tools-libs-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843505" comment="perf-4.18.0-513.5.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843506" comment="python3-perf-4.18.0-513.5.1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2770" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48337" ref_url="https://www.suse.com/security/cve/CVE-2022-48337/" source="CVE"/>
		<reference ref_id="CVE-2022-48339" ref_url="https://www.suse.com/security/cve/CVE-2022-48339/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48337/">CVE-2022-48337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48337">CVE-2022-48337 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48339/">CVE-2022-48339 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48339">CVE-2022-48339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843507" comment="emacs-26.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843508" comment="emacs-common-26.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843509" comment="emacs-filesystem-26.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843510" comment="emacs-lucid-26.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843511" comment="emacs-nox-26.1-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843512" comment="emacs-terminal-26.1-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2771" version="1" class="patch">
	<metadata>
		<title>security update for libmicrohttpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7090.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7090.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843513" comment="libmicrohttpd-0.9.59-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843514" comment="libmicrohttpd-devel-0.9.59-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843515" comment="libmicrohttpd-doc-0.9.59-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2772" version="1" class="patch">
	<metadata>
		<title>security update for python-cryptography (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7096.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7096.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843516" comment="python3-cryptography-3.2.1-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2773" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7109.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7109.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843517" comment="iwl100-firmware-39.31.5.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843518" comment="iwl1000-firmware-39.31.5.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843519" comment="iwl105-firmware-18.168.6.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843520" comment="iwl135-firmware-18.168.6.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843521" comment="iwl2000-firmware-18.168.6.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843522" comment="iwl2030-firmware-18.168.6.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843523" comment="iwl3160-firmware-25.30.13.0-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843524" comment="iwl3945-firmware-15.32.2.9-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843525" comment="iwl4965-firmware-228.61.2.24-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843526" comment="iwl5000-firmware-8.83.5.1_1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843527" comment="iwl5150-firmware-8.24.2.2-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843528" comment="iwl6000-firmware-9.221.4.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843529" comment="iwl6000g2a-firmware-18.168.6.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843530" comment="iwl6000g2b-firmware-18.168.6.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843531" comment="iwl6050-firmware-41.28.5.1-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843532" comment="iwl7260-firmware-25.30.13.0-119.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843533" comment="libertas-sd8686-firmware-20230824-119.git0e048b06.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843534" comment="libertas-sd8787-firmware-20230824-119.git0e048b06.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843535" comment="libertas-usb8388-firmware-20230824-119.git0e048b06.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843536" comment="libertas-usb8388-olpc-firmware-20230824-119.git0e048b06.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843537" comment="linux-firmware-20230824-119.git0e048b06.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2774" version="1" class="patch">
	<metadata>
		<title>security update for shadow-utils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7112.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7112.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843538" comment="shadow-utils-4.6-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843539" comment="shadow-utils-subid-4.6-19.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843540" comment="shadow-utils-subid-devel-4.6-19.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2775" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7116.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7116.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843541" comment="c-ares-1.13.0-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843542" comment="c-ares-devel-1.13.0-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2776" version="1" class="patch">
	<metadata>
		<title>Moderate: samba security, bug fix, and enhancement update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127/" source="CVE"/>
		<reference ref_id="CVE-2023-34966" ref_url="https://www.suse.com/security/cve/CVE-2023-34966/" source="CVE"/>
		<reference ref_id="CVE-2023-34967" ref_url="https://www.suse.com/security/cve/CVE-2023-34967/" source="CVE"/>
		<reference ref_id="CVE-2023-34968" ref_url="https://www.suse.com/security/cve/CVE-2023-34968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7139. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2023:7139.html		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34966/">CVE-2023-34966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34966">CVE-2023-34966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34967/">CVE-2023-34967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34967">CVE-2023-34967 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34968/">CVE-2023-34968 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34968">CVE-2023-34968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879799" comment="ctdb-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879800" comment="evolution-mapi-3.28.3-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879801" comment="evolution-mapi-langpacks-3.28.3-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879802" comment="libnetapi-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879803" comment="libsmbclient-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879804" comment="libwbclient-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879805" comment="openchange-2.3-32.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879806" comment="python3-samba-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879807" comment="python3-samba-dc-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879808" comment="python3-samba-test-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879809" comment="samba-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879810" comment="samba-client-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879811" comment="samba-client-libs-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879812" comment="samba-common-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879813" comment="samba-common-libs-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879814" comment="samba-common-tools-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879815" comment="samba-dc-libs-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879816" comment="samba-dcerpc-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879817" comment="samba-krb5-printing-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879818" comment="samba-ldb-ldap-modules-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879819" comment="samba-libs-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879820" comment="samba-pidl-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879821" comment="samba-test-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879822" comment="samba-test-libs-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879823" comment="samba-tools-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879824" comment="samba-usershares-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879825" comment="samba-vfs-iouring-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879826" comment="samba-winbind-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879827" comment="samba-winbind-clients-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879828" comment="samba-winbind-krb5-locator-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879829" comment="samba-winbind-modules-4.18.6-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879830" comment="samba-winexe-4.18.6-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2777" version="1" class="patch">
	<metadata>
		<title>security update for librabbitmq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-35789" ref_url="https://www.suse.com/security/cve/CVE-2023-35789/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-35789/">CVE-2023-35789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35789">CVE-2023-35789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843543" comment="librabbitmq-0.9.0-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843544" comment="librabbitmq-devel-0.9.0-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2778" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843545" comment="platform-python-3.6.8-56.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843546" comment="platform-python-debug-3.6.8-56.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843547" comment="platform-python-devel-3.6.8-56.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843548" comment="python3-idle-3.6.8-56.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843549" comment="python3-libs-3.6.8-56.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843550" comment="python3-test-3.6.8-56.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843551" comment="python3-tkinter-3.6.8-56.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2779" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7160.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7160.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843552" comment="opensc-0.20.0-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2780" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324/" source="CVE"/>
		<reference ref_id="CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7165.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7165.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843553" comment="cups-2.2.6-54.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843554" comment="cups-client-2.2.6-54.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843555" comment="cups-devel-2.2.6-54.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843556" comment="cups-filesystem-2.2.6-54.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843557" comment="cups-ipptool-2.2.6-54.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843558" comment="cups-libs-2.2.6-54.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843559" comment="cups-lpd-2.2.6-54.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2781" version="1" class="patch">
	<metadata>
		<title>security update for tpm2-tss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22745" ref_url="https://www.suse.com/security/cve/CVE-2023-22745/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7166.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7166.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22745/">CVE-2023-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22745">CVE-2023-22745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843560" comment="tpm2-tss-2.3.2-5.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843561" comment="tpm2-tss-devel-2.3.2-5.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2782" version="1" class="patch">
	<metadata>
		<title>security update for perl-HTTP-Tiny (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-31486" ref_url="https://www.suse.com/security/cve/CVE-2023-31486/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7174.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7174.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31486/">CVE-2023-31486 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31486">CVE-2023-31486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843562" comment="perl-HTTP-Tiny-0.074-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2783" version="1" class="patch">
	<metadata>
		<title>security update for python-pip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7176.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7176.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843563" comment="platform-python-pip-9.0.3-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843564" comment="python3-pip-9.0.3-23.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843565" comment="python3-pip-wheel-9.0.3-23.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2784" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3094" ref_url="https://www.suse.com/security/cve/CVE-2022-3094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7177.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7177.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3094/">CVE-2022-3094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3094">CVE-2022-3094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843566" comment="bind-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843567" comment="bind-chroot-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843568" comment="bind-devel-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843569" comment="bind-export-devel-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843570" comment="bind-export-libs-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843571" comment="bind-libs-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843572" comment="bind-libs-lite-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843573" comment="bind-license-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843574" comment="bind-lite-devel-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843575" comment="bind-pkcs11-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843576" comment="bind-pkcs11-devel-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843577" comment="bind-pkcs11-libs-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843578" comment="bind-pkcs11-utils-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843579" comment="bind-sdb-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843580" comment="bind-sdb-chroot-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843581" comment="bind-utils-9.11.36-11.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843582" comment="python3-bind-9.11.36-11.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2785" version="1" class="patch">
	<metadata>
		<title>security update for procps-ng (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7187.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7187.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843583" comment="procps-ng-3.3.15-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843584" comment="procps-ng-devel-3.3.15-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843585" comment="procps-ng-i18n-3.3.15-14.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2786" version="1" class="patch">
	<metadata>
		<title>security update for fwupd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3287" ref_url="https://www.suse.com/security/cve/CVE-2022-3287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7189.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7189.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3287/">CVE-2022-3287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3287">CVE-2022-3287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843586" comment="fwupd-1.7.8-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843587" comment="fwupd-devel-1.7.8-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2787" version="1" class="patch">
	<metadata>
		<title>security update for avahi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7190.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7190.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843588" comment="avahi-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843589" comment="avahi-autoipd-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843590" comment="avahi-compat-howl-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843591" comment="avahi-compat-howl-devel-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843592" comment="avahi-compat-libdns_sd-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843593" comment="avahi-compat-libdns_sd-devel-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843594" comment="avahi-devel-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843595" comment="avahi-glib-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843596" comment="avahi-glib-devel-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843597" comment="avahi-gobject-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843598" comment="avahi-gobject-devel-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843599" comment="avahi-libs-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843600" comment="avahi-tools-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843601" comment="avahi-ui-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843602" comment="avahi-ui-devel-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843603" comment="avahi-ui-gtk3-0.7-21.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843604" comment="python3-avahi-0.7-21.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2788" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38552" ref_url="https://www.suse.com/security/cve/CVE-2023-38552/" source="CVE"/>
		<reference ref_id="CVE-2023-39331" ref_url="https://www.suse.com/security/cve/CVE-2023-39331/" source="CVE"/>
		<reference ref_id="CVE-2023-39332" ref_url="https://www.suse.com/security/cve/CVE-2023-39332/" source="CVE"/>
		<reference ref_id="CVE-2023-39333" ref_url="https://www.suse.com/security/cve/CVE-2023-39333/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45143" ref_url="https://www.suse.com/security/cve/CVE-2023-45143/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7205.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7205.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38552/">CVE-2023-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38552">CVE-2023-38552 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39331/">CVE-2023-39331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39331">CVE-2023-39331 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39332/">CVE-2023-39332 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39332">CVE-2023-39332 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-39333/">CVE-2023-39333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39333">CVE-2023-39333 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45143/">CVE-2023-45143 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45143">CVE-2023-45143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843605" comment="nodejs-20.8.1-1.module+el8.9.0+20473+c4e3d824 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843606" comment="nodejs-devel-20.8.1-1.module+el8.9.0+20473+c4e3d824 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843607" comment="nodejs-docs-20.8.1-1.module+el8.9.0+20473+c4e3d824 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843608" comment="nodejs-full-i18n-20.8.1-1.module+el8.9.0+20473+c4e3d824 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843609" comment="nodejs-nodemon-3.0.1-1.module+el8.9.0+20473+c4e3d824 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843610" comment="nodejs-packaging-2021.06-4.module+el8.9.0+19519+e25b965a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843611" comment="nodejs-packaging-bundler-2021.06-4.module+el8.9.0+19519+e25b965a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843612" comment="npm-10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2789" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-22217" ref_url="https://www.suse.com/security/cve/CVE-2020-22217/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7207.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7207.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-22217/">CVE-2020-22217 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22217">CVE-2020-22217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843613" comment="c-ares-1.13.0-9.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843614" comment="c-ares-devel-1.13.0-9.el8_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2790" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46846" ref_url="https://www.suse.com/security/cve/CVE-2023-46846/" source="CVE"/>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7213.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7213.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46846/">CVE-2023-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46846">CVE-2023-46846 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850254" comment="libecap-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850255" comment="libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850256" comment="squid-4.15-7.module+el8.9.0+20571+8d39338b.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2791" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-36049" ref_url="https://www.suse.com/security/cve/CVE-2023-36049/" source="CVE"/>
		<reference ref_id="CVE-2023-36558" ref_url="https://www.suse.com/security/cve/CVE-2023-36558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7254.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7254.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36049/">CVE-2023-36049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36049">CVE-2023-36049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36558/">CVE-2023-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36558">CVE-2023-36558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843615" comment="aspnetcore-runtime-8.0-8.0.0-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843616" comment="aspnetcore-targeting-pack-8.0-8.0.0-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843617" comment="dotnet-8.0.100-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843618" comment="dotnet-apphost-pack-8.0-8.0.0-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843619" comment="dotnet-host-8.0.0-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843620" comment="dotnet-hostfxr-8.0-8.0.0-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843621" comment="dotnet-runtime-8.0-8.0.0-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843622" comment="dotnet-sdk-8.0-8.0.100-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843623" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843624" comment="dotnet-targeting-pack-8.0-8.0.0-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843625" comment="dotnet-templates-8.0-8.0.100-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843626" comment="netstandard-targeting-pack-2.1-8.0.100-2.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2792" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-36049" ref_url="https://www.suse.com/security/cve/CVE-2023-36049/" source="CVE"/>
		<reference ref_id="CVE-2023-36558" ref_url="https://www.suse.com/security/cve/CVE-2023-36558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7256.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7256.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36049/">CVE-2023-36049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36049">CVE-2023-36049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36558/">CVE-2023-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36558">CVE-2023-36558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843627" comment="aspnetcore-runtime-7.0-7.0.14-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843628" comment="aspnetcore-targeting-pack-7.0-7.0.14-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843629" comment="dotnet-apphost-pack-7.0-7.0.14-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843630" comment="dotnet-hostfxr-7.0-7.0.14-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843631" comment="dotnet-runtime-7.0-7.0.14-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843632" comment="dotnet-sdk-7.0-7.0.114-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843633" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843634" comment="dotnet-targeting-pack-7.0-7.0.14-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843635" comment="dotnet-templates-7.0-7.0.114-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2793" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-36049" ref_url="https://www.suse.com/security/cve/CVE-2023-36049/" source="CVE"/>
		<reference ref_id="CVE-2023-36558" ref_url="https://www.suse.com/security/cve/CVE-2023-36558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7258.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7258.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36049/">CVE-2023-36049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36049">CVE-2023-36049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36558/">CVE-2023-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36558">CVE-2023-36558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843636" comment="aspnetcore-runtime-6.0-6.0.25-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843637" comment="aspnetcore-targeting-pack-6.0-6.0.25-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843638" comment="dotnet-apphost-pack-6.0-6.0.25-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843639" comment="dotnet-hostfxr-6.0-6.0.25-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843640" comment="dotnet-runtime-6.0-6.0.25-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843641" comment="dotnet-sdk-6.0-6.0.125-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843642" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843643" comment="dotnet-targeting-pack-6.0-6.0.25-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843644" comment="dotnet-templates-6.0-6.0.125-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2794" version="1" class="patch">
	<metadata>
		<title>security update for samba (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3961" ref_url="https://www.suse.com/security/cve/CVE-2023-3961/" source="CVE"/>
		<reference ref_id="CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091/" source="CVE"/>
		<reference ref_id="CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7467.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7467.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3961/">CVE-2023-3961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3961">CVE-2023-3961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843645" comment="ctdb-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843646" comment="libnetapi-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843647" comment="libnetapi-devel-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843648" comment="libsmbclient-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843649" comment="libsmbclient-devel-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843650" comment="libwbclient-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843651" comment="libwbclient-devel-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843652" comment="python3-samba-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843653" comment="python3-samba-dc-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843654" comment="python3-samba-devel-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843655" comment="python3-samba-test-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843656" comment="samba-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843657" comment="samba-client-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843658" comment="samba-client-libs-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843659" comment="samba-common-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843660" comment="samba-common-libs-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843661" comment="samba-common-tools-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843662" comment="samba-dc-libs-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843663" comment="samba-dcerpc-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843664" comment="samba-devel-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843665" comment="samba-krb5-printing-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843666" comment="samba-ldb-ldap-modules-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843667" comment="samba-libs-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843668" comment="samba-pidl-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843669" comment="samba-test-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843670" comment="samba-test-libs-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843671" comment="samba-tools-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843672" comment="samba-usershares-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843673" comment="samba-vfs-iouring-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843674" comment="samba-winbind-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843675" comment="samba-winbind-clients-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843676" comment="samba-winbind-krb5-locator-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843677" comment="samba-winbind-modules-4.18.6-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843678" comment="samba-winexe-4.18.6-2.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2795" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7500.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7500.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843679" comment="thunderbird-115.5.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2796" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7508.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7508.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843680" comment="firefox-115.5.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2797" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163/" source="CVE"/>
		<reference ref_id="CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="CVE-2023-52562" ref_url="https://www.suse.com/security/cve/CVE-2023-52562/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7549.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7549.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52562/">CVE-2023-52562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52562">CVE-2023-52562 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843681" comment="bpftool-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843682" comment="kernel-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843683" comment="kernel-abi-stablelists-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843684" comment="kernel-core-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843685" comment="kernel-cross-headers-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843686" comment="kernel-debug-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843687" comment="kernel-debug-core-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843689" comment="kernel-debug-modules-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843690" comment="kernel-debug-modules-extra-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843692" comment="kernel-doc-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843693" comment="kernel-headers-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843694" comment="kernel-modules-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843695" comment="kernel-modules-extra-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843696" comment="kernel-tools-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843697" comment="kernel-tools-libs-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843699" comment="perf-4.18.0-513.9.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843700" comment="python3-perf-4.18.0-513.9.1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2798" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-42917" ref_url="https://www.suse.com/security/cve/CVE-2023-42917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7716.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7716.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42917/">CVE-2023-42917 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42917">CVE-2023-42917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843701" comment="webkit2gtk3-2.40.5-1.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843702" comment="webkit2gtk3-devel-2.40.5-1.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843703" comment="webkit2gtk3-jsc-2.40.5-1.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843704" comment="webkit2gtk3-jsc-devel-2.40.5-1.el8_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2799" version="1" class="patch">
	<metadata>
		<title>security update for tracker-miners (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5557" ref_url="https://www.suse.com/security/cve/CVE-2023-5557/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7732.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7732.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-5557/">CVE-2023-5557 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5557">CVE-2023-5557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843705" comment="tracker-miners-2.1.5-2.el8_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2800" version="1" class="patch">
	<metadata>
		<title>security update for avahi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469/" source="CVE"/>
		<reference ref_id="CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470/" source="CVE"/>
		<reference ref_id="CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471/" source="CVE"/>
		<reference ref_id="CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472/" source="CVE"/>
		<reference ref_id="CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7836.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7836.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843706" comment="avahi-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843707" comment="avahi-autoipd-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843708" comment="avahi-compat-howl-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843709" comment="avahi-compat-howl-devel-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843710" comment="avahi-compat-libdns_sd-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843711" comment="avahi-compat-libdns_sd-devel-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843712" comment="avahi-devel-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843713" comment="avahi-glib-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843714" comment="avahi-glib-devel-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843715" comment="avahi-gobject-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843716" comment="avahi-gobject-devel-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843717" comment="avahi-libs-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843718" comment="avahi-tools-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843719" comment="avahi-ui-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843720" comment="avahi-ui-devel-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843721" comment="avahi-ui-gtk3-0.7-21.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843722" comment="python3-avahi-0.7-21.el8_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2801" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7841.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7841.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843723" comment="gstreamer1-plugins-bad-free-1.16.1-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843724" comment="gstreamer1-plugins-bad-free-devel-1.16.1-2.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2802" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660/" source="CVE"/>
		<reference ref_id="CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7876.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7876.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843725" comment="opensc-0.20.0-7.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2803" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="CVE-2024-2408" ref_url="https://www.suse.com/security/cve/CVE-2024-2408/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7877.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7877.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2408/">CVE-2024-2408 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2408">CVE-2024-2408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843726" comment="openssl-1.1.1k-12.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843727" comment="openssl-devel-1.1.1k-12.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843728" comment="openssl-libs-1.1.1k-12.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843729" comment="openssl-perl-1.1.1k-12.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2804" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-50761" ref_url="https://www.suse.com/security/cve/CVE-2023-50761/" source="CVE"/>
		<reference ref_id="CVE-2023-50762" ref_url="https://www.suse.com/security/cve/CVE-2023-50762/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50761/">CVE-2023-50761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50761">CVE-2023-50761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50762/">CVE-2023-50762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50762">CVE-2023-50762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843730" comment="thunderbird-115.6.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2805" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865/" source="CVE"/>
		<reference ref_id="CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0012.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0012.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843731" comment="firefox-115.6.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2806" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0018.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0018.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843732" comment="tigervnc-1.13.1-2.el8_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843733" comment="tigervnc-icons-1.13.1-2.el8_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843734" comment="tigervnc-license-1.13.1-2.el8_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843735" comment="tigervnc-selinux-1.13.1-2.el8_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843736" comment="tigervnc-server-1.13.1-2.el8_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843737" comment="tigervnc-server-minimal-1.13.1-2.el8_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843738" comment="tigervnc-server-module-1.13.1-2.el8_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2807" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724/" source="CVE"/>
		<reference ref_id="CVE-2023-46728" ref_url="https://www.suse.com/security/cve/CVE-2023-46728/" source="CVE"/>
		<reference ref_id="CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285/" source="CVE"/>
		<reference ref_id="CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46728/">CVE-2023-46728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46728">CVE-2023-46728 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850254" comment="libecap-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850255" comment="libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850257" comment="squid-4.15-7.module+el8.9.0+20975+25f17541.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2808" version="1" class="patch">
	<metadata>
		<title>security update for nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0105.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0105.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843739" comment="nss-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843740" comment="nss-devel-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843741" comment="nss-softokn-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843742" comment="nss-softokn-devel-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843743" comment="nss-softokn-freebl-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843744" comment="nss-softokn-freebl-devel-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843745" comment="nss-sysinit-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843746" comment="nss-tools-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843747" comment="nss-util-3.90.0-4.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843748" comment="nss-util-devel-3.90.0-4.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2809" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-36402" ref_url="https://www.suse.com/security/cve/CVE-2022-36402/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36402/">CVE-2022-36402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36402">CVE-2022-36402 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843749" comment="bpftool-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843750" comment="kernel-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843751" comment="kernel-abi-stablelists-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843752" comment="kernel-core-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843753" comment="kernel-cross-headers-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843754" comment="kernel-debug-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843755" comment="kernel-debug-core-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843757" comment="kernel-debug-modules-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843758" comment="kernel-debug-modules-extra-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843760" comment="kernel-doc-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843761" comment="kernel-headers-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843762" comment="kernel-modules-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843763" comment="kernel-modules-extra-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843764" comment="kernel-tools-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843765" comment="kernel-tools-libs-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843767" comment="perf-4.18.0-513.11.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843768" comment="python3-perf-4.18.0-513.11.1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2810" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0116.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0116.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844460" comment="python3-urllib3-1.24.2-5.el8_9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2811" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0119.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0119.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844461" comment="libxml2-2.9.7-18.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844462" comment="libxml2-devel-2.9.7-18.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844463" comment="python3-libxml2-2.9.7-18.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2812" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38406" ref_url="https://www.suse.com/security/cve/CVE-2023-38406/" source="CVE"/>
		<reference ref_id="CVE-2023-38407" ref_url="https://www.suse.com/security/cve/CVE-2023-38407/" source="CVE"/>
		<reference ref_id="CVE-2023-47234" ref_url="https://www.suse.com/security/cve/CVE-2023-47234/" source="CVE"/>
		<reference ref_id="CVE-2023-47235" ref_url="https://www.suse.com/security/cve/CVE-2023-47235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0130.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0130.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38406/">CVE-2023-38406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38406">CVE-2023-38406 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38407/">CVE-2023-38407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38407">CVE-2023-38407 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47234/">CVE-2023-47234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47234">CVE-2023-47234 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47235/">CVE-2023-47235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47235">CVE-2023-47235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843769" comment="frr-7.5.1-13.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843770" comment="frr-selinux-7.5.1-13.el8_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2813" version="1" class="patch">
	<metadata>
		<title>security update for pixman (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0131.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0131.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844294" comment="pixman-0.38.4-3.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844295" comment="pixman-devel-0.38.4-3.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2814" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-37920" ref_url="https://www.suse.com/security/cve/CVE-2023-37920/" source="CVE"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0133.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0133.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37920/">CVE-2023-37920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874232" comment="fence-agents-aliyun-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874233" comment="fence-agents-all-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874234" comment="fence-agents-amt-ws-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874235" comment="fence-agents-apc-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874236" comment="fence-agents-apc-snmp-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874237" comment="fence-agents-aws-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874238" comment="fence-agents-azure-arm-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874239" comment="fence-agents-bladecenter-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874240" comment="fence-agents-brocade-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874241" comment="fence-agents-cisco-mds-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874242" comment="fence-agents-cisco-ucs-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874243" comment="fence-agents-common-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874244" comment="fence-agents-compute-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874245" comment="fence-agents-drac5-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874246" comment="fence-agents-eaton-snmp-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874247" comment="fence-agents-emerson-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874248" comment="fence-agents-eps-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874249" comment="fence-agents-gce-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874250" comment="fence-agents-heuristics-ping-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874251" comment="fence-agents-hpblade-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874252" comment="fence-agents-ibm-powervs-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874253" comment="fence-agents-ibm-vpc-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874254" comment="fence-agents-ibmblade-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874255" comment="fence-agents-ifmib-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874256" comment="fence-agents-ilo-moonshot-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874257" comment="fence-agents-ilo-mp-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874258" comment="fence-agents-ilo-ssh-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874259" comment="fence-agents-ilo2-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874260" comment="fence-agents-intelmodular-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874261" comment="fence-agents-ipdu-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874262" comment="fence-agents-ipmilan-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874263" comment="fence-agents-kdump-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874264" comment="fence-agents-kubevirt-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874265" comment="fence-agents-lpar-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874266" comment="fence-agents-mpath-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874267" comment="fence-agents-openstack-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874268" comment="fence-agents-redfish-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874269" comment="fence-agents-rhevm-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874270" comment="fence-agents-rsa-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874271" comment="fence-agents-rsb-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874272" comment="fence-agents-sbd-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874273" comment="fence-agents-scsi-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874274" comment="fence-agents-virsh-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874275" comment="fence-agents-vmware-rest-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874276" comment="fence-agents-vmware-soap-4.2.1-121.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874277" comment="fence-agents-wti-4.2.1-121.el8_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2815" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-0056" ref_url="https://www.suse.com/security/cve/CVE-2024-0056/" source="CVE"/>
		<reference ref_id="CVE-2024-0057" ref_url="https://www.suse.com/security/cve/CVE-2024-0057/" source="CVE"/>
		<reference ref_id="CVE-2024-21319" ref_url="https://www.suse.com/security/cve/CVE-2024-21319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0056/">CVE-2024-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0056">CVE-2024-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0057/">CVE-2024-0057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0057">CVE-2024-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21319/">CVE-2024-21319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21319">CVE-2024-21319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872168" comment="aspnetcore-runtime-8.0-8.0.1-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872169" comment="aspnetcore-targeting-pack-8.0-8.0.1-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872170" comment="dotnet-8.0.101-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872171" comment="dotnet-apphost-pack-8.0-8.0.1-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872172" comment="dotnet-host-8.0.1-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872173" comment="dotnet-hostfxr-8.0-8.0.1-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872174" comment="dotnet-runtime-8.0-8.0.1-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872175" comment="dotnet-sdk-8.0-8.0.101-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872176" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872177" comment="dotnet-targeting-pack-8.0-8.0.1-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872178" comment="dotnet-templates-8.0-8.0.101-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872179" comment="netstandard-targeting-pack-2.1-8.0.101-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2816" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0155.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0155.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843771" comment="gnutls-3.6.16-8.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843772" comment="gnutls-c++-3.6.16-8.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843773" comment="gnutls-dane-3.6.16-8.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843774" comment="gnutls-devel-3.6.16-8.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843775" comment="gnutls-utils-3.6.16-8.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2817" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46233" ref_url="https://www.suse.com/security/cve/CVE-2023-46233/" source="CVE"/>
		<reference ref_id="CVE-2024-0056" ref_url="https://www.suse.com/security/cve/CVE-2024-0056/" source="CVE"/>
		<reference ref_id="CVE-2024-0057" ref_url="https://www.suse.com/security/cve/CVE-2024-0057/" source="CVE"/>
		<reference ref_id="CVE-2024-21319" ref_url="https://www.suse.com/security/cve/CVE-2024-21319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0157.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0157.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46233/">CVE-2023-46233 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46233">CVE-2023-46233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0056/">CVE-2024-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0056">CVE-2024-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0057/">CVE-2024-0057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0057">CVE-2024-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21319/">CVE-2024-21319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21319">CVE-2024-21319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872419" comment="aspnetcore-runtime-7.0-7.0.15-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872420" comment="aspnetcore-targeting-pack-7.0-7.0.15-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872421" comment="dotnet-apphost-pack-7.0-7.0.15-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872422" comment="dotnet-hostfxr-7.0-7.0.15-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872423" comment="dotnet-runtime-7.0-7.0.15-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872424" comment="dotnet-sdk-7.0-7.0.115-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872425" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872426" comment="dotnet-targeting-pack-7.0-7.0.15-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872427" comment="dotnet-templates-7.0-7.0.115-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2818" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46233" ref_url="https://www.suse.com/security/cve/CVE-2023-46233/" source="CVE"/>
		<reference ref_id="CVE-2024-0056" ref_url="https://www.suse.com/security/cve/CVE-2024-0056/" source="CVE"/>
		<reference ref_id="CVE-2024-0057" ref_url="https://www.suse.com/security/cve/CVE-2024-0057/" source="CVE"/>
		<reference ref_id="CVE-2024-21319" ref_url="https://www.suse.com/security/cve/CVE-2024-21319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0158.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0158.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46233/">CVE-2023-46233 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46233">CVE-2023-46233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0056/">CVE-2024-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0056">CVE-2024-0056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0057/">CVE-2024-0057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0057">CVE-2024-0057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21319/">CVE-2024-21319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21319">CVE-2024-21319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843776" comment="aspnetcore-runtime-6.0-6.0.26-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843777" comment="aspnetcore-targeting-pack-6.0-6.0.26-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843778" comment="dotnet-apphost-pack-6.0-6.0.26-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843779" comment="dotnet-hostfxr-6.0-6.0.26-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843780" comment="dotnet-runtime-6.0-6.0.26-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843781" comment="dotnet-sdk-6.0-6.0.126-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843782" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843783" comment="dotnet-targeting-pack-6.0-6.0.26-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843784" comment="dotnet-templates-6.0-6.0.126-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2819" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0248.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0248.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843785" comment="java-21-openjdk-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843786" comment="java-21-openjdk-demo-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843787" comment="java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843788" comment="java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843789" comment="java-21-openjdk-devel-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843790" comment="java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843791" comment="java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843792" comment="java-21-openjdk-fastdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843793" comment="java-21-openjdk-headless-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843794" comment="java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843795" comment="java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843796" comment="java-21-openjdk-javadoc-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843797" comment="java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843798" comment="java-21-openjdk-jmods-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843799" comment="java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843800" comment="java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843801" comment="java-21-openjdk-slowdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843802" comment="java-21-openjdk-src-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843803" comment="java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843804" comment="java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843805" comment="java-21-openjdk-static-libs-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843806" comment="java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843807" comment="java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2820" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-7104" ref_url="https://www.suse.com/security/cve/CVE-2023-7104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0253.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0253.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-7104/">CVE-2023-7104 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7104">CVE-2023-7104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843808" comment="lemon-3.26.0-19.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843809" comment="sqlite-3.26.0-19.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843810" comment="sqlite-devel-3.26.0-19.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843811" comment="sqlite-doc-3.26.0-19.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843812" comment="sqlite-libs-3.26.0-19.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2821" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0256.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0256.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843813" comment="platform-python-3.6.8-56.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843814" comment="platform-python-debug-3.6.8-56.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843815" comment="platform-python-devel-3.6.8-56.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843816" comment="python3-idle-3.6.8-56.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843817" comment="python3-libs-3.6.8-56.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843818" comment="python3-test-3.6.8-56.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843819" comment="python3-tkinter-3.6.8-56.el8_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2822" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0265.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0265.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844464" comment="java-1.8.0-openjdk-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844465" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844466" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.402.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844467" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.402.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844468" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844469" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844470" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844471" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844472" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844473" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844474" comment="java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844475" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844476" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844477" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844478" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844479" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844480" comment="java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844481" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844482" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844483" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2823" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0266.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0266.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845119" comment="java-11-openjdk-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845120" comment="java-11-openjdk-demo-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845121" comment="java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845122" comment="java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845123" comment="java-11-openjdk-devel-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845124" comment="java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845125" comment="java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845126" comment="java-11-openjdk-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845127" comment="java-11-openjdk-headless-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845128" comment="java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845129" comment="java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845130" comment="java-11-openjdk-javadoc-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845131" comment="java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845132" comment="java-11-openjdk-jmods-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845133" comment="java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845134" comment="java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845135" comment="java-11-openjdk-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845136" comment="java-11-openjdk-src-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845137" comment="java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845138" comment="java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845139" comment="java-11-openjdk-static-libs-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845140" comment="java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845141" comment="java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2824" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20932" ref_url="https://www.suse.com/security/cve/CVE-2024-20932/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0267.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0267.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20932/">CVE-2024-20932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20932">CVE-2024-20932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849165" comment="java-17-openjdk-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849166" comment="java-17-openjdk-demo-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849167" comment="java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849168" comment="java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849169" comment="java-17-openjdk-devel-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849170" comment="java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849171" comment="java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849172" comment="java-17-openjdk-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849173" comment="java-17-openjdk-headless-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849174" comment="java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849175" comment="java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849176" comment="java-17-openjdk-javadoc-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849177" comment="java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849178" comment="java-17-openjdk-jmods-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849179" comment="java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849180" comment="java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849181" comment="java-17-openjdk-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849182" comment="java-17-openjdk-src-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849183" comment="java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849184" comment="java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849185" comment="java-17-openjdk-static-libs-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849186" comment="java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849187" comment="java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2825" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0539.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0539.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849870" comment="tomcat-9.0.62-27.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849871" comment="tomcat-admin-webapps-9.0.62-27.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849872" comment="tomcat-docs-webapp-9.0.62-27.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849873" comment="tomcat-el-3.0-api-9.0.62-27.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849874" comment="tomcat-jsp-2.3-api-9.0.62-27.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849875" comment="tomcat-lib-9.0.62-27.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849876" comment="tomcat-servlet-4.0-api-9.0.62-27.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849877" comment="tomcat-webapps-9.0.62-27.el8_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2826" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0606.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0606.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844788" comment="openssh-8.0p1-19.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844789" comment="openssh-askpass-8.0p1-19.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844790" comment="openssh-cavs-8.0p1-19.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844791" comment="openssh-clients-8.0p1-19.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844792" comment="openssh-keycat-8.0p1-19.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844793" comment="openssh-ldap-8.0p1-19.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844794" comment="openssh-server-8.0p1-19.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844795" comment="pam_ssh_agent_auth-0.10.3-7.19.el8_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2827" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0607.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0607.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846258" comment="tigervnc-1.13.1-2.el8_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846259" comment="tigervnc-icons-1.13.1-2.el8_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846260" comment="tigervnc-license-1.13.1-2.el8_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846261" comment="tigervnc-selinux-1.13.1-2.el8_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846262" comment="tigervnc-server-1.13.1-2.el8_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846263" comment="tigervnc-server-minimal-1.13.1-2.el8_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846264" comment="tigervnc-server-module-1.13.1-2.el8_9.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2828" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0608.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0608.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845276" comment="firefox-115.7.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2829" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0609.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0609.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845277" comment="thunderbird-115.7.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2830" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0627.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0627.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845142" comment="gnutls-3.6.16-8.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845143" comment="gnutls-c++-3.6.16-8.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845144" comment="gnutls-dane-3.6.16-8.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845145" comment="gnutls-devel-3.6.16-8.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845146" comment="gnutls-utils-3.6.16-8.el8_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2831" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0628.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0628.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845147" comment="libssh-0.9.6-13.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845148" comment="libssh-config-0.9.6-13.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845149" comment="libssh-devel-0.9.6-13.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2832" version="1" class="patch">
	<metadata>
		<title>security update for rpm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-35937" ref_url="https://www.suse.com/security/cve/CVE-2021-35937/" source="CVE"/>
		<reference ref_id="CVE-2021-35938" ref_url="https://www.suse.com/security/cve/CVE-2021-35938/" source="CVE"/>
		<reference ref_id="CVE-2021-35939" ref_url="https://www.suse.com/security/cve/CVE-2021-35939/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0647.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0647.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35937/">CVE-2021-35937 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35937">CVE-2021-35937 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35938/">CVE-2021-35938 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35938">CVE-2021-35938 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35939/">CVE-2021-35939 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35939">CVE-2021-35939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845278" comment="python3-rpm-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845279" comment="rpm-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845280" comment="rpm-apidocs-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845281" comment="rpm-build-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845282" comment="rpm-build-libs-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845283" comment="rpm-cron-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845284" comment="rpm-devel-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845285" comment="rpm-libs-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845286" comment="rpm-plugin-fapolicyd-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845287" comment="rpm-plugin-ima-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845288" comment="rpm-plugin-prioreset-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845289" comment="rpm-plugin-selinux-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845290" comment="rpm-plugin-syslog-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845291" comment="rpm-plugin-systemd-inhibit-4.14.3-28.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845292" comment="rpm-sign-4.14.3-28.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2833" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0752.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0752.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846325" comment="aardvark-dns-1.7.0-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846326" comment="buildah-1.31.3-3.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846327" comment="buildah-tests-1.31.3-3.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846328" comment="cockpit-podman-75-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846329" comment="conmon-2.1.8-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846330" comment="container-selinux-2.221.0-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846331" comment="containernetworking-plugins-1.3.0-8.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846332" comment="containers-common-1-71.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846333" comment="crit-3.18-4.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846334" comment="criu-3.18-4.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846335" comment="criu-devel-3.18-4.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846336" comment="criu-libs-3.18-4.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846337" comment="crun-1.8.7-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846338" comment="fuse-overlayfs-1.12-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846339" comment="libslirp-4.4.0-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846340" comment="libslirp-devel-4.4.0-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846341" comment="netavark-1.7.0-2.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846342" comment="oci-seccomp-bpf-hook-1.2.9-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846343" comment="podman-4.6.1-8.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846344" comment="podman-catatonit-4.6.1-8.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846345" comment="podman-docker-4.6.1-8.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846346" comment="podman-gvproxy-4.6.1-8.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846347" comment="podman-plugins-4.6.1-8.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846348" comment="podman-remote-4.6.1-8.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846349" comment="podman-tests-4.6.1-8.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846350" comment="python3-criu-3.18-4.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846351" comment="python3-podman-4.6.0-2.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846352" comment="runc-1.1.12-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846353" comment="skopeo-1.13.3-3.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846354" comment="skopeo-tests-1.13.3-3.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846355" comment="slirp4netns-1.2.1-1.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846356" comment="toolbox-0.0.99.4-5.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846357" comment="toolbox-tests-0.0.99.4-5.module+el8.9.0+21243+a586538b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846358" comment="udica-0.2.6-20.module+el8.9.0+21243+a586538b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2834" version="1" class="patch">
	<metadata>
		<title>security update for libmaxminddb (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-28241" ref_url="https://www.suse.com/security/cve/CVE-2020-28241/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0768.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0768.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28241/">CVE-2020-28241 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28241">CVE-2020-28241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849188" comment="libmaxminddb-1.2.0-10.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849189" comment="libmaxminddb-devel-1.2.0-10.el8_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2835" version="1" class="patch">
	<metadata>
		<title>security update for tcpdump (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-41043" ref_url="https://www.suse.com/security/cve/CVE-2021-41043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0769.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0769.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41043/">CVE-2021-41043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41043">CVE-2021-41043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865913" comment="tcpdump-4.9.3-3.el8_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2836" version="1" class="patch">
	<metadata>
		<title>security update for nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6135" ref_url="https://www.suse.com/security/cve/CVE-2023-6135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0786.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0786.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6135/">CVE-2023-6135 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6135">CVE-2023-6135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848842" comment="nss-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848843" comment="nss-devel-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848844" comment="nss-softokn-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848845" comment="nss-softokn-devel-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848846" comment="nss-softokn-freebl-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848847" comment="nss-softokn-freebl-devel-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848848" comment="nss-sysinit-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848849" comment="nss-tools-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848850" comment="nss-util-3.90.0-6.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848851" comment="nss-util-devel-3.90.0-6.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2837" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46233" ref_url="https://www.suse.com/security/cve/CVE-2023-46233/" source="CVE"/>
		<reference ref_id="CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386/" source="CVE"/>
		<reference ref_id="CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0806.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0806.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46233/">CVE-2023-46233 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46233">CVE-2023-46233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872180" comment="aspnetcore-runtime-7.0-7.0.16-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872181" comment="aspnetcore-targeting-pack-7.0-7.0.16-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872182" comment="dotnet-apphost-pack-7.0-7.0.16-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872183" comment="dotnet-hostfxr-7.0-7.0.16-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872184" comment="dotnet-runtime-7.0-7.0.16-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872185" comment="dotnet-sdk-7.0-7.0.116-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872186" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872187" comment="dotnet-targeting-pack-7.0-7.0.16-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872188" comment="dotnet-templates-7.0-7.0.116-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2838" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386/" source="CVE"/>
		<reference ref_id="CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0808.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0808.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846359" comment="aspnetcore-runtime-6.0-6.0.27-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846360" comment="aspnetcore-targeting-pack-6.0-6.0.27-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846361" comment="dotnet-apphost-pack-6.0-6.0.27-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846362" comment="dotnet-hostfxr-6.0-6.0.27-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846363" comment="dotnet-runtime-6.0-6.0.27-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846364" comment="dotnet-sdk-6.0-6.0.127-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846365" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846366" comment="dotnet-targeting-pack-6.0-6.0.27-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846367" comment="dotnet-templates-6.0-6.0.127-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2839" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28486" ref_url="https://www.suse.com/security/cve/CVE-2023-28486/" source="CVE"/>
		<reference ref_id="CVE-2023-28487" ref_url="https://www.suse.com/security/cve/CVE-2023-28487/" source="CVE"/>
		<reference ref_id="CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0811.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0811.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28486/">CVE-2023-28486 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28487/">CVE-2023-28487 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848258" comment="sudo-1.9.5p2-10.el9_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848259" comment="sudo-python-plugin-1.9.5p2-10.el9_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2840" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386/" source="CVE"/>
		<reference ref_id="CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872428" comment="aspnetcore-runtime-8.0-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872429" comment="aspnetcore-runtime-dbg-8.0-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872430" comment="aspnetcore-targeting-pack-8.0-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872431" comment="dotnet-8.0.102-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872432" comment="dotnet-apphost-pack-8.0-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872433" comment="dotnet-host-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872434" comment="dotnet-hostfxr-8.0-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872435" comment="dotnet-runtime-8.0-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872436" comment="dotnet-runtime-dbg-8.0-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872437" comment="dotnet-sdk-8.0-8.0.102-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872438" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872439" comment="dotnet-sdk-dbg-8.0-8.0.102-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872440" comment="dotnet-targeting-pack-8.0-8.0.2-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872441" comment="dotnet-templates-8.0-8.0.102-2.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872442" comment="netstandard-targeting-pack-2.1-8.0.102-2.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2841" version="1" class="patch">
	<metadata>
		<title>security update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0887.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0887.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848852" comment="delve-1.20.2-1.module+el8.9.0+18926+5193682d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848853" comment="go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848854" comment="golang-1.20.12-2.module+el8.9.0+21033+5795bdf6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848855" comment="golang-bin-1.20.12-2.module+el8.9.0+21033+5795bdf6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848856" comment="golang-docs-1.20.12-2.module+el8.9.0+21033+5795bdf6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848857" comment="golang-misc-1.20.12-2.module+el8.9.0+21033+5795bdf6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848858" comment="golang-src-1.20.12-2.module+el8.9.0+21033+5795bdf6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848859" comment="golang-tests-1.20.12-2.module+el8.9.0+21033+5795bdf6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2842" version="1" class="patch">
	<metadata>
		<title>security update for oniguruma (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13224" ref_url="https://www.suse.com/security/cve/CVE-2019-13224/" source="CVE"/>
		<reference ref_id="CVE-2019-16163" ref_url="https://www.suse.com/security/cve/CVE-2019-16163/" source="CVE"/>
		<reference ref_id="CVE-2019-19012" ref_url="https://www.suse.com/security/cve/CVE-2019-19012/" source="CVE"/>
		<reference ref_id="CVE-2019-19203" ref_url="https://www.suse.com/security/cve/CVE-2019-19203/" source="CVE"/>
		<reference ref_id="CVE-2019-19204" ref_url="https://www.suse.com/security/cve/CVE-2019-19204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0889.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0889.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13224/">CVE-2019-13224 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13224">CVE-2019-13224 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16163/">CVE-2019-16163 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16163">CVE-2019-16163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19012/">CVE-2019-19012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-19012">CVE-2019-19012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19203/">CVE-2019-19203 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19203">CVE-2019-19203 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19204/">CVE-2019-19204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19204">CVE-2019-19204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848860" comment="oniguruma-6.8.2-2.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848861" comment="oniguruma-devel-6.8.2-2.1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2843" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0893.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0893.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848862" comment="python3-pillow-5.1.1-18.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848863" comment="python3-pillow-devel-5.1.1-18.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848864" comment="python3-pillow-doc-5.1.1-18.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848865" comment="python3-pillow-tk-5.1.1-18.el8_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2844" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545/" source="CVE"/>
		<reference ref_id="CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858/" source="CVE"/>
		<reference ref_id="CVE-2023-1073" ref_url="https://www.suse.com/security/cve/CVE-2023-1073/" source="CVE"/>
		<reference ref_id="CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2024-0646" ref_url="https://www.suse.com/security/cve/CVE-2024-0646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0897.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0897.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1073/">CVE-2023-1073 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0646/">CVE-2024-0646 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848866" comment="bpftool-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848867" comment="kernel-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848868" comment="kernel-abi-stablelists-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848869" comment="kernel-core-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848870" comment="kernel-cross-headers-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848871" comment="kernel-debug-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848872" comment="kernel-debug-core-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848874" comment="kernel-debug-modules-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848875" comment="kernel-debug-modules-extra-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848877" comment="kernel-doc-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848878" comment="kernel-headers-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848879" comment="kernel-modules-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848880" comment="kernel-modules-extra-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848881" comment="kernel-tools-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848882" comment="kernel-tools-libs-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848884" comment="perf-4.18.0-513.18.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848885" comment="python3-perf-4.18.0-513.18.1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2845" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0955.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0955.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849190" comment="firefox-115.8.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2846" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0964.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0964.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849710" comment="thunderbird-115.8.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2847" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0965.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0965.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849485" comment="python3-unbound-1.16.2-5.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849486" comment="unbound-1.16.2-5.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849487" comment="unbound-devel-1.16.2-5.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849488" comment="unbound-libs-1.16.2-5.el8_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2848" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0967.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0967.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849489" comment="opensc-0.20.0-8.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2849" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0973.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0973.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850258" comment="pg_repack-1.4.8-1.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850259" comment="pgaudit-1.7.0-1.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850260" comment="postgres-decoderbufs-1.9.7-1.Final.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850261" comment="postgresql-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850262" comment="postgresql-contrib-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850263" comment="postgresql-docs-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850264" comment="postgresql-plperl-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850265" comment="postgresql-plpython3-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850266" comment="postgresql-pltcl-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850267" comment="postgresql-private-devel-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850268" comment="postgresql-private-libs-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850269" comment="postgresql-server-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850270" comment="postgresql-server-devel-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850271" comment="postgresql-static-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850272" comment="postgresql-test-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850273" comment="postgresql-test-rpm-macros-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850274" comment="postgresql-upgrade-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850275" comment="postgresql-upgrade-devel-15.6-1.module+el8.9.0+21287+d0eecfe6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2850" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-27399" ref_url="https://www.suse.com/security/cve/CVE-2024-27399/" source="CVE"/>
		<reference ref_id="CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564/" source="CVE"/>
		<reference ref_id="CVE-2024-46858" ref_url="https://www.suse.com/security/cve/CVE-2024-46858/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27399/">CVE-2024-27399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27399">CVE-2024-27399 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46858/">CVE-2024-46858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46858">CVE-2024-46858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954958" comment="bpftool-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954959" comment="kernel-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954960" comment="kernel-abi-stablelists-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954961" comment="kernel-core-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954962" comment="kernel-cross-headers-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954963" comment="kernel-debug-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954964" comment="kernel-debug-core-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954966" comment="kernel-debug-modules-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954967" comment="kernel-debug-modules-extra-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954969" comment="kernel-doc-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954970" comment="kernel-headers-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954971" comment="kernel-modules-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954972" comment="kernel-modules-extra-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954973" comment="kernel-tools-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954974" comment="kernel-tools-libs-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954976" comment="perf-4.18.0-553.30.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954977" comment="python3-perf-4.18.0-553.30.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2851" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024/" source="CVE"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10289.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10289.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4024">CVE-2021-4024 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954978" comment="aardvark-dns-1.10.1-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954979" comment="buildah-1.33.11-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954980" comment="buildah-tests-1.33.11-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954981" comment="cockpit-podman-84.1-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954982" comment="conmon-2.1.10-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954983" comment="container-selinux-2.229.0-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954984" comment="containernetworking-plugins-1.4.0-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954985" comment="containers-common-1-82.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954986" comment="crit-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954987" comment="criu-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954988" comment="criu-devel-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954989" comment="criu-libs-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954990" comment="crun-1.14.3-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954991" comment="fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954992" comment="libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954993" comment="libslirp-devel-4.4.0-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954994" comment="netavark-1.10.3-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954995" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954996" comment="podman-4.9.4-18.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954997" comment="podman-catatonit-4.9.4-18.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954998" comment="podman-docker-4.9.4-18.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954999" comment="podman-gvproxy-4.9.4-18.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955000" comment="podman-plugins-4.9.4-18.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955001" comment="podman-remote-4.9.4-18.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955002" comment="podman-tests-4.9.4-18.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955003" comment="python3-criu-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955004" comment="python3-podman-4.9.0-3.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955005" comment="runc-1.1.12-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955006" comment="skopeo-1.14.5-3.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955007" comment="skopeo-tests-1.14.5-3.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955008" comment="slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955009" comment="toolbox-0.0.99.5-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955010" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955011" comment="udica-0.2.6-21.module+el8.10.0+22417+2fb00970 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2852" version="1" class="patch">
	<metadata>
		<title>security update for pam (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-10041" ref_url="https://www.suse.com/security/cve/CVE-2024-10041/" source="CVE"/>
		<reference ref_id="CVE-2024-10963" ref_url="https://www.suse.com/security/cve/CVE-2024-10963/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10379.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10379.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10041/">CVE-2024-10041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">CVE-2024-10041 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10963/">CVE-2024-10963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10963">CVE-2024-10963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955012" comment="pam-1.3.1-36.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955013" comment="pam-devel-1.3.1-36.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2853" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-23254" ref_url="https://www.suse.com/security/cve/CVE-2024-23254/" source="CVE"/>
		<reference ref_id="CVE-2024-23263" ref_url="https://www.suse.com/security/cve/CVE-2024-23263/" source="CVE"/>
		<reference ref_id="CVE-2024-23280" ref_url="https://www.suse.com/security/cve/CVE-2024-23280/" source="CVE"/>
		<reference ref_id="CVE-2024-23284" ref_url="https://www.suse.com/security/cve/CVE-2024-23284/" source="CVE"/>
		<reference ref_id="CVE-2024-44309" ref_url="https://www.suse.com/security/cve/CVE-2024-44309/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10481.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10481.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23254/">CVE-2024-23254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23254">CVE-2024-23254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23263/">CVE-2024-23263 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23263">CVE-2024-23263 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23280/">CVE-2024-23280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23280">CVE-2024-23280 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23284/">CVE-2024-23284 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23284">CVE-2024-23284 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-44309/">CVE-2024-44309 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44309">CVE-2024-44309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955236" comment="webkit2gtk3-2.46.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955237" comment="webkit2gtk3-devel-2.46.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955238" comment="webkit2gtk3-jsc-2.46.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955239" comment="webkit2gtk3-jsc-devel-2.46.3-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2854" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11159" ref_url="https://www.suse.com/security/cve/CVE-2024-11159/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11159/">CVE-2024-11159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11159">CVE-2024-11159 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957048" comment="thunderbird-128.5.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2855" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10752.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10752.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956874" comment="firefox-128.5.1-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2856" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10779.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10779.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956562" comment="platform-python-3.6.8-69.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956563" comment="platform-python-debug-3.6.8-69.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956564" comment="platform-python-devel-3.6.8-69.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956565" comment="python3-idle-3.6.8-69.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956566" comment="python3-libs-3.6.8-69.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956567" comment="python3-test-3.6.8-69.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956568" comment="python3-tkinter-3.6.8-69.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2857" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10831.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10831.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956875" comment="pg_repack-1.5.1-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881424" comment="pgaudit-16.0-1.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881425" comment="postgres-decoderbufs-2.4.0-1.Final.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956876" comment="postgresql-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956877" comment="postgresql-contrib-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956878" comment="postgresql-docs-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956879" comment="postgresql-plperl-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956880" comment="postgresql-plpython3-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956881" comment="postgresql-pltcl-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956882" comment="postgresql-private-devel-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956883" comment="postgresql-private-libs-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956884" comment="postgresql-server-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956885" comment="postgresql-server-devel-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956886" comment="postgresql-static-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956887" comment="postgresql-test-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956888" comment="postgresql-test-rpm-macros-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956889" comment="postgresql-upgrade-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956890" comment="postgresql-upgrade-devel-16.6-1.module+el8.10.0+22551+c0330dc9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2858" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-49761" ref_url="https://www.suse.com/security/cve/CVE-2024-49761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49761/">CVE-2024-49761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49761">CVE-2024-49761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957049" comment="ruby-3.1.5-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957050" comment="ruby-bundled-gems-3.1.5-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957051" comment="ruby-default-gems-3.1.5-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957052" comment="ruby-devel-3.1.5-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957053" comment="ruby-doc-3.1.5-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957054" comment="ruby-libs-3.1.5-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874596" comment="rubygem-abrt-0.4.0-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874597" comment="rubygem-abrt-doc-0.4.0-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957055" comment="rubygem-bigdecimal-3.1.1-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957056" comment="rubygem-bundler-2.3.27-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957057" comment="rubygem-io-console-0.5.11-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957058" comment="rubygem-irb-1.4.1-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957059" comment="rubygem-json-2.6.1-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957060" comment="rubygem-minitest-5.15.0-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874604" comment="rubygem-mysql2-0.5.3-3.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874605" comment="rubygem-mysql2-doc-0.5.3-3.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874606" comment="rubygem-pg-1.3.2-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874607" comment="rubygem-pg-doc-1.3.2-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957061" comment="rubygem-power_assert-2.0.1-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957062" comment="rubygem-psych-4.0.4-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957063" comment="rubygem-rake-13.0.6-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957064" comment="rubygem-rbs-2.7.0-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957065" comment="rubygem-rdoc-6.4.1.1-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957066" comment="rubygem-rexml-3.2.5-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957067" comment="rubygem-rss-0.2.9-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957068" comment="rubygem-test-unit-3.5.3-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957069" comment="rubygem-typeprof-0.21.3-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957070" comment="rubygems-3.3.27-144.module+el8.10.0+22580+b97d9670 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957071" comment="rubygems-devel-3.3.27-144.module+el8.10.0+22580+b97d9670 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2859" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-49761" ref_url="https://www.suse.com/security/cve/CVE-2024-49761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10850.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10850.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49761/">CVE-2024-49761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49761">CVE-2024-49761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957072" comment="ruby-2.5.9-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957073" comment="ruby-devel-2.5.9-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957074" comment="ruby-doc-2.5.9-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957075" comment="ruby-irb-2.5.9-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957076" comment="ruby-libs-2.5.9-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873732" comment="rubygem-abrt-0.3.0-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873733" comment="rubygem-abrt-doc-0.3.0-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957077" comment="rubygem-bigdecimal-1.3.4-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843367" comment="rubygem-bson-4.3.0-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843368" comment="rubygem-bson-doc-4.3.0-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873735" comment="rubygem-bundler-1.16.1-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873736" comment="rubygem-bundler-doc-1.16.1-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957078" comment="rubygem-did_you_mean-1.2.0-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957079" comment="rubygem-io-console-0.4.6-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957080" comment="rubygem-json-2.1.0-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957081" comment="rubygem-minitest-5.10.3-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843375" comment="rubygem-mongo-2.5.1-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843376" comment="rubygem-mongo-doc-2.5.1-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843377" comment="rubygem-mysql2-0.4.10-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843378" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957082" comment="rubygem-net-telnet-0.1.1-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957083" comment="rubygem-openssl-2.1.2-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843381" comment="rubygem-pg-1.0.0-3.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843382" comment="rubygem-pg-doc-1.0.0-3.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957084" comment="rubygem-power_assert-1.1.1-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957085" comment="rubygem-psych-3.0.2-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957086" comment="rubygem-rake-12.3.3-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957087" comment="rubygem-rdoc-6.0.1.1-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957088" comment="rubygem-test-unit-3.2.7-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957089" comment="rubygem-xmlrpc-0.3.0-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957090" comment="rubygems-2.7.6.3-113.module+el8.10.0+22581+23fc9c9e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957091" comment="rubygems-devel-2.7.6.3-113.module+el8.10.0+22581+23fc9c9e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2860" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-46695" ref_url="https://www.suse.com/security/cve/CVE-2024-46695/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50099" ref_url="https://www.suse.com/security/cve/CVE-2024-50099/" source="CVE"/>
		<reference ref_id="CVE-2024-50110" ref_url="https://www.suse.com/security/cve/CVE-2024-50110/" source="CVE"/>
		<reference ref_id="CVE-2024-50142" ref_url="https://www.suse.com/security/cve/CVE-2024-50142/" source="CVE"/>
		<reference ref_id="CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192/" source="CVE"/>
		<reference ref_id="CVE-2024-50256" ref_url="https://www.suse.com/security/cve/CVE-2024-50256/" source="CVE"/>
		<reference ref_id="CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10943.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10943.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46695/">CVE-2024-46695 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50099/">CVE-2024-50099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50110/">CVE-2024-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50142/">CVE-2024-50142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50256/">CVE-2024-50256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957307" comment="bpftool-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957308" comment="kernel-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957309" comment="kernel-abi-stablelists-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957310" comment="kernel-core-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957311" comment="kernel-cross-headers-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957312" comment="kernel-debug-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957313" comment="kernel-debug-core-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957315" comment="kernel-debug-modules-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957316" comment="kernel-debug-modules-extra-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957318" comment="kernel-doc-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957319" comment="kernel-headers-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957320" comment="kernel-modules-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957321" comment="kernel-modules-extra-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957322" comment="kernel-tools-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957323" comment="kernel-tools-libs-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957325" comment="perf-4.18.0-553.32.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957326" comment="python3-perf-4.18.0-553.32.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2861" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957327" comment="apcu-panel-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957328" comment="libzip-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957329" comment="libzip-devel-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957330" comment="libzip-tools-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957331" comment="php-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957332" comment="php-bcmath-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957333" comment="php-cli-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957334" comment="php-common-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957335" comment="php-dba-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957336" comment="php-dbg-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957337" comment="php-devel-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957338" comment="php-embedded-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957339" comment="php-enchant-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957340" comment="php-ffi-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957341" comment="php-fpm-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957342" comment="php-gd-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957343" comment="php-gmp-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957344" comment="php-intl-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957345" comment="php-ldap-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957346" comment="php-mbstring-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957347" comment="php-mysqlnd-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957348" comment="php-odbc-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957349" comment="php-opcache-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957350" comment="php-pdo-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957351" comment="php-pear-1.10.14-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957352" comment="php-pecl-apcu-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957353" comment="php-pecl-apcu-devel-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957354" comment="php-pecl-rrd-2.0.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957355" comment="php-pecl-xdebug3-3.2.2-2.module+el8.10.0+20798+00eaeb41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957356" comment="php-pecl-zip-1.22.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957357" comment="php-pgsql-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957358" comment="php-process-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957359" comment="php-snmp-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957360" comment="php-soap-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957361" comment="php-xml-8.2.25-1.module+el8.10.0+22478+9eb07224 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2862" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0567" ref_url="https://www.suse.com/security/cve/CVE-2023-0567/" source="CVE"/>
		<reference ref_id="CVE-2023-0568" ref_url="https://www.suse.com/security/cve/CVE-2023-0568/" source="CVE"/>
		<reference ref_id="CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247/" source="CVE"/>
		<reference ref_id="CVE-2023-3823" ref_url="https://www.suse.com/security/cve/CVE-2023-3823/" source="CVE"/>
		<reference ref_id="CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824/" source="CVE"/>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10952.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10952.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0567/">CVE-2023-0567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0568/">CVE-2023-0568 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3823/">CVE-2023-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957362" comment="apcu-panel-5.1.18-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957363" comment="libzip-1.6.1-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957364" comment="libzip-devel-1.6.1-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957365" comment="libzip-tools-1.6.1-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957366" comment="php-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957367" comment="php-bcmath-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957368" comment="php-cli-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957369" comment="php-common-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957370" comment="php-dba-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957371" comment="php-dbg-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957372" comment="php-devel-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957373" comment="php-embedded-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957374" comment="php-enchant-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957375" comment="php-ffi-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957376" comment="php-fpm-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957377" comment="php-gd-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957378" comment="php-gmp-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957379" comment="php-intl-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957380" comment="php-json-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957381" comment="php-ldap-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957382" comment="php-mbstring-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957383" comment="php-mysqlnd-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957384" comment="php-odbc-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957385" comment="php-opcache-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957386" comment="php-pdo-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957387" comment="php-pear-1.10.13-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957388" comment="php-pecl-apcu-5.1.18-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957389" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957390" comment="php-pecl-rrd-2.0.1-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957391" comment="php-pecl-xdebug-2.9.5-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957392" comment="php-pecl-zip-1.18.2-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957393" comment="php-pgsql-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957394" comment="php-process-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957395" comment="php-snmp-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957396" comment="php-soap-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957397" comment="php-xml-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957398" comment="php-xmlrpc-7.4.33-2.module+el8.10.0+22485+a3539972 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2863" version="1" class="patch">
	<metadata>
		<title>security update for python-PyMySQL (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-53899" ref_url="https://www.suse.com/security/cve/CVE-2024-53899/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10953.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10953.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53899/">CVE-2024-53899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53899">CVE-2024-53899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957399" comment="python-nose-docs-1.3.7-31.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957400" comment="python-pymongo-doc-3.7.0-1.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957401" comment="python-sqlalchemy-doc-1.3.2-3.module+el8.10.0+20981+3704b446 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957402" comment="python-virtualenv-doc-15.1.0-23.module+el8.10.0+22619+61b70790 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957403" comment="python3-PyMySQL-0.10.1-2.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957404" comment="python3-bson-3.7.0-1.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957405" comment="python3-distro-1.4.0-2.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957406" comment="python3-docs-3.6.7-2.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957407" comment="python3-docutils-0.14-12.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957408" comment="python3-nose-1.3.7-31.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957409" comment="python3-pygments-2.2.0-22.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957410" comment="python3-pymongo-3.7.0-1.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957411" comment="python3-pymongo-gridfs-3.7.0-1.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957412" comment="python3-scipy-1.0.0-21.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957413" comment="python3-sqlalchemy-1.3.2-3.module+el8.10.0+20981+3704b446 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957414" comment="python3-virtualenv-15.1.0-23.module+el8.10.0+22619+61b70790 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957415" comment="python3-wheel-0.31.1-3.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957416" comment="python3-wheel-wheel-0.31.1-3.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957417" comment="python36-3.6.8-39.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957418" comment="python36-debug-3.6.8-39.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957419" comment="python36-devel-3.6.8-39.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957420" comment="python36-rpm-macros-3.6.8-39.module+el8.10.0+20784+edafcd43 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2864" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10979.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10979.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957421" comment="python3.11-3.11.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957422" comment="python3.11-debug-3.11.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957423" comment="python3.11-devel-3.11.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957424" comment="python3.11-idle-3.11.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957425" comment="python3.11-libs-3.11.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957426" comment="python3.11-rpm-macros-3.11.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957427" comment="python3.11-test-3.11.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957428" comment="python3.11-tkinter-3.11.11-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2865" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-12254" ref_url="https://www.suse.com/security/cve/CVE-2024-12254/" source="CVE"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10980.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10980.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-12254/">CVE-2024-12254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12254">CVE-2024-12254 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957429" comment="python3.12-3.12.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957430" comment="python3.12-debug-3.12.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957431" comment="python3.12-devel-3.12.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957432" comment="python3.12-idle-3.12.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957433" comment="python3.12-libs-3.12.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957434" comment="python3.12-rpm-macros-3.12.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957435" comment="python3.12-test-3.12.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957436" comment="python3.12-tkinter-3.12.8-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2866" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21510" ref_url="https://www.suse.com/security/cve/CVE-2024-21510/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10987.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10987.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21510/">CVE-2024-21510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21510">CVE-2024-21510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958517" comment="pcs-0.10.18-2.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958518" comment="pcs-snmp-0.10.18-2.el8_10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2867" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45866" ref_url="https://www.suse.com/security/cve/CVE-2023-45866/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11154.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11154.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45866/">CVE-2023-45866 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45866">CVE-2023-45866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958519" comment="bluez-5.63-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958520" comment="bluez-cups-5.63-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958521" comment="bluez-hid2hci-5.63-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958522" comment="bluez-libs-5.63-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958523" comment="bluez-libs-devel-5.63-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958524" comment="bluez-obexd-5.63-3.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2868" version="1" class="patch">
	<metadata>
		<title>security update for tuned (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-52337" ref_url="https://www.suse.com/security/cve/CVE-2024-52337/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11161.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11161.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52337/">CVE-2024-52337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52337">CVE-2024-52337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958525" comment="tuned-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958526" comment="tuned-gtk-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958527" comment="tuned-profiles-atomic-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958528" comment="tuned-profiles-compat-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958529" comment="tuned-profiles-cpu-partitioning-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958530" comment="tuned-profiles-mssql-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958531" comment="tuned-profiles-oracle-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958532" comment="tuned-profiles-postgresql-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958533" comment="tuned-utils-2.22.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958534" comment="tuned-utils-systemtap-2.22.1-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2869" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-38796" ref_url="https://www.suse.com/security/cve/CVE-2024-38796/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11185.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11185.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38796/">CVE-2024-38796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38796">CVE-2024-38796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958535" comment="edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2870" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11189.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11189.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958536" comment="python3.11-urllib3-1.26.12-5.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2871" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-50612" ref_url="https://www.suse.com/security/cve/CVE-2024-50612/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50612/">CVE-2024-50612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50612">CVE-2024-50612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958537" comment="libsndfile-1.0.28-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958538" comment="libsndfile-devel-1.0.28-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958539" comment="libsndfile-utils-1.0.28-16.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2872" version="1" class="patch">
	<metadata>
		<title>security update for mpg123 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-10573" ref_url="https://www.suse.com/security/cve/CVE-2024-10573/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10573/">CVE-2024-10573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10573">CVE-2024-10573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958540" comment="mpg123-1.32.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958541" comment="mpg123-devel-1.32.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958542" comment="mpg123-libs-1.32.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958543" comment="mpg123-plugins-pulseaudio-1.32.9-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2873" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-good (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47537" ref_url="https://www.suse.com/security/cve/CVE-2024-47537/" source="CVE"/>
		<reference ref_id="CVE-2024-47539" ref_url="https://www.suse.com/security/cve/CVE-2024-47539/" source="CVE"/>
		<reference ref_id="CVE-2024-47540" ref_url="https://www.suse.com/security/cve/CVE-2024-47540/" source="CVE"/>
		<reference ref_id="CVE-2024-47606" ref_url="https://www.suse.com/security/cve/CVE-2024-47606/" source="CVE"/>
		<reference ref_id="CVE-2024-47613" ref_url="https://www.suse.com/security/cve/CVE-2024-47613/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11299.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11299.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47537/">CVE-2024-47537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47537">CVE-2024-47537 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47539/">CVE-2024-47539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47539">CVE-2024-47539 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47540/">CVE-2024-47540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47540">CVE-2024-47540 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47606/">CVE-2024-47606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47606">CVE-2024-47606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47613/">CVE-2024-47613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47613">CVE-2024-47613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958562" comment="gstreamer1-plugins-good-1.16.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958563" comment="gstreamer1-plugins-good-gtk-1.16.1-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2874" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47538" ref_url="https://www.suse.com/security/cve/CVE-2024-47538/" source="CVE"/>
		<reference ref_id="CVE-2024-47607" ref_url="https://www.suse.com/security/cve/CVE-2024-47607/" source="CVE"/>
		<reference ref_id="CVE-2024-47615" ref_url="https://www.suse.com/security/cve/CVE-2024-47615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11345.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11345.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47538/">CVE-2024-47538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47538">CVE-2024-47538 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47607/">CVE-2024-47607 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47607">CVE-2024-47607 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47615/">CVE-2024-47615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47615">CVE-2024-47615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958564" comment="gstreamer1-plugins-base-1.16.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958565" comment="gstreamer1-plugins-base-devel-1.16.1-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2875" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21392" ref_url="https://www.suse.com/security/cve/CVE-2024-21392/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1308.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1308.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21392/">CVE-2024-21392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21392">CVE-2024-21392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874278" comment="aspnetcore-runtime-7.0-7.0.17-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874279" comment="aspnetcore-targeting-pack-7.0-7.0.17-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874280" comment="dotnet-apphost-pack-7.0-7.0.17-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874281" comment="dotnet-hostfxr-7.0-7.0.17-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874282" comment="dotnet-runtime-7.0-7.0.17-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874283" comment="dotnet-sdk-7.0-7.0.117-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874284" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874285" comment="dotnet-targeting-pack-7.0-7.0.17-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874286" comment="dotnet-templates-7.0-7.0.117-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2876" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21392" ref_url="https://www.suse.com/security/cve/CVE-2024-21392/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1311.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1311.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21392/">CVE-2024-21392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21392">CVE-2024-21392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872443" comment="aspnetcore-runtime-8.0-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872444" comment="aspnetcore-runtime-dbg-8.0-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872445" comment="aspnetcore-targeting-pack-8.0-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872446" comment="dotnet-8.0.103-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872447" comment="dotnet-apphost-pack-8.0-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872448" comment="dotnet-host-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872449" comment="dotnet-hostfxr-8.0-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872450" comment="dotnet-runtime-8.0-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872451" comment="dotnet-runtime-dbg-8.0-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872452" comment="dotnet-sdk-8.0-8.0.103-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872453" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.103-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872454" comment="dotnet-sdk-dbg-8.0-8.0.103-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872455" comment="dotnet-targeting-pack-8.0-8.0.3-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872456" comment="dotnet-templates-8.0-8.0.103-1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872457" comment="netstandard-targeting-pack-2.1-8.0.103-1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2877" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1335.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1335.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851376" comment="dnsmasq-2.79-31.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851377" comment="dnsmasq-utils-2.79-31.el8_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2878" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-25111" ref_url="https://www.suse.com/security/cve/CVE-2024-25111/" source="CVE"/>
		<reference ref_id="CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1375.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1375.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25111/">CVE-2024-25111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25111">CVE-2024-25111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850254" comment="libecap-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850255" comment="libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851810" comment="squid-4.15-7.module+el8.9.0+21530+59b09a5b.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2879" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<reference ref_id="CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756/" source="CVE"/>
		<reference ref_id="CVE-2023-36617" ref_url="https://www.suse.com/security/cve/CVE-2023-36617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1431.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1431.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36617/">CVE-2023-36617 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36617">CVE-2023-36617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874287" comment="ruby-3.1.4-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874288" comment="ruby-bundled-gems-3.1.4-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874289" comment="ruby-default-gems-3.1.4-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874290" comment="ruby-devel-3.1.4-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874291" comment="ruby-doc-3.1.4-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874292" comment="ruby-libs-3.1.4-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874293" comment="rubygem-abrt-0.4.0-1.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874294" comment="rubygem-abrt-doc-0.4.0-1.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874295" comment="rubygem-bigdecimal-3.1.1-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874296" comment="rubygem-bundler-2.3.26-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874297" comment="rubygem-io-console-0.5.11-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874298" comment="rubygem-irb-1.4.1-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874299" comment="rubygem-json-2.6.1-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874300" comment="rubygem-minitest-5.15.0-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874301" comment="rubygem-mysql2-0.5.3-3.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874302" comment="rubygem-mysql2-doc-0.5.3-3.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874303" comment="rubygem-pg-1.3.2-1.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874304" comment="rubygem-pg-doc-1.3.2-1.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874305" comment="rubygem-power_assert-2.0.1-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874306" comment="rubygem-psych-4.0.4-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874307" comment="rubygem-rake-13.0.6-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874308" comment="rubygem-rbs-2.7.0-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874309" comment="rubygem-rdoc-6.4.0-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874310" comment="rubygem-rexml-3.2.5-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874311" comment="rubygem-rss-0.2.9-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874312" comment="rubygem-test-unit-3.5.3-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874313" comment="rubygem-typeprof-0.21.3-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874314" comment="rubygems-3.3.26-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874315" comment="rubygems-devel-3.3.26-142.module+el8.9.0+21471+7d1e4a35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2880" version="1" class="patch">
	<metadata>
		<title>security update for postgresql-jdbc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1597" ref_url="https://www.suse.com/security/cve/CVE-2024-1597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1435.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1435.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1597/">CVE-2024-1597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1597">CVE-2024-1597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851811" comment="postgresql-jdbc-42.2.14-3.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851812" comment="postgresql-jdbc-javadoc-42.2.14-3.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2881" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1444.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1444.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851931" comment="nodejs-16.20.2-4.module+el8.9.0+21536+8fdee1fb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851932" comment="nodejs-devel-16.20.2-4.module+el8.9.0+21536+8fdee1fb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851933" comment="nodejs-docs-16.20.2-4.module+el8.9.0+21536+8fdee1fb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851934" comment="nodejs-full-i18n-16.20.2-4.module+el8.9.0+21536+8fdee1fb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851935" comment="nodejs-nodemon-3.0.1-1.module+el8.9.0+19741+03a9aaff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851936" comment="nodejs-packaging-26-1.module+el8.9.0+19858+c237a2cf is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851937" comment="npm-8.19.4-1.16.20.2.4.module+el8.9.0+21536+8fdee1fb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2882" version="1" class="patch">
	<metadata>
		<title>security update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1472.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1472.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848852" comment="delve-1.20.2-1.module+el8.9.0+18926+5193682d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848853" comment="go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851813" comment="golang-1.20.12-3.module+el8.9.0+21528+703c3aa2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851814" comment="golang-bin-1.20.12-3.module+el8.9.0+21528+703c3aa2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851815" comment="golang-docs-1.20.12-3.module+el8.9.0+21528+703c3aa2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851816" comment="golang-misc-1.20.12-3.module+el8.9.0+21528+703c3aa2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851817" comment="golang-src-1.20.12-3.module+el8.9.0+21528+703c3aa2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851818" comment="golang-tests-1.20.12-3.module+el8.9.0+21528+703c3aa2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2883" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616/" source="CVE"/>
		<reference ref_id="CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1484.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1484.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851976" comment="firefox-115.9.1-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2884" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-1936" ref_url="https://www.suse.com/security/cve/CVE-2024-1936/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1494.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1494.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1936/">CVE-2024-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1936">CVE-2024-1936 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875429" comment="thunderbird-115.9.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2885" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1510.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1510.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852397" comment="nodejs-18.19.1-1.module+el8.9.0+21387+21356dec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852398" comment="nodejs-devel-18.19.1-1.module+el8.9.0+21387+21356dec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852399" comment="nodejs-docs-18.19.1-1.module+el8.9.0+21387+21356dec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852400" comment="nodejs-full-i18n-18.19.1-1.module+el8.9.0+21387+21356dec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852401" comment="nodejs-nodemon-3.0.1-1.module+el8.9.0+21190+5ebd2c33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852402" comment="nodejs-packaging-2021.06-4.module+el8.9.0+21190+5ebd2c33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852403" comment="nodejs-packaging-bundler-2021.06-4.module+el8.9.0+21190+5ebd2c33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852404" comment="npm-10.2.4-1.18.19.1.1.module+el8.9.0+21387+21356dec is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2886" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322/" source="CVE"/>
		<reference ref_id="CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546/" source="CVE"/>
		<reference ref_id="CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1601.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1601.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852716" comment="curl-7.61.1-33.el8_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852717" comment="libcurl-7.61.1-33.el8_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852718" comment="libcurl-devel-7.61.1-33.el8_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852719" comment="libcurl-minimal-7.61.1-33.el8_9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2887" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631/" source="CVE"/>
		<reference ref_id="CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1607.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1607.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38096">CVE-2022-38096 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853155" comment="bpftool-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853156" comment="kernel-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853157" comment="kernel-abi-stablelists-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853158" comment="kernel-core-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853159" comment="kernel-cross-headers-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853160" comment="kernel-debug-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853161" comment="kernel-debug-core-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853163" comment="kernel-debug-modules-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853164" comment="kernel-debug-modules-extra-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853166" comment="kernel-doc-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853167" comment="kernel-headers-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853168" comment="kernel-modules-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853169" comment="kernel-modules-extra-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853170" comment="kernel-tools-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853171" comment="kernel-tools-libs-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853173" comment="perf-4.18.0-513.24.1.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853174" comment="python3-perf-4.18.0-513.24.1.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2888" version="1" class="patch">
	<metadata>
		<title>security update for opencryptoki (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-0914" ref_url="https://www.suse.com/security/cve/CVE-2024-0914/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1608.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1608.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0914/">CVE-2024-0914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0914">CVE-2024-0914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854095" comment="opencryptoki-3.21.0-10.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854096" comment="opencryptoki-devel-3.21.0-10.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854097" comment="opencryptoki-icsftok-3.21.0-10.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854098" comment="opencryptoki-libs-3.21.0-10.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854099" comment="opencryptoki-swtok-3.21.0-10.el8_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854100" comment="opencryptoki-tpmtok-3.21.0-10.el8_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2889" version="1" class="patch">
	<metadata>
		<title>security update for less (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1610.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1610.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852720" comment="less-530-2.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2890" version="1" class="patch">
	<metadata>
		<title>security update for expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1615.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1615.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852721" comment="expat-2.2.5-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852722" comment="expat-devel-2.2.5-11.el8_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2891" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1644.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1644.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854101" comment="grafana-pcp-5.1.1-2.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2892" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1646.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1646.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854102" comment="grafana-9.2.10-8.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2893" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-21890" ref_url="https://www.suse.com/security/cve/CVE-2024-21890/" source="CVE"/>
		<reference ref_id="CVE-2024-21891" ref_url="https://www.suse.com/security/cve/CVE-2024-21891/" source="CVE"/>
		<reference ref_id="CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892/" source="CVE"/>
		<reference ref_id="CVE-2024-21896" ref_url="https://www.suse.com/security/cve/CVE-2024-21896/" source="CVE"/>
		<reference ref_id="CVE-2024-22017" ref_url="https://www.suse.com/security/cve/CVE-2024-22017/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1687.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1687.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21890/">CVE-2024-21890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21890">CVE-2024-21890 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21891/">CVE-2024-21891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21891">CVE-2024-21891 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21896/">CVE-2024-21896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21896">CVE-2024-21896 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22017/">CVE-2024-22017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22017">CVE-2024-22017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853712" comment="nodejs-20.11.1-1.module+el8.9.0+21380+12032667 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853713" comment="nodejs-devel-20.11.1-1.module+el8.9.0+21380+12032667 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853714" comment="nodejs-docs-20.11.1-1.module+el8.9.0+21380+12032667 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853715" comment="nodejs-full-i18n-20.11.1-1.module+el8.9.0+21380+12032667 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843609" comment="nodejs-nodemon-3.0.1-1.module+el8.9.0+20473+c4e3d824 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843610" comment="nodejs-packaging-2021.06-4.module+el8.9.0+19519+e25b965a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843611" comment="nodejs-packaging-bundler-2021.06-4.module+el8.9.0+19519+e25b965a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853716" comment="npm-10.2.4-1.20.11.1.1.module+el8.9.0+21380+12032667 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2894" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-30156" ref_url="https://www.suse.com/security/cve/CVE-2024-30156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1690.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1690.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30156/">CVE-2024-30156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30156">CVE-2024-30156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854103" comment="varnish-6.0.13-1.module+el8.9.0+21617+7578fa11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854104" comment="varnish-devel-6.0.13-1.module+el8.9.0+21617+7578fa11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854105" comment="varnish-docs-6.0.13-1.module+el8.9.0+21617+7578fa11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854106" comment="varnish-modules-0.15.0-6.module+el8.9.0+21617+7578fa11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2895" version="1" class="patch">
	<metadata>
		<title>security update for rear (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-23301" ref_url="https://www.suse.com/security/cve/CVE-2024-23301/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1719.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1719.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23301/">CVE-2024-23301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23301">CVE-2024-23301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854004" comment="rear-2.6-11.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2896" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1488" ref_url="https://www.suse.com/security/cve/CVE-2024-1488/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1751.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1751.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1488/">CVE-2024-1488 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1488">CVE-2024-1488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854337" comment="python3-unbound-1.16.2-5.el8_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854338" comment="unbound-1.16.2-5.el8_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854339" comment="unbound-devel-1.16.2-5.el8_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854340" comment="unbound-libs-1.16.2-5.el8_9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2897" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="CVE-2023-5517" ref_url="https://www.suse.com/security/cve/CVE-2023-5517/" source="CVE"/>
		<reference ref_id="CVE-2023-5679" ref_url="https://www.suse.com/security/cve/CVE-2023-5679/" source="CVE"/>
		<reference ref_id="CVE-2023-6516" ref_url="https://www.suse.com/security/cve/CVE-2023-6516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1781.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1781.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5517/">CVE-2023-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5517">CVE-2023-5517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5679/">CVE-2023-5679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5679">CVE-2023-5679 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6516/">CVE-2023-6516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6516">CVE-2023-6516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854341" comment="bind9.16-9.16.23-0.16.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854342" comment="bind9.16-chroot-9.16.23-0.16.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854343" comment="bind9.16-devel-9.16.23-0.16.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854344" comment="bind9.16-dnssec-utils-9.16.23-0.16.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854345" comment="bind9.16-doc-9.16.23-0.16.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854346" comment="bind9.16-libs-9.16.23-0.16.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854347" comment="bind9.16-license-9.16.23-0.16.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854348" comment="bind9.16-utils-9.16.23-0.16.el8_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854349" comment="python3-bind9.16-9.16.23-0.16.el8_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2898" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1782.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1782.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854350" comment="bind-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854351" comment="bind-chroot-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854352" comment="bind-devel-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854353" comment="bind-export-devel-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854354" comment="bind-export-libs-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854355" comment="bind-libs-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854356" comment="bind-libs-lite-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854357" comment="bind-license-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854358" comment="bind-lite-devel-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854359" comment="bind-pkcs11-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854360" comment="bind-pkcs11-devel-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854361" comment="bind-pkcs11-libs-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854362" comment="bind-pkcs11-utils-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854363" comment="bind-sdb-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854364" comment="bind-sdb-chroot-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854365" comment="bind-utils-9.11.36-11.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854366" comment="dhcp-client-4.3.6-49.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854367" comment="dhcp-common-4.3.6-49.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854368" comment="dhcp-libs-4.3.6-49.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854369" comment="dhcp-relay-4.3.6-49.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854370" comment="dhcp-server-4.3.6-49.el8_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854371" comment="python3-bind-9.11.36-11.el8_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2899" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1784.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1784.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854372" comment="gnutls-3.6.16-8.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854373" comment="gnutls-c++-3.6.16-8.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854374" comment="gnutls-dane-3.6.16-8.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854375" comment="gnutls-devel-3.6.16-8.el8_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854376" comment="gnutls-utils-3.6.16-8.el8_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2900" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-27316" ref_url="https://www.suse.com/security/cve/CVE-2024-27316/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1786.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1786.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27316/">CVE-2024-27316 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27316">CVE-2024-27316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854377" comment="httpd-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854378" comment="httpd-devel-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854379" comment="httpd-filesystem-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854380" comment="httpd-manual-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854381" comment="httpd-tools-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854382" comment="mod_http2-1.15.7-8.module+el8.9.0+21652+2dd1200b.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854383" comment="mod_ldap-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854384" comment="mod_md-2.0.8-8.module+el8.9.0+19080+567b90f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854385" comment="mod_proxy_html-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854386" comment="mod_session-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854387" comment="mod_ssl-2.4.37-62.module+el8.9.0+19699+7a7a2044 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2901" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1818.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1818.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858428" comment="java-1.8.0-openjdk-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858429" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859962" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.412.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859963" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.412.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858430" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858431" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858432" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858433" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858434" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858435" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858436" comment="java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858437" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858438" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858439" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858440" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858441" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858442" comment="java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858443" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858444" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858445" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2902" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1822.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1822.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856130" comment="java-11-openjdk-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856131" comment="java-11-openjdk-demo-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856132" comment="java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856133" comment="java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856134" comment="java-11-openjdk-devel-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856135" comment="java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856136" comment="java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856137" comment="java-11-openjdk-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856138" comment="java-11-openjdk-headless-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856139" comment="java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856140" comment="java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856141" comment="java-11-openjdk-javadoc-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856142" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856143" comment="java-11-openjdk-jmods-11.0.23.0.9-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856144" comment="java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856145" comment="java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856146" comment="java-11-openjdk-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856147" comment="java-11-openjdk-src-11.0.23.0.9-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856148" comment="java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856149" comment="java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856150" comment="java-11-openjdk-static-libs-11.0.23.0.9-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856151" comment="java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856152" comment="java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2903" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1825.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1825.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855576" comment="java-17-openjdk-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855577" comment="java-17-openjdk-demo-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855578" comment="java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855579" comment="java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855580" comment="java-17-openjdk-devel-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855581" comment="java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855582" comment="java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855583" comment="java-17-openjdk-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855584" comment="java-17-openjdk-headless-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855585" comment="java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855586" comment="java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855587" comment="java-17-openjdk-javadoc-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855588" comment="java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855589" comment="java-17-openjdk-jmods-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855590" comment="java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855591" comment="java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855592" comment="java-17-openjdk-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855593" comment="java-17-openjdk-src-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855594" comment="java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855595" comment="java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855596" comment="java-17-openjdk-static-libs-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855597" comment="java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855598" comment="java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2904" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1828.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1828.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855697" comment="java-21-openjdk-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855698" comment="java-21-openjdk-demo-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855699" comment="java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855700" comment="java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855701" comment="java-21-openjdk-devel-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855702" comment="java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855703" comment="java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855704" comment="java-21-openjdk-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855705" comment="java-21-openjdk-headless-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855706" comment="java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855707" comment="java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855708" comment="java-21-openjdk-javadoc-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855709" comment="java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855710" comment="java-21-openjdk-jmods-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855711" comment="java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855712" comment="java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855713" comment="java-21-openjdk-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855714" comment="java-21-openjdk-src-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855715" comment="java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855716" comment="java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855717" comment="java-21-openjdk-static-libs-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855718" comment="java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855719" comment="java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2905" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1912.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1912.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855720" comment="firefox-115.10.0-1.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2906" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2357" ref_url="https://www.suse.com/security/cve/CVE-2024-2357/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1998.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1998.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2357/">CVE-2024-2357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2357">CVE-2024-2357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858064" comment="libreswan-4.12-2.el8_9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2907" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2037.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2037.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858065" comment="tigervnc-1.13.1-2.el8_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858066" comment="tigervnc-icons-1.13.1-2.el8_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858067" comment="tigervnc-license-1.13.1-2.el8_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858068" comment="tigervnc-selinux-1.13.1-2.el8_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858069" comment="tigervnc-server-1.13.1-2.el8_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858070" comment="tigervnc-server-minimal-1.13.1-2.el8_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858071" comment="tigervnc-server-module-1.13.1-2.el8_9.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2908" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2098.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2098.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858446" comment="aardvark-dns-1.7.0-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858447" comment="buildah-1.31.5-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858448" comment="buildah-tests-1.31.5-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858449" comment="cockpit-podman-75-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858450" comment="conmon-2.1.8-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858451" comment="container-selinux-2.229.0-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858452" comment="containernetworking-plugins-1.3.0-8.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858453" comment="containers-common-1-71.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858454" comment="crit-3.18-4.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858455" comment="criu-3.18-4.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858456" comment="criu-devel-3.18-4.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858457" comment="criu-libs-3.18-4.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858458" comment="crun-1.8.7-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858459" comment="fuse-overlayfs-1.12-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858460" comment="libslirp-4.4.0-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858461" comment="libslirp-devel-4.4.0-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858462" comment="netavark-1.7.0-2.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858463" comment="oci-seccomp-bpf-hook-1.2.9-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858464" comment="podman-4.6.1-9.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858465" comment="podman-catatonit-4.6.1-9.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858466" comment="podman-docker-4.6.1-9.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858467" comment="podman-gvproxy-4.6.1-9.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858468" comment="podman-plugins-4.6.1-9.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858469" comment="podman-remote-4.6.1-9.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858470" comment="podman-tests-4.6.1-9.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858471" comment="python3-criu-3.18-4.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858472" comment="python3-podman-4.6.0-2.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858473" comment="runc-1.1.12-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858474" comment="skopeo-1.13.3-3.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858475" comment="skopeo-tests-1.13.3-3.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858476" comment="slirp4netns-1.2.1-1.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858477" comment="toolbox-0.0.99.4-5.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858478" comment="toolbox-tests-0.0.99.4-5.module+el8.9.0+21697+6a5e98e7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858479" comment="udica-0.2.6-20.module+el8.9.0+21697+6a5e98e7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2909" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2699.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2699.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859181" comment="git-lfs-3.2.0-3.el8_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2910" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2722.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2722.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859964" comment="compat-libpthread-nonshared-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859965" comment="glibc-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859966" comment="glibc-all-langpacks-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859967" comment="glibc-benchtests-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859968" comment="glibc-common-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859969" comment="glibc-devel-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859970" comment="glibc-doc-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859971" comment="glibc-gconv-extra-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859972" comment="glibc-headers-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859973" comment="glibc-langpack-aa-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859974" comment="glibc-langpack-af-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859975" comment="glibc-langpack-agr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859976" comment="glibc-langpack-ak-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859977" comment="glibc-langpack-am-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859978" comment="glibc-langpack-an-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859979" comment="glibc-langpack-anp-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859980" comment="glibc-langpack-ar-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859981" comment="glibc-langpack-as-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859982" comment="glibc-langpack-ast-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859983" comment="glibc-langpack-ayc-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859984" comment="glibc-langpack-az-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859985" comment="glibc-langpack-be-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859986" comment="glibc-langpack-bem-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859987" comment="glibc-langpack-ber-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859988" comment="glibc-langpack-bg-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859989" comment="glibc-langpack-bhb-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859990" comment="glibc-langpack-bho-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859991" comment="glibc-langpack-bi-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859992" comment="glibc-langpack-bn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859993" comment="glibc-langpack-bo-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859994" comment="glibc-langpack-br-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859995" comment="glibc-langpack-brx-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859996" comment="glibc-langpack-bs-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859997" comment="glibc-langpack-byn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859998" comment="glibc-langpack-ca-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859999" comment="glibc-langpack-ce-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860000" comment="glibc-langpack-chr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860001" comment="glibc-langpack-cmn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860002" comment="glibc-langpack-crh-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860003" comment="glibc-langpack-cs-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860004" comment="glibc-langpack-csb-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860005" comment="glibc-langpack-cv-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860006" comment="glibc-langpack-cy-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860007" comment="glibc-langpack-da-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860008" comment="glibc-langpack-de-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860009" comment="glibc-langpack-doi-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860010" comment="glibc-langpack-dsb-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860011" comment="glibc-langpack-dv-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860012" comment="glibc-langpack-dz-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860013" comment="glibc-langpack-el-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860014" comment="glibc-langpack-en-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860015" comment="glibc-langpack-eo-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860016" comment="glibc-langpack-es-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860017" comment="glibc-langpack-et-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860018" comment="glibc-langpack-eu-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860019" comment="glibc-langpack-fa-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860020" comment="glibc-langpack-ff-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860021" comment="glibc-langpack-fi-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860022" comment="glibc-langpack-fil-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860023" comment="glibc-langpack-fo-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860024" comment="glibc-langpack-fr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860025" comment="glibc-langpack-fur-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860026" comment="glibc-langpack-fy-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860027" comment="glibc-langpack-ga-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860028" comment="glibc-langpack-gd-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860029" comment="glibc-langpack-gez-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860030" comment="glibc-langpack-gl-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860031" comment="glibc-langpack-gu-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860032" comment="glibc-langpack-gv-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860033" comment="glibc-langpack-ha-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860034" comment="glibc-langpack-hak-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860035" comment="glibc-langpack-he-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860036" comment="glibc-langpack-hi-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860037" comment="glibc-langpack-hif-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860038" comment="glibc-langpack-hne-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860039" comment="glibc-langpack-hr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860040" comment="glibc-langpack-hsb-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860041" comment="glibc-langpack-ht-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860042" comment="glibc-langpack-hu-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860043" comment="glibc-langpack-hy-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860044" comment="glibc-langpack-ia-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860045" comment="glibc-langpack-id-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860046" comment="glibc-langpack-ig-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860047" comment="glibc-langpack-ik-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860048" comment="glibc-langpack-is-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860049" comment="glibc-langpack-it-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860050" comment="glibc-langpack-iu-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860051" comment="glibc-langpack-ja-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860052" comment="glibc-langpack-ka-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860053" comment="glibc-langpack-kab-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860054" comment="glibc-langpack-kk-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860055" comment="glibc-langpack-kl-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860056" comment="glibc-langpack-km-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860057" comment="glibc-langpack-kn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860058" comment="glibc-langpack-ko-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860059" comment="glibc-langpack-kok-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860060" comment="glibc-langpack-ks-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860061" comment="glibc-langpack-ku-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860062" comment="glibc-langpack-kw-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860063" comment="glibc-langpack-ky-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860064" comment="glibc-langpack-lb-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860065" comment="glibc-langpack-lg-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860066" comment="glibc-langpack-li-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860067" comment="glibc-langpack-lij-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860068" comment="glibc-langpack-ln-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860069" comment="glibc-langpack-lo-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860070" comment="glibc-langpack-lt-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860071" comment="glibc-langpack-lv-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860072" comment="glibc-langpack-lzh-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860073" comment="glibc-langpack-mag-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860074" comment="glibc-langpack-mai-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860075" comment="glibc-langpack-mfe-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860076" comment="glibc-langpack-mg-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860077" comment="glibc-langpack-mhr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860078" comment="glibc-langpack-mi-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860079" comment="glibc-langpack-miq-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860080" comment="glibc-langpack-mjw-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860081" comment="glibc-langpack-mk-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860082" comment="glibc-langpack-ml-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860083" comment="glibc-langpack-mn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860084" comment="glibc-langpack-mni-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860085" comment="glibc-langpack-mr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860086" comment="glibc-langpack-ms-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860087" comment="glibc-langpack-mt-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860088" comment="glibc-langpack-my-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860089" comment="glibc-langpack-nan-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860090" comment="glibc-langpack-nb-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860091" comment="glibc-langpack-nds-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860092" comment="glibc-langpack-ne-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860093" comment="glibc-langpack-nhn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860094" comment="glibc-langpack-niu-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860095" comment="glibc-langpack-nl-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860096" comment="glibc-langpack-nn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860097" comment="glibc-langpack-nr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860098" comment="glibc-langpack-nso-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860099" comment="glibc-langpack-oc-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860100" comment="glibc-langpack-om-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860101" comment="glibc-langpack-or-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860102" comment="glibc-langpack-os-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860103" comment="glibc-langpack-pa-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860104" comment="glibc-langpack-pap-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860105" comment="glibc-langpack-pl-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860106" comment="glibc-langpack-ps-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860107" comment="glibc-langpack-pt-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860108" comment="glibc-langpack-quz-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860109" comment="glibc-langpack-raj-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860110" comment="glibc-langpack-ro-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860111" comment="glibc-langpack-ru-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860112" comment="glibc-langpack-rw-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860113" comment="glibc-langpack-sa-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860114" comment="glibc-langpack-sah-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860115" comment="glibc-langpack-sat-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860116" comment="glibc-langpack-sc-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860117" comment="glibc-langpack-sd-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860118" comment="glibc-langpack-se-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860119" comment="glibc-langpack-sgs-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860120" comment="glibc-langpack-shn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860121" comment="glibc-langpack-shs-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860122" comment="glibc-langpack-si-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860123" comment="glibc-langpack-sid-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860124" comment="glibc-langpack-sk-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860125" comment="glibc-langpack-sl-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860126" comment="glibc-langpack-sm-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860127" comment="glibc-langpack-so-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860128" comment="glibc-langpack-sq-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860129" comment="glibc-langpack-sr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860130" comment="glibc-langpack-ss-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860131" comment="glibc-langpack-st-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860132" comment="glibc-langpack-sv-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860133" comment="glibc-langpack-sw-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860134" comment="glibc-langpack-szl-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860135" comment="glibc-langpack-ta-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860136" comment="glibc-langpack-tcy-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860137" comment="glibc-langpack-te-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860138" comment="glibc-langpack-tg-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860139" comment="glibc-langpack-th-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860140" comment="glibc-langpack-the-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860141" comment="glibc-langpack-ti-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860142" comment="glibc-langpack-tig-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860143" comment="glibc-langpack-tk-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860144" comment="glibc-langpack-tl-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860145" comment="glibc-langpack-tn-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860146" comment="glibc-langpack-to-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860147" comment="glibc-langpack-tpi-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860148" comment="glibc-langpack-tr-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860149" comment="glibc-langpack-ts-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860150" comment="glibc-langpack-tt-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860151" comment="glibc-langpack-ug-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860152" comment="glibc-langpack-uk-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860153" comment="glibc-langpack-unm-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860154" comment="glibc-langpack-ur-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860155" comment="glibc-langpack-uz-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860156" comment="glibc-langpack-ve-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860157" comment="glibc-langpack-vi-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860158" comment="glibc-langpack-wa-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860159" comment="glibc-langpack-wae-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860160" comment="glibc-langpack-wal-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860161" comment="glibc-langpack-wo-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860162" comment="glibc-langpack-xh-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860163" comment="glibc-langpack-yi-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860164" comment="glibc-langpack-yo-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860165" comment="glibc-langpack-yue-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860166" comment="glibc-langpack-yuw-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860167" comment="glibc-langpack-zh-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860168" comment="glibc-langpack-zu-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860169" comment="glibc-locale-source-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860170" comment="glibc-minimal-langpack-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860171" comment="glibc-nss-devel-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860172" comment="glibc-static-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860173" comment="glibc-utils-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860174" comment="libnsl-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860175" comment="nscd-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860176" comment="nss_db-2.28-236.el8_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860177" comment="nss_hesiod-2.28-236.el8_9.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2911" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2778.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2778.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860470" comment="nodejs-20.12.2-2.module+el8.9.0+21743+0b3f1be2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860471" comment="nodejs-devel-20.12.2-2.module+el8.9.0+21743+0b3f1be2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860472" comment="nodejs-docs-20.12.2-2.module+el8.9.0+21743+0b3f1be2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860473" comment="nodejs-full-i18n-20.12.2-2.module+el8.9.0+21743+0b3f1be2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843609" comment="nodejs-nodemon-3.0.1-1.module+el8.9.0+20473+c4e3d824 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843610" comment="nodejs-packaging-2021.06-4.module+el8.9.0+19519+e25b965a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843611" comment="nodejs-packaging-bundler-2021.06-4.module+el8.9.0+19519+e25b965a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860474" comment="npm-10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2912" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2780.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2780.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860400" comment="nodejs-18.20.2-1.module+el8.9.0+21767+537f34ee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860401" comment="nodejs-devel-18.20.2-1.module+el8.9.0+21767+537f34ee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860402" comment="nodejs-docs-18.20.2-1.module+el8.9.0+21767+537f34ee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860403" comment="nodejs-full-i18n-18.20.2-1.module+el8.9.0+21767+537f34ee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852401" comment="nodejs-nodemon-3.0.1-1.module+el8.9.0+21190+5ebd2c33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852402" comment="nodejs-packaging-2021.06-4.module+el8.9.0+21190+5ebd2c33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852403" comment="nodejs-packaging-bundler-2021.06-4.module+el8.9.0+21190+5ebd2c33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860404" comment="npm-10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2913" version="1" class="patch">
	<metadata>
		<title>security update for resource-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2952.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2952.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865914" comment="resource-agents-4.9.0-54.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865915" comment="resource-agents-aliyun-4.9.0-54.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865916" comment="resource-agents-gcp-4.9.0-54.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865917" comment="resource-agents-paf-4.9.0-54.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2914" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2953.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2953.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872679" comment="pcs-0.10.18-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872680" comment="pcs-snmp-0.10.18-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2915" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-21710" ref_url="https://www.suse.com/security/cve/CVE-2020-21710/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2966.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2966.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21710/">CVE-2020-21710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21710">CVE-2020-21710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874316" comment="ghostscript-9.27-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874317" comment="ghostscript-doc-9.27-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874318" comment="ghostscript-tools-dvipdf-9.27-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874319" comment="ghostscript-tools-fonts-9.27-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874320" comment="ghostscript-tools-printing-9.27-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874321" comment="ghostscript-x11-9.27-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874322" comment="libgs-9.27-12.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874323" comment="libgs-devel-9.27-12.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2916" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323/" source="CVE"/>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2968.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2968.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865918" comment="fence-agents-aliyun-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865919" comment="fence-agents-all-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865920" comment="fence-agents-amt-ws-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865921" comment="fence-agents-apc-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865922" comment="fence-agents-apc-snmp-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865923" comment="fence-agents-aws-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865924" comment="fence-agents-azure-arm-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865925" comment="fence-agents-bladecenter-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865926" comment="fence-agents-brocade-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865927" comment="fence-agents-cisco-mds-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865928" comment="fence-agents-cisco-ucs-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865929" comment="fence-agents-common-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865930" comment="fence-agents-compute-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865931" comment="fence-agents-drac5-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865932" comment="fence-agents-eaton-snmp-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865933" comment="fence-agents-emerson-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865934" comment="fence-agents-eps-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865935" comment="fence-agents-gce-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865936" comment="fence-agents-heuristics-ping-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865937" comment="fence-agents-hpblade-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865938" comment="fence-agents-ibm-powervs-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865939" comment="fence-agents-ibm-vpc-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865940" comment="fence-agents-ibmblade-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865941" comment="fence-agents-ifmib-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865942" comment="fence-agents-ilo-moonshot-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865943" comment="fence-agents-ilo-mp-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865944" comment="fence-agents-ilo-ssh-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865945" comment="fence-agents-ilo2-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865946" comment="fence-agents-intelmodular-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865947" comment="fence-agents-ipdu-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865948" comment="fence-agents-ipmilan-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865949" comment="fence-agents-kdump-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865950" comment="fence-agents-kubevirt-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865951" comment="fence-agents-lpar-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865952" comment="fence-agents-mpath-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865953" comment="fence-agents-openstack-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865954" comment="fence-agents-redfish-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865955" comment="fence-agents-rhevm-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865956" comment="fence-agents-rsa-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865957" comment="fence-agents-rsb-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865958" comment="fence-agents-sbd-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865959" comment="fence-agents-scsi-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865960" comment="fence-agents-virsh-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865961" comment="fence-agents-vmware-rest-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865962" comment="fence-agents-vmware-soap-4.2.1-129.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865963" comment="fence-agents-wti-4.2.1-129.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2917" version="1" class="patch">
	<metadata>
		<title>security update for libX11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785/" source="CVE"/>
		<reference ref_id="CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786/" source="CVE"/>
		<reference ref_id="CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2973.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2973.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865964" comment="libX11-1.6.8-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865965" comment="libX11-common-1.6.8-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865966" comment="libX11-devel-1.6.8-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865967" comment="libX11-xcb-1.6.8-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2918" version="1" class="patch">
	<metadata>
		<title>security update for libXpm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788/" source="CVE"/>
		<reference ref_id="CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2974.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2974.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865968" comment="libXpm-3.5.12-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865969" comment="libXpm-devel-3.5.12-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2919" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-36024" ref_url="https://www.suse.com/security/cve/CVE-2020-36024/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2979.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2979.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36024/">CVE-2020-36024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36024">CVE-2020-36024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865970" comment="poppler-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865971" comment="poppler-cpp-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865972" comment="poppler-cpp-devel-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865973" comment="poppler-devel-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865974" comment="poppler-glib-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865975" comment="poppler-glib-devel-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865976" comment="poppler-glib-doc-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865977" comment="poppler-qt5-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865978" comment="poppler-qt5-devel-20.11.0-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865979" comment="poppler-utils-20.11.0-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2920" version="1" class="patch">
	<metadata>
		<title>security update for harfbuzz (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2980.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2980.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867133" comment="harfbuzz-1.7.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867134" comment="harfbuzz-devel-1.7.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867135" comment="harfbuzz-icu-1.7.5-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2921" version="1" class="patch">
	<metadata>
		<title>security update for frr (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-31490" ref_url="https://www.suse.com/security/cve/CVE-2023-31490/" source="CVE"/>
		<reference ref_id="CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358/" source="CVE"/>
		<reference ref_id="CVE-2023-41909" ref_url="https://www.suse.com/security/cve/CVE-2023-41909/" source="CVE"/>
		<reference ref_id="CVE-2023-46752" ref_url="https://www.suse.com/security/cve/CVE-2023-46752/" source="CVE"/>
		<reference ref_id="CVE-2023-46753" ref_url="https://www.suse.com/security/cve/CVE-2023-46753/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2981.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2981.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31490/">CVE-2023-31490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31490">CVE-2023-31490 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41909/">CVE-2023-41909 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41909">CVE-2023-41909 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46752/">CVE-2023-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46752">CVE-2023-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46753/">CVE-2023-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46753">CVE-2023-46753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865980" comment="frr-7.5.1-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865981" comment="frr-selinux-7.5.1-22.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2922" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2014-1745" ref_url="https://www.suse.com/security/cve/CVE-2014-1745/" source="CVE"/>
		<reference ref_id="CVE-2023-32359" ref_url="https://www.suse.com/security/cve/CVE-2023-32359/" source="CVE"/>
		<reference ref_id="CVE-2023-39928" ref_url="https://www.suse.com/security/cve/CVE-2023-39928/" source="CVE"/>
		<reference ref_id="CVE-2023-40414" ref_url="https://www.suse.com/security/cve/CVE-2023-40414/" source="CVE"/>
		<reference ref_id="CVE-2023-41983" ref_url="https://www.suse.com/security/cve/CVE-2023-41983/" source="CVE"/>
		<reference ref_id="CVE-2023-42852" ref_url="https://www.suse.com/security/cve/CVE-2023-42852/" source="CVE"/>
		<reference ref_id="CVE-2023-42875" ref_url="https://www.suse.com/security/cve/CVE-2023-42875/" source="CVE"/>
		<reference ref_id="CVE-2023-42883" ref_url="https://www.suse.com/security/cve/CVE-2023-42883/" source="CVE"/>
		<reference ref_id="CVE-2023-42890" ref_url="https://www.suse.com/security/cve/CVE-2023-42890/" source="CVE"/>
		<reference ref_id="CVE-2023-42917" ref_url="https://www.suse.com/security/cve/CVE-2023-42917/" source="CVE"/>
		<reference ref_id="CVE-2023-42970" ref_url="https://www.suse.com/security/cve/CVE-2023-42970/" source="CVE"/>
		<reference ref_id="CVE-2023-43000" ref_url="https://www.suse.com/security/cve/CVE-2023-43000/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2982.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2982.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-1745/">CVE-2014-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1745">CVE-2014-1745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32359/">CVE-2023-32359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32359">CVE-2023-32359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39928/">CVE-2023-39928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40414/">CVE-2023-40414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40414">CVE-2023-40414 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41983/">CVE-2023-41983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41983">CVE-2023-41983 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42852/">CVE-2023-42852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42852">CVE-2023-42852 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42875/">CVE-2023-42875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42875">CVE-2023-42875 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42883/">CVE-2023-42883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42883">CVE-2023-42883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42890/">CVE-2023-42890 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42890">CVE-2023-42890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42917/">CVE-2023-42917 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42917">CVE-2023-42917 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42970/">CVE-2023-42970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42970">CVE-2023-42970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-43000/">CVE-2023-43000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000">CVE-2023-43000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874324" comment="webkit2gtk3-2.42.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874325" comment="webkit2gtk3-devel-2.42.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874326" comment="webkit2gtk3-jsc-2.42.5-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874327" comment="webkit2gtk3-jsc-devel-2.42.5-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2923" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2986.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2986.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865982" comment="python3.11-urllib3-1.26.12-2.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2924" version="1" class="patch">
	<metadata>
		<title>security update for Cython (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<reference ref_id="CVE-2022-48560" ref_url="https://www.suse.com/security/cve/CVE-2022-48560/" source="CVE"/>
		<reference ref_id="CVE-2022-48565" ref_url="https://www.suse.com/security/cve/CVE-2022-48565/" source="CVE"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2987.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2987.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48560/">CVE-2022-48560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48565/">CVE-2022-48565 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009843400" comment="babel-2.5.1-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843401" comment="python-nose-docs-1.3.7-31.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843402" comment="python-psycopg2-doc-2.7.5-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843403" comment="python-sqlalchemy-doc-1.3.2-2.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872458" comment="python2-2.7.18-17.module+el8.10.0+20822+a15ec22d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843405" comment="python2-Cython-0.28.1-7.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843406" comment="python2-PyMySQL-0.8.0-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843407" comment="python2-attrs-17.4.0-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843408" comment="python2-babel-2.5.1-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843409" comment="python2-backports-1.0-16.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843410" comment="python2-backports-ssl_match_hostname-3.5.0.1-12.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843411" comment="python2-bson-3.7.0-1.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843412" comment="python2-chardet-3.0.4-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843413" comment="python2-coverage-4.5.1-5.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872459" comment="python2-debug-2.7.18-17.module+el8.10.0+20822+a15ec22d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872460" comment="python2-devel-2.7.18-17.module+el8.10.0+20822+a15ec22d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843416" comment="python2-dns-1.15.0-10.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843417" comment="python2-docs-2.7.16-2.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843418" comment="python2-docs-info-2.7.16-2.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843419" comment="python2-docutils-0.14-12.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843420" comment="python2-funcsigs-1.0.2-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843421" comment="python2-idna-2.5-7.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843422" comment="python2-ipaddress-1.0.18-6.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872461" comment="python2-jinja2-2.10-10.module+el8.10.0+21290+abd5b761 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872462" comment="python2-libs-2.7.18-17.module+el8.10.0+20822+a15ec22d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843425" comment="python2-lxml-4.2.3-6.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843426" comment="python2-markupsafe-0.23-19.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843427" comment="python2-mock-2.0.0-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843428" comment="python2-nose-1.3.7-31.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843429" comment="python2-numpy-1.14.2-16.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843430" comment="python2-numpy-doc-1.14.2-16.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843431" comment="python2-numpy-f2py-1.14.2-16.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843432" comment="python2-pip-9.0.3-19.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843433" comment="python2-pip-wheel-9.0.3-19.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843434" comment="python2-pluggy-0.6.0-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843435" comment="python2-psycopg2-2.7.5-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843436" comment="python2-psycopg2-debug-2.7.5-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843437" comment="python2-psycopg2-tests-2.7.5-8.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843438" comment="python2-py-1.5.3-6.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843439" comment="python2-pygments-2.2.0-22.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843440" comment="python2-pymongo-3.7.0-1.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843441" comment="python2-pymongo-gridfs-3.7.0-1.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843442" comment="python2-pysocks-1.6.8-6.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843443" comment="python2-pytest-3.4.2-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843444" comment="python2-pytest-mock-1.9.0-4.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843445" comment="python2-pytz-2017.2-13.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843446" comment="python2-pyyaml-3.12-16.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843447" comment="python2-requests-2.20.0-4.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843448" comment="python2-rpm-macros-3-38.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843449" comment="python2-scipy-1.0.0-22.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872463" comment="python2-setuptools-39.0.1-14.module+el8.10.0+20444+3bf7fee4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872464" comment="python2-setuptools-wheel-39.0.1-14.module+el8.10.0+20444+3bf7fee4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843452" comment="python2-setuptools_scm-1.15.7-6.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843453" comment="python2-six-1.11.0-6.module+el8.9.0+18326+1b5baeee is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843454" comment="python2-sqlalchemy-1.3.2-2.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872465" comment="python2-test-2.7.18-17.module+el8.10.0+20822+a15ec22d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872466" comment="python2-tkinter-2.7.18-17.module+el8.10.0+20822+a15ec22d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872467" comment="python2-tools-2.7.18-17.module+el8.10.0+20822+a15ec22d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872468" comment="python2-urllib3-1.24.2-4.module+el8.10.0+20444+3bf7fee4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843459" comment="python2-virtualenv-15.1.0-22.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843460" comment="python2-wheel-0.31.1-3.module+el8.9.0+19487+7dc18407 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843461" comment="python2-wheel-wheel-0.31.1-3.module+el8.9.0+19487+7dc18407 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2925" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-25091" ref_url="https://www.suse.com/security/cve/CVE-2018-25091/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45287" ref_url="https://www.suse.com/security/cve/CVE-2023-45287/" source="CVE"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2024-23650" ref_url="https://www.suse.com/security/cve/CVE-2024-23650/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2988.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2988.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-25091/">CVE-2018-25091 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25091">CVE-2018-25091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45287/">CVE-2023-45287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23650/">CVE-2024-23650 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23650">CVE-2024-23650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867155" comment="aardvark-dns-1.10.0-1.module+el8.10.0+21209+52deeb51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867957" comment="buildah-1.33.6-2.module+el8.10.0+21371+46937ece is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867958" comment="buildah-tests-1.33.6-2.module+el8.10.0+21371+46937ece is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867158" comment="cockpit-podman-84.1-1.module+el8.10.0+21373+0d273fdf is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867159" comment="conmon-2.1.10-1.module+el8.10.0+21077+98b84d8a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867160" comment="container-selinux-2.229.0-2.module+el8.10.0+21196+3f0abbca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867161" comment="containernetworking-plugins-1.4.0-2.module+el8.10.0+21366+f9cb49f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867162" comment="containers-common-1-81.module+el8.10.0+21340+c6c7475a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867959" comment="crit-3.18-4.module+el8.9.0+20326+387084d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867960" comment="criu-3.18-4.module+el8.9.0+20326+387084d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867961" comment="criu-devel-3.18-4.module+el8.9.0+20326+387084d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867962" comment="criu-libs-3.18-4.module+el8.9.0+20326+387084d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867167" comment="crun-1.14.3-2.module+el8.10.0+21340+c6c7475a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867168" comment="fuse-overlayfs-1.13-1.module+el8.10.0+20412+95ee28e2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867963" comment="libslirp-4.4.0-1.module+el8.9.0+20326+387084d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867964" comment="libslirp-devel-4.4.0-1.module+el8.9.0+20326+387084d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867171" comment="netavark-1.10.3-1.module+el8.10.0+21306+6be40ce7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867172" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+20565+a40ba0e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867965" comment="podman-4.9.4-0.1.module+el8.10.0+21350+ea09fba1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867966" comment="podman-catatonit-4.9.4-0.1.module+el8.10.0+21350+ea09fba1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867967" comment="podman-docker-4.9.4-0.1.module+el8.10.0+21350+ea09fba1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867968" comment="podman-gvproxy-4.9.4-0.1.module+el8.10.0+21350+ea09fba1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867969" comment="podman-plugins-4.9.4-0.1.module+el8.10.0+21350+ea09fba1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867970" comment="podman-remote-4.9.4-0.1.module+el8.10.0+21350+ea09fba1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867971" comment="podman-tests-4.9.4-0.1.module+el8.10.0+21350+ea09fba1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867972" comment="python3-criu-3.18-4.module+el8.9.0+20326+387084d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867181" comment="python3-podman-4.9.0-1.module+el8.10.0+21196+3f0abbca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867182" comment="runc-1.1.12-1.module+el8.10.0+21251+62b7388c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867973" comment="skopeo-1.14.3-0.1.module+el8.10.0+21251+62b7388c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867974" comment="skopeo-tests-1.14.3-0.1.module+el8.10.0+21251+62b7388c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867185" comment="slirp4netns-1.2.3-1.module+el8.10.0+21306+6be40ce7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867186" comment="toolbox-0.0.99.5-2.module+el8.10.0+21341+ff0b5f89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867187" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+21341+ff0b5f89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867975" comment="udica-0.2.6-20.module+el8.9.0+20326+387084d0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2926" version="1" class="patch">
	<metadata>
		<title>security update for LibRaw (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-32142" ref_url="https://www.suse.com/security/cve/CVE-2021-32142/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2994.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2994.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-32142/">CVE-2021-32142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32142">CVE-2021-32142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865983" comment="LibRaw-0.19.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865984" comment="LibRaw-devel-0.19.5-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2927" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380/" source="CVE"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2995.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2995.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865985" comment="xorg-x11-server-Xdmx-1.20.11-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865986" comment="xorg-x11-server-Xephyr-1.20.11-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865987" comment="xorg-x11-server-Xnest-1.20.11-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865988" comment="xorg-x11-server-Xorg-1.20.11-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865989" comment="xorg-x11-server-Xvfb-1.20.11-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865990" comment="xorg-x11-server-common-1.20.11-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865991" comment="xorg-x11-server-devel-1.20.11-22.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865992" comment="xorg-x11-server-source-1.20.11-22.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2928" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2996.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2996.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865993" comment="xorg-x11-server-Xwayland-21.1.3-15.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2929" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3005.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3005.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865994" comment="python3-pillow-5.1.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865995" comment="python3-pillow-devel-5.1.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865996" comment="python3-pillow-doc-5.1.1-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865997" comment="python3-pillow-tk-5.1.1-20.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2930" version="1" class="patch">
	<metadata>
		<title>security update for pmix (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-41915" ref_url="https://www.suse.com/security/cve/CVE-2023-41915/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41915/">CVE-2023-41915 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41915">CVE-2023-41915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865998" comment="pmix-2.2.5-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865999" comment="pmix-devel-2.2.5-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2931" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-36763" ref_url="https://www.suse.com/security/cve/CVE-2022-36763/" source="CVE"/>
		<reference ref_id="CVE-2022-36764" ref_url="https://www.suse.com/security/cve/CVE-2022-36764/" source="CVE"/>
		<reference ref_id="CVE-2022-36765" ref_url="https://www.suse.com/security/cve/CVE-2022-36765/" source="CVE"/>
		<reference ref_id="CVE-2023-45229" ref_url="https://www.suse.com/security/cve/CVE-2023-45229/" source="CVE"/>
		<reference ref_id="CVE-2023-45231" ref_url="https://www.suse.com/security/cve/CVE-2023-45231/" source="CVE"/>
		<reference ref_id="CVE-2023-45232" ref_url="https://www.suse.com/security/cve/CVE-2023-45232/" source="CVE"/>
		<reference ref_id="CVE-2023-45233" ref_url="https://www.suse.com/security/cve/CVE-2023-45233/" source="CVE"/>
		<reference ref_id="CVE-2023-45235" ref_url="https://www.suse.com/security/cve/CVE-2023-45235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3017.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3017.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36763/">CVE-2022-36763 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36763">CVE-2022-36763 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36764/">CVE-2022-36764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36764">CVE-2022-36764 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36765/">CVE-2022-36765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36765">CVE-2022-36765 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45229/">CVE-2023-45229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45229">CVE-2023-45229 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45231/">CVE-2023-45231 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45231">CVE-2023-45231 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45232/">CVE-2023-45232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45232">CVE-2023-45232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45233/">CVE-2023-45233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45233">CVE-2023-45233 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45235/">CVE-2023-45235 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45235">CVE-2023-45235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866000" comment="edk2-ovmf-20220126gitbb1bba3d77-13.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2932" version="1" class="patch">
	<metadata>
		<title>security update for motif (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788/" source="CVE"/>
		<reference ref_id="CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3022.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3022.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866001" comment="motif-2.3.4-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866002" comment="motif-devel-2.3.4-20.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866003" comment="motif-static-2.3.4-20.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2933" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-33065" ref_url="https://www.suse.com/security/cve/CVE-2022-33065/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3030.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3030.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33065/">CVE-2022-33065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33065">CVE-2022-33065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866004" comment="libsndfile-1.0.28-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866005" comment="libsndfile-devel-1.0.28-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866006" comment="libsndfile-utils-1.0.28-14.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2934" version="1" class="patch">
	<metadata>
		<title>security update for ansible-core (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3043.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3043.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872681" comment="ansible-core-2.16.3-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872682" comment="ansible-test-2.16.3-2.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2935" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1062" ref_url="https://www.suse.com/security/cve/CVE-2024-1062/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3047.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3047.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1062/">CVE-2024-1062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1062">CVE-2024-1062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866007" comment="389-ds-base-1.4.3.39-3.module+el8.10.0+21535+f663b039 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866008" comment="389-ds-base-devel-1.4.3.39-3.module+el8.10.0+21535+f663b039 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866009" comment="389-ds-base-legacy-tools-1.4.3.39-3.module+el8.10.0+21535+f663b039 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866010" comment="389-ds-base-libs-1.4.3.39-3.module+el8.10.0+21535+f663b039 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866011" comment="389-ds-base-snmp-1.4.3.39-3.module+el8.10.0+21535+f663b039 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866012" comment="python3-lib389-1.4.3.39-3.module+el8.10.0+21535+f663b039 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2936" version="1" class="patch">
	<metadata>
		<title>security update for perl-Convert-ASN1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7488">CVE-2013-7488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866013" comment="perl-Convert-ASN1-0.27-18.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2937" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-51714" ref_url="https://www.suse.com/security/cve/CVE-2023-51714/" source="CVE"/>
		<reference ref_id="CVE-2024-25580" ref_url="https://www.suse.com/security/cve/CVE-2024-25580/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3056.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3056.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51714/">CVE-2023-51714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51714">CVE-2023-51714 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25580/">CVE-2024-25580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25580">CVE-2024-25580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867136" comment="qt5-qtbase-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867137" comment="qt5-qtbase-common-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867138" comment="qt5-qtbase-devel-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867139" comment="qt5-qtbase-examples-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867140" comment="qt5-qtbase-gui-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867141" comment="qt5-qtbase-mysql-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867142" comment="qt5-qtbase-odbc-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867143" comment="qt5-qtbase-postgresql-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867144" comment="qt5-qtbase-private-devel-5.15.3-7.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867145" comment="qt5-qtbase-static-5.15.3-7.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2938" version="1" class="patch">
	<metadata>
		<title>security update for mutt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4874" ref_url="https://www.suse.com/security/cve/CVE-2023-4874/" source="CVE"/>
		<reference ref_id="CVE-2023-4875" ref_url="https://www.suse.com/security/cve/CVE-2023-4875/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3058.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3058.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4874/">CVE-2023-4874 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4874">CVE-2023-4874 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4875/">CVE-2023-4875 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4875">CVE-2023-4875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866014" comment="mutt-2.0.7-3.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2939" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-4645" ref_url="https://www.suse.com/security/cve/CVE-2022-4645/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4645/">CVE-2022-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4645">CVE-2022-4645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866015" comment="libtiff-4.0.9-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866016" comment="libtiff-devel-4.0.9-31.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866017" comment="libtiff-tools-4.0.9-31.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2940" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<reference ref_id="CVE-2023-40475" ref_url="https://www.suse.com/security/cve/CVE-2023-40475/" source="CVE"/>
		<reference ref_id="CVE-2023-40476" ref_url="https://www.suse.com/security/cve/CVE-2023-40476/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40475/">CVE-2023-40475 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40475">CVE-2023-40475 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-40476/">CVE-2023-40476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40476">CVE-2023-40476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867146" comment="gstreamer1-plugins-bad-free-1.16.1-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867147" comment="gstreamer1-plugins-bad-free-devel-1.16.1-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2941" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3062.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3062.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866018" comment="python3.11-3.11.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866019" comment="python3.11-debug-3.11.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866020" comment="python3.11-devel-3.11.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866021" comment="python3.11-idle-3.11.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866022" comment="python3.11-libs-3.11.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866023" comment="python3.11-rpm-macros-3.11.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866024" comment="python3.11-test-3.11.7-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866025" comment="python3.11-tkinter-3.11.7-1.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2942" version="1" class="patch">
	<metadata>
		<title>security update for exempi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-18651" ref_url="https://www.suse.com/security/cve/CVE-2020-18651/" source="CVE"/>
		<reference ref_id="CVE-2020-18652" ref_url="https://www.suse.com/security/cve/CVE-2020-18652/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3066.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3066.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18651/">CVE-2020-18651 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18651">CVE-2020-18651 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18652/">CVE-2020-18652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18652">CVE-2020-18652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866026" comment="exempi-2.4.5-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866027" comment="exempi-devel-2.4.5-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2943" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866028" comment="tigervnc-1.13.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866029" comment="tigervnc-icons-1.13.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866030" comment="tigervnc-license-1.13.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866031" comment="tigervnc-selinux-1.13.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866032" comment="tigervnc-server-1.13.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866033" comment="tigervnc-server-minimal-1.13.1-8.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866034" comment="tigervnc-server-module-1.13.1-8.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2944" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3088.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3088.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867148" comment="gstreamer1-plugins-base-1.16.1-3.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867149" comment="gstreamer1-plugins-base-devel-1.16.1-3.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2945" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-good (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3089.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3089.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867150" comment="gstreamer1-plugins-good-1.16.1-4.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867151" comment="gstreamer1-plugins-good-gtk-1.16.1-4.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2946" version="1" class="patch">
	<metadata>
		<title>security update for perl-CPAN (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3094.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3094.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866035" comment="perl-CPAN-2.18-399.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2947" version="1" class="patch">
	<metadata>
		<title>security update for vorbis-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-43361" ref_url="https://www.suse.com/security/cve/CVE-2023-43361/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3095.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3095.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-43361/">CVE-2023-43361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43361">CVE-2023-43361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866036" comment="vorbis-tools-1.4.0-29.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2948" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3102.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3102.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866037" comment="python3-jinja2-2.10.1-4.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2949" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-cryptography (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3105.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3105.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866038" comment="python3.11-cryptography-37.0.2-6.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2950" version="1" class="patch">
	<metadata>
		<title>security update for freeglut (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24258" ref_url="https://www.suse.com/security/cve/CVE-2024-24258/" source="CVE"/>
		<reference ref_id="CVE-2024-24259" ref_url="https://www.suse.com/security/cve/CVE-2024-24259/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3120.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3120.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24258/">CVE-2024-24258 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24258">CVE-2024-24258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24259/">CVE-2024-24259 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24259">CVE-2024-24259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866039" comment="freeglut-3.0.0-9.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866040" comment="freeglut-devel-3.0.0-9.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2951" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-31122" ref_url="https://www.suse.com/security/cve/CVE-2023-31122/" source="CVE"/>
		<reference ref_id="CVE-2023-45802" ref_url="https://www.suse.com/security/cve/CVE-2023-45802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3121.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3121.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31122/">CVE-2023-31122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31122">CVE-2023-31122 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45802/">CVE-2023-45802 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45802">CVE-2023-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866041" comment="httpd-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866042" comment="httpd-devel-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866043" comment="httpd-filesystem-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866044" comment="httpd-manual-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866045" comment="httpd-tools-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866046" comment="mod_http2-1.15.7-10.module+el8.10.0+21653+eaff63f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866047" comment="mod_ldap-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854384" comment="mod_md-2.0.8-8.module+el8.9.0+19080+567b90f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866048" comment="mod_proxy_html-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866049" comment="mod_session-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866050" comment="mod_ssl-2.4.37-64.module+el8.10.0+21332+dfb1b40e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2952" version="1" class="patch">
	<metadata>
		<title>security update for zziplib (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-18770" ref_url="https://www.suse.com/security/cve/CVE-2020-18770/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18770/">CVE-2020-18770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18770">CVE-2020-18770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867152" comment="zziplib-0.13.68-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867153" comment="zziplib-devel-0.13.68-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867154" comment="zziplib-utils-0.13.68-13.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2953" version="1" class="patch">
	<metadata>
		<title>security update for perl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-47038" ref_url="https://www.suse.com/security/cve/CVE-2023-47038/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47038/">CVE-2023-47038 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874328" comment="perl-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874329" comment="perl-Algorithm-Diff-1.1903-10.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874330" comment="perl-Archive-Tar-2.38-3.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874331" comment="perl-Archive-Zip-1.68-3.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874332" comment="perl-Attribute-Handlers-1.01-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874333" comment="perl-AutoLoader-5.74-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874334" comment="perl-AutoSplit-5.74-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874335" comment="perl-B-1.80-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874336" comment="perl-Benchmark-1.23-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874337" comment="perl-CPAN-2.28-5.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874338" comment="perl-CPAN-DistnameInfo-0.12-13.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874339" comment="perl-CPAN-Meta-2.150010-397.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874340" comment="perl-CPAN-Meta-Requirements-2.140-397.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874341" comment="perl-CPAN-Meta-YAML-0.018-1001.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874342" comment="perl-Carp-1.50-439.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874343" comment="perl-Class-Struct-0.66-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874344" comment="perl-Compress-Bzip2-2.28-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874345" comment="perl-Compress-Raw-Bzip2-2.096-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874346" comment="perl-Compress-Raw-Lzma-2.096-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874347" comment="perl-Compress-Raw-Zlib-2.096-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874348" comment="perl-Config-Extensions-0.03-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874349" comment="perl-Config-Perl-V-0.32-441.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874350" comment="perl-DBM_Filter-0.06-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874351" comment="perl-DB_File-1.855-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874352" comment="perl-Data-Dumper-2.174-440.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874353" comment="perl-Data-OptList-0.110-7.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874354" comment="perl-Data-Section-0.200007-8.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874355" comment="perl-Devel-PPPort-3.62-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874356" comment="perl-Devel-Peek-1.28-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874357" comment="perl-Devel-SelfStubber-1.06-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874358" comment="perl-Devel-Size-0.83-3.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874359" comment="perl-Digest-1.20-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874360" comment="perl-Digest-MD5-2.58-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874361" comment="perl-Digest-SHA-6.02-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874362" comment="perl-DirHandle-1.05-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874363" comment="perl-Dumpvalue-2.27-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874364" comment="perl-DynaLoader-1.47-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874365" comment="perl-Encode-3.08-461.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874366" comment="perl-Encode-Locale-1.05-10.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874367" comment="perl-Encode-devel-3.08-461.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874368" comment="perl-English-1.11-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874369" comment="perl-Env-1.04-396.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874370" comment="perl-Errno-1.30-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874371" comment="perl-Exporter-5.74-458.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874372" comment="perl-ExtUtils-CBuilder-0.280236-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874373" comment="perl-ExtUtils-Command-7.46-3.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874374" comment="perl-ExtUtils-Constant-0.25-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874375" comment="perl-ExtUtils-Embed-1.35-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874376" comment="perl-ExtUtils-Install-2.20-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874377" comment="perl-ExtUtils-MM-Utils-7.46-3.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874378" comment="perl-ExtUtils-MakeMaker-7.46-3.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874379" comment="perl-ExtUtils-Manifest-1.73-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874380" comment="perl-ExtUtils-Miniperl-1.09-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874381" comment="perl-ExtUtils-ParseXS-3.40-439.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874382" comment="perl-Fcntl-1.13-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874383" comment="perl-Fedora-VSP-0.001-10.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874384" comment="perl-File-Basename-2.85-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874385" comment="perl-File-Compare-1.100.600-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874386" comment="perl-File-Copy-2.34-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874387" comment="perl-File-DosGlob-1.12-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874388" comment="perl-File-Fetch-1.00-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874389" comment="perl-File-Find-1.37-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874390" comment="perl-File-HomeDir-1.004-6.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874391" comment="perl-File-Path-2.16-439.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874392" comment="perl-File-Temp-0.231.100-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874393" comment="perl-File-Which-1.23-4.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874394" comment="perl-File-stat-1.09-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874395" comment="perl-FileCache-1.10-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874396" comment="perl-FileHandle-2.03-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874397" comment="perl-Filter-1.60-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874398" comment="perl-Filter-Simple-0.96-457.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874399" comment="perl-FindBin-1.51-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874400" comment="perl-GDBM_File-1.18-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874401" comment="perl-Getopt-Long-2.52-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874402" comment="perl-Getopt-Std-1.12-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874403" comment="perl-HTTP-Tiny-0.078-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874404" comment="perl-Hash-Util-0.23-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874405" comment="perl-Hash-Util-FieldHash-1.20-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874406" comment="perl-I18N-Collate-1.02-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874407" comment="perl-I18N-LangTags-0.44-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874408" comment="perl-I18N-Langinfo-0.19-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874409" comment="perl-IO-1.43-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874410" comment="perl-IO-Compress-2.096-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874411" comment="perl-IO-Compress-Lzma-2.096-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874412" comment="perl-IO-Socket-IP-0.41-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874413" comment="perl-IO-Zlib-1.10-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874414" comment="perl-IPC-Cmd-1.04-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874415" comment="perl-IPC-Open3-1.21-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874416" comment="perl-IPC-SysV-2.09-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874417" comment="perl-IPC-System-Simple-1.30-3.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874418" comment="perl-Importer-0.025-6.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874419" comment="perl-JSON-PP-4.04-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874420" comment="perl-Locale-Maketext-1.29-440.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874421" comment="perl-Locale-Maketext-Simple-0.21-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874422" comment="perl-MIME-Base64-3.15-1001.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874423" comment="perl-MRO-Compat-0.13-5.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874424" comment="perl-Math-BigInt-1.9998.18-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874425" comment="perl-Math-BigInt-FastCalc-0.500.900-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874426" comment="perl-Math-BigRat-0.2614-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874427" comment="perl-Math-Complex-1.59-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874428" comment="perl-Memoize-1.03-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874429" comment="perl-Module-Build-0.42.31-5.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874430" comment="perl-Module-CoreList-5.20211020-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874431" comment="perl-Module-CoreList-tools-5.20211020-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874432" comment="perl-Module-Load-0.36-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874433" comment="perl-Module-Load-Conditional-0.74-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874434" comment="perl-Module-Loaded-0.08-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874435" comment="perl-Module-Metadata-1.000037-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874436" comment="perl-NDBM_File-1.15-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874437" comment="perl-NEXT-0.67-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874438" comment="perl-Net-1.02-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874439" comment="perl-Net-Ping-2.72-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874440" comment="perl-ODBM_File-1.16-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874441" comment="perl-Object-HashBase-0.009-4.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874442" comment="perl-Object-HashBase-tools-0.009-4.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874443" comment="perl-Opcode-1.48-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874444" comment="perl-POSIX-1.94-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874445" comment="perl-Package-Generator-1.106-12.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874446" comment="perl-Params-Check-0.38-396.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874447" comment="perl-Params-Util-1.102-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874448" comment="perl-PathTools-3.78-439.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874449" comment="perl-Perl-OSType-1.010-397.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874450" comment="perl-PerlIO-via-QuotedPrint-0.09-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874451" comment="perl-Pod-Checker-1.74-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874452" comment="perl-Pod-Escapes-1.07-396.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874453" comment="perl-Pod-Functions-1.13-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874454" comment="perl-Pod-Html-1.25-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874455" comment="perl-Pod-Parser-1.63-1001.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874456" comment="perl-Pod-Perldoc-3.28.01-443.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874457" comment="perl-Pod-Simple-3.42-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874458" comment="perl-Pod-Usage-2.01-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874459" comment="perl-Safe-2.41-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874460" comment="perl-Scalar-List-Utils-1.55-457.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874461" comment="perl-Search-Dict-1.07-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874462" comment="perl-SelectSaver-1.02-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874463" comment="perl-SelfLoader-1.26-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874464" comment="perl-Socket-2.031-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874465" comment="perl-Software-License-0.103014-5.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874466" comment="perl-Storable-3.21-457.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874467" comment="perl-Sub-Exporter-0.987-17.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874468" comment="perl-Sub-Install-0.928-15.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874469" comment="perl-Symbol-1.08-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874470" comment="perl-Sys-Hostname-1.23-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874471" comment="perl-Sys-Syslog-0.36-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874472" comment="perl-Term-ANSIColor-5.01-458.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874473" comment="perl-Term-Cap-1.17-396.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874474" comment="perl-Term-Complete-1.403-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874475" comment="perl-Term-ReadLine-1.17-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874476" comment="perl-Term-Table-0.015-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874477" comment="perl-Test-1.31-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874478" comment="perl-Test-Harness-3.42-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874479" comment="perl-Test-Simple-1.302181-2.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874480" comment="perl-Text-Abbrev-1.02-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874481" comment="perl-Text-Balanced-2.04-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874482" comment="perl-Text-Diff-1.45-7.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874483" comment="perl-Text-Glob-0.11-5.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874484" comment="perl-Text-ParseWords-3.30-396.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874485" comment="perl-Text-Tabs+Wrap-2013.0523-396.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874486" comment="perl-Text-Template-1.58-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874487" comment="perl-Thread-3.05-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874488" comment="perl-Thread-Queue-3.14-457.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874489" comment="perl-Thread-Semaphore-2.13-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874490" comment="perl-Tie-4.6-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874491" comment="perl-Tie-File-1.06-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874492" comment="perl-Tie-Memoize-1.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874493" comment="perl-Tie-RefHash-1.39-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874494" comment="perl-Time-1.03-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874495" comment="perl-Time-HiRes-1.9764-459.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874496" comment="perl-Time-Local-1.300-4.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874497" comment="perl-Time-Piece-1.3401-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874498" comment="perl-URI-1.76-5.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874499" comment="perl-Unicode-Collate-1.29-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874500" comment="perl-Unicode-Normalize-1.27-458.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874501" comment="perl-Unicode-UCD-0.75-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874502" comment="perl-User-pwent-1.03-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874503" comment="perl-autodie-2.34-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874504" comment="perl-autouse-1.11-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874505" comment="perl-base-2.27-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874506" comment="perl-bignum-0.51-439.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874507" comment="perl-blib-1.07-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874508" comment="perl-constant-1.33-1001.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874509" comment="perl-debugger-1.56-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874510" comment="perl-deprecate-0.04-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874511" comment="perl-devel-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874512" comment="perl-diagnostics-1.37-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874513" comment="perl-doc-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874514" comment="perl-encoding-3.00-461.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874515" comment="perl-encoding-warnings-0.13-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874516" comment="perl-experimental-0.025-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874517" comment="perl-fields-2.27-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874518" comment="perl-filetest-1.03-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874519" comment="perl-generators-1.13-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874520" comment="perl-homedir-2.000024-7.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874521" comment="perl-if-0.60.800-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874522" comment="perl-inc-latest-0.500-10.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874523" comment="perl-interpreter-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874524" comment="perl-less-0.03-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874525" comment="perl-lib-0.65-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874526" comment="perl-libnet-3.13-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874527" comment="perl-libnetcfg-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874528" comment="perl-libs-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874529" comment="perl-local-lib-2.000024-7.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874530" comment="perl-locale-1.09-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874531" comment="perl-macros-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874532" comment="perl-meta-notation-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874533" comment="perl-mro-1.23-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874534" comment="perl-open-1.12-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874535" comment="perl-overload-1.31-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874536" comment="perl-overloading-0.02-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874537" comment="perl-parent-0.238-457.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874538" comment="perl-perlfaq-5.20210520-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874539" comment="perl-ph-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874540" comment="perl-podlators-4.14-457.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874541" comment="perl-sigtrap-1.09-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874542" comment="perl-sort-2.04-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874543" comment="perl-subs-1.03-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874544" comment="perl-threads-2.25-457.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874545" comment="perl-threads-shared-1.61-457.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874546" comment="perl-utils-5.32.1-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874547" comment="perl-vars-1.05-473.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874548" comment="perl-version-0.99.29-1.module+el8.10.0+21354+3ad137bb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874549" comment="perl-vmsish-1.04-473.module+el8.10.0+21354+3ad137bb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2954" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-4204" ref_url="https://www.suse.com/security/cve/CVE-2021-4204/" source="CVE"/>
		<reference ref_id="CVE-2022-0500" ref_url="https://www.suse.com/security/cve/CVE-2022-0500/" source="CVE"/>
		<reference ref_id="CVE-2022-23222" ref_url="https://www.suse.com/security/cve/CVE-2022-23222/" source="CVE"/>
		<reference ref_id="CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947/" source="CVE"/>
		<reference ref_id="CVE-2022-49081" ref_url="https://www.suse.com/security/cve/CVE-2022-49081/" source="CVE"/>
		<reference ref_id="CVE-2022-49700" ref_url="https://www.suse.com/security/cve/CVE-2022-49700/" source="CVE"/>
		<reference ref_id="CVE-2022-49759" ref_url="https://www.suse.com/security/cve/CVE-2022-49759/" source="CVE"/>
		<reference ref_id="CVE-2022-49885" ref_url="https://www.suse.com/security/cve/CVE-2022-49885/" source="CVE"/>
		<reference ref_id="CVE-2022-49940" ref_url="https://www.suse.com/security/cve/CVE-2022-49940/" source="CVE"/>
		<reference ref_id="CVE-2022-50116" ref_url="https://www.suse.com/security/cve/CVE-2022-50116/" source="CVE"/>
		<reference ref_id="CVE-2022-50126" ref_url="https://www.suse.com/security/cve/CVE-2022-50126/" source="CVE"/>
		<reference ref_id="CVE-2022-50153" ref_url="https://www.suse.com/security/cve/CVE-2022-50153/" source="CVE"/>
		<reference ref_id="CVE-2022-50274" ref_url="https://www.suse.com/security/cve/CVE-2022-50274/" source="CVE"/>
		<reference ref_id="CVE-2022-50327" ref_url="https://www.suse.com/security/cve/CVE-2022-50327/" source="CVE"/>
		<reference ref_id="CVE-2022-50344" ref_url="https://www.suse.com/security/cve/CVE-2022-50344/" source="CVE"/>
		<reference ref_id="CVE-2022-50403" ref_url="https://www.suse.com/security/cve/CVE-2022-50403/" source="CVE"/>
		<reference ref_id="CVE-2022-50485" ref_url="https://www.suse.com/security/cve/CVE-2022-50485/" source="CVE"/>
		<reference ref_id="CVE-2022-50546" ref_url="https://www.suse.com/security/cve/CVE-2022-50546/" source="CVE"/>
		<reference ref_id="CVE-2022-50638" ref_url="https://www.suse.com/security/cve/CVE-2022-50638/" source="CVE"/>
		<reference ref_id="CVE-2022-50668" ref_url="https://www.suse.com/security/cve/CVE-2022-50668/" source="CVE"/>
		<reference ref_id="CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513/" source="CVE"/>
		<reference ref_id="CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464/" source="CVE"/>
		<reference ref_id="CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133/" source="CVE"/>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-42755" ref_url="https://www.suse.com/security/cve/CVE-2023-42755/" source="CVE"/>
		<reference ref_id="CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340/" source="CVE"/>
		<reference ref_id="CVE-2023-52434" ref_url="https://www.suse.com/security/cve/CVE-2023-52434/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580/" source="CVE"/>
		<reference ref_id="CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52620" ref_url="https://www.suse.com/security/cve/CVE-2023-52620/" source="CVE"/>
		<reference ref_id="CVE-2023-52973" ref_url="https://www.suse.com/security/cve/CVE-2023-52973/" source="CVE"/>
		<reference ref_id="CVE-2023-53070" ref_url="https://www.suse.com/security/cve/CVE-2023-53070/" source="CVE"/>
		<reference ref_id="CVE-2023-53072" ref_url="https://www.suse.com/security/cve/CVE-2023-53072/" source="CVE"/>
		<reference ref_id="CVE-2023-53088" ref_url="https://www.suse.com/security/cve/CVE-2023-53088/" source="CVE"/>
		<reference ref_id="CVE-2023-53089" ref_url="https://www.suse.com/security/cve/CVE-2023-53089/" source="CVE"/>
		<reference ref_id="CVE-2023-53103" ref_url="https://www.suse.com/security/cve/CVE-2023-53103/" source="CVE"/>
		<reference ref_id="CVE-2023-53134" ref_url="https://www.suse.com/security/cve/CVE-2023-53134/" source="CVE"/>
		<reference ref_id="CVE-2023-53140" ref_url="https://www.suse.com/security/cve/CVE-2023-53140/" source="CVE"/>
		<reference ref_id="CVE-2023-53148" ref_url="https://www.suse.com/security/cve/CVE-2023-53148/" source="CVE"/>
		<reference ref_id="CVE-2023-53182" ref_url="https://www.suse.com/security/cve/CVE-2023-53182/" source="CVE"/>
		<reference ref_id="CVE-2023-53202" ref_url="https://www.suse.com/security/cve/CVE-2023-53202/" source="CVE"/>
		<reference ref_id="CVE-2023-53210" ref_url="https://www.suse.com/security/cve/CVE-2023-53210/" source="CVE"/>
		<reference ref_id="CVE-2023-53224" ref_url="https://www.suse.com/security/cve/CVE-2023-53224/" source="CVE"/>
		<reference ref_id="CVE-2023-53266" ref_url="https://www.suse.com/security/cve/CVE-2023-53266/" source="CVE"/>
		<reference ref_id="CVE-2023-53275" ref_url="https://www.suse.com/security/cve/CVE-2023-53275/" source="CVE"/>
		<reference ref_id="CVE-2023-53280" ref_url="https://www.suse.com/security/cve/CVE-2023-53280/" source="CVE"/>
		<reference ref_id="CVE-2023-53322" ref_url="https://www.suse.com/security/cve/CVE-2023-53322/" source="CVE"/>
		<reference ref_id="CVE-2023-53335" ref_url="https://www.suse.com/security/cve/CVE-2023-53335/" source="CVE"/>
		<reference ref_id="CVE-2023-53343" ref_url="https://www.suse.com/security/cve/CVE-2023-53343/" source="CVE"/>
		<reference ref_id="CVE-2023-53354" ref_url="https://www.suse.com/security/cve/CVE-2023-53354/" source="CVE"/>
		<reference ref_id="CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365/" source="CVE"/>
		<reference ref_id="CVE-2023-53371" ref_url="https://www.suse.com/security/cve/CVE-2023-53371/" source="CVE"/>
		<reference ref_id="CVE-2023-53380" ref_url="https://www.suse.com/security/cve/CVE-2023-53380/" source="CVE"/>
		<reference ref_id="CVE-2023-53392" ref_url="https://www.suse.com/security/cve/CVE-2023-53392/" source="CVE"/>
		<reference ref_id="CVE-2023-53441" ref_url="https://www.suse.com/security/cve/CVE-2023-53441/" source="CVE"/>
		<reference ref_id="CVE-2023-53442" ref_url="https://www.suse.com/security/cve/CVE-2023-53442/" source="CVE"/>
		<reference ref_id="CVE-2023-53451" ref_url="https://www.suse.com/security/cve/CVE-2023-53451/" source="CVE"/>
		<reference ref_id="CVE-2023-53476" ref_url="https://www.suse.com/security/cve/CVE-2023-53476/" source="CVE"/>
		<reference ref_id="CVE-2023-53483" ref_url="https://www.suse.com/security/cve/CVE-2023-53483/" source="CVE"/>
		<reference ref_id="CVE-2023-53525" ref_url="https://www.suse.com/security/cve/CVE-2023-53525/" source="CVE"/>
		<reference ref_id="CVE-2023-53530" ref_url="https://www.suse.com/security/cve/CVE-2023-53530/" source="CVE"/>
		<reference ref_id="CVE-2023-53546" ref_url="https://www.suse.com/security/cve/CVE-2023-53546/" source="CVE"/>
		<reference ref_id="CVE-2023-53559" ref_url="https://www.suse.com/security/cve/CVE-2023-53559/" source="CVE"/>
		<reference ref_id="CVE-2023-53576" ref_url="https://www.suse.com/security/cve/CVE-2023-53576/" source="CVE"/>
		<reference ref_id="CVE-2023-53577" ref_url="https://www.suse.com/security/cve/CVE-2023-53577/" source="CVE"/>
		<reference ref_id="CVE-2023-53581" ref_url="https://www.suse.com/security/cve/CVE-2023-53581/" source="CVE"/>
		<reference ref_id="CVE-2023-53586" ref_url="https://www.suse.com/security/cve/CVE-2023-53586/" source="CVE"/>
		<reference ref_id="CVE-2023-53611" ref_url="https://www.suse.com/security/cve/CVE-2023-53611/" source="CVE"/>
		<reference ref_id="CVE-2023-53615" ref_url="https://www.suse.com/security/cve/CVE-2023-53615/" source="CVE"/>
		<reference ref_id="CVE-2023-53623" ref_url="https://www.suse.com/security/cve/CVE-2023-53623/" source="CVE"/>
		<reference ref_id="CVE-2023-53648" ref_url="https://www.suse.com/security/cve/CVE-2023-53648/" source="CVE"/>
		<reference ref_id="CVE-2023-53657" ref_url="https://www.suse.com/security/cve/CVE-2023-53657/" source="CVE"/>
		<reference ref_id="CVE-2023-53661" ref_url="https://www.suse.com/security/cve/CVE-2023-53661/" source="CVE"/>
		<reference ref_id="CVE-2023-53696" ref_url="https://www.suse.com/security/cve/CVE-2023-53696/" source="CVE"/>
		<reference ref_id="CVE-2023-53698" ref_url="https://www.suse.com/security/cve/CVE-2023-53698/" source="CVE"/>
		<reference ref_id="CVE-2023-53705" ref_url="https://www.suse.com/security/cve/CVE-2023-53705/" source="CVE"/>
		<reference ref_id="CVE-2023-53722" ref_url="https://www.suse.com/security/cve/CVE-2023-53722/" source="CVE"/>
		<reference ref_id="CVE-2023-53746" ref_url="https://www.suse.com/security/cve/CVE-2023-53746/" source="CVE"/>
		<reference ref_id="CVE-2023-53821" ref_url="https://www.suse.com/security/cve/CVE-2023-53821/" source="CVE"/>
		<reference ref_id="CVE-2023-53843" ref_url="https://www.suse.com/security/cve/CVE-2023-53843/" source="CVE"/>
		<reference ref_id="CVE-2023-53848" ref_url="https://www.suse.com/security/cve/CVE-2023-53848/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<reference ref_id="CVE-2024-25743" ref_url="https://www.suse.com/security/cve/CVE-2024-25743/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26609" ref_url="https://www.suse.com/security/cve/CVE-2024-26609/" source="CVE"/>
		<reference ref_id="CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671/" source="CVE"/>
		<reference ref_id="CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3138.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3138.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13631">CVE-2019-13631 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15505">CVE-2019-15505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4204/">CVE-2021-4204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4204">CVE-2021-4204 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0500/">CVE-2022-0500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23222/">CVE-2022-23222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49081/">CVE-2022-49081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49081">CVE-2022-49081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49700/">CVE-2022-49700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49700">CVE-2022-49700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49759/">CVE-2022-49759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49759">CVE-2022-49759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49885/">CVE-2022-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49885">CVE-2022-49885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49940/">CVE-2022-49940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49940">CVE-2022-49940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50116/">CVE-2022-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50116">CVE-2022-50116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50126/">CVE-2022-50126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50126">CVE-2022-50126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50153/">CVE-2022-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50153">CVE-2022-50153 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50274/">CVE-2022-50274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50274">CVE-2022-50274 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50327/">CVE-2022-50327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50327">CVE-2022-50327 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50344/">CVE-2022-50344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50344">CVE-2022-50344 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50403/">CVE-2022-50403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50403">CVE-2022-50403 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50485/">CVE-2022-50485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50485">CVE-2022-50485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50546/">CVE-2022-50546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50546">CVE-2022-50546 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50638/">CVE-2022-50638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50638">CVE-2022-50638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50668/">CVE-2022-50668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50668">CVE-2022-50668 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42755/">CVE-2023-42755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52434/">CVE-2023-52434 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52620/">CVE-2023-52620 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52973/">CVE-2023-52973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52973">CVE-2023-52973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53070/">CVE-2023-53070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53070">CVE-2023-53070 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53072/">CVE-2023-53072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53072">CVE-2023-53072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53088/">CVE-2023-53088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53088">CVE-2023-53088 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53089/">CVE-2023-53089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53089">CVE-2023-53089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53103/">CVE-2023-53103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53103">CVE-2023-53103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53134/">CVE-2023-53134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53134">CVE-2023-53134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53140/">CVE-2023-53140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53140">CVE-2023-53140 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53148/">CVE-2023-53148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53148">CVE-2023-53148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53182/">CVE-2023-53182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53182">CVE-2023-53182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53202/">CVE-2023-53202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53202">CVE-2023-53202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53210/">CVE-2023-53210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53210">CVE-2023-53210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53224/">CVE-2023-53224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53224">CVE-2023-53224 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53266/">CVE-2023-53266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53266">CVE-2023-53266 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53275/">CVE-2023-53275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53275">CVE-2023-53275 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53280/">CVE-2023-53280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53280">CVE-2023-53280 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53322/">CVE-2023-53322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53322">CVE-2023-53322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53335/">CVE-2023-53335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53335">CVE-2023-53335 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53343/">CVE-2023-53343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53343">CVE-2023-53343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53354/">CVE-2023-53354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53354">CVE-2023-53354 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53371/">CVE-2023-53371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53371">CVE-2023-53371 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53380/">CVE-2023-53380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53380">CVE-2023-53380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53392/">CVE-2023-53392 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53392">CVE-2023-53392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53441/">CVE-2023-53441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53441">CVE-2023-53441 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53442/">CVE-2023-53442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53442">CVE-2023-53442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53451/">CVE-2023-53451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53451">CVE-2023-53451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53476/">CVE-2023-53476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53476">CVE-2023-53476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53483/">CVE-2023-53483 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53483">CVE-2023-53483 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53525/">CVE-2023-53525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53525">CVE-2023-53525 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53530/">CVE-2023-53530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53530">CVE-2023-53530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53546/">CVE-2023-53546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53546">CVE-2023-53546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53559/">CVE-2023-53559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53559">CVE-2023-53559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53576/">CVE-2023-53576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53576">CVE-2023-53576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53577/">CVE-2023-53577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53577">CVE-2023-53577 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53581/">CVE-2023-53581 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53581">CVE-2023-53581 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53586/">CVE-2023-53586 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53586">CVE-2023-53586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53611/">CVE-2023-53611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53611">CVE-2023-53611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53615/">CVE-2023-53615 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53615">CVE-2023-53615 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53623/">CVE-2023-53623 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53623">CVE-2023-53623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53648/">CVE-2023-53648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53648">CVE-2023-53648 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53657/">CVE-2023-53657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53657">CVE-2023-53657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53661/">CVE-2023-53661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53661">CVE-2023-53661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53696/">CVE-2023-53696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53696">CVE-2023-53696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53698/">CVE-2023-53698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53698">CVE-2023-53698 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53705/">CVE-2023-53705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53705">CVE-2023-53705 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53722/">CVE-2023-53722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53722">CVE-2023-53722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53746/">CVE-2023-53746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53746">CVE-2023-53746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53821/">CVE-2023-53821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53821">CVE-2023-53821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53843/">CVE-2023-53843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53843">CVE-2023-53843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53848/">CVE-2023-53848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53848">CVE-2023-53848 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-25743/">CVE-2024-25743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25743">CVE-2024-25743 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26609/">CVE-2024-26609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26609">CVE-2024-26609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866051" comment="bpftool-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866052" comment="kernel-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866053" comment="kernel-abi-stablelists-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866054" comment="kernel-core-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866055" comment="kernel-cross-headers-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866056" comment="kernel-debug-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866057" comment="kernel-debug-core-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866059" comment="kernel-debug-modules-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866060" comment="kernel-debug-modules-extra-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866062" comment="kernel-doc-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866063" comment="kernel-headers-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866064" comment="kernel-modules-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866065" comment="kernel-modules-extra-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866066" comment="kernel-tools-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866067" comment="kernel-tools-libs-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866069" comment="perf-4.18.0-553.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866070" comment="python3-perf-4.18.0-553.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2955" version="1" class="patch">
	<metadata>
		<title>security update for squashfs-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153/" source="CVE"/>
		<reference ref_id="CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3139.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3139.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866071" comment="squashfs-tools-4.3-21.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2956" version="1" class="patch">
	<metadata>
		<title>security update for pam (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866072" comment="pam-1.3.1-33.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866073" comment="pam-devel-1.3.1-33.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2957" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-15778" ref_url="https://www.suse.com/security/cve/CVE-2020-15778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3166.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3166.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15778/">CVE-2020-15778 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15778">CVE-2020-15778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866074" comment="openssh-8.0p1-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866075" comment="openssh-askpass-8.0p1-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866076" comment="openssh-cavs-8.0p1-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866077" comment="openssh-clients-8.0p1-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866078" comment="openssh-keycat-8.0p1-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866079" comment="openssh-ldap-8.0p1-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866080" comment="openssh-server-8.0p1-24.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866081" comment="pam_ssh_agent_auth-0.10.3-7.24.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2958" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-46329" ref_url="https://www.suse.com/security/cve/CVE-2022-46329/" source="CVE"/>
		<reference ref_id="CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3178.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3178.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46329/">CVE-2022-46329 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46329">CVE-2022-46329 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866082" comment="iwl100-firmware-39.31.5.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866083" comment="iwl1000-firmware-39.31.5.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866084" comment="iwl105-firmware-18.168.6.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866085" comment="iwl135-firmware-18.168.6.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866086" comment="iwl2000-firmware-18.168.6.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866087" comment="iwl2030-firmware-18.168.6.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866088" comment="iwl3160-firmware-25.30.13.0-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866089" comment="iwl3945-firmware-15.32.2.9-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866090" comment="iwl4965-firmware-228.61.2.24-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866091" comment="iwl5000-firmware-8.83.5.1_1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866092" comment="iwl5150-firmware-8.24.2.2-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866093" comment="iwl6000-firmware-9.221.4.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866094" comment="iwl6000g2a-firmware-18.168.6.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866095" comment="iwl6000g2b-firmware-18.168.6.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866096" comment="iwl6050-firmware-41.28.5.1-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866097" comment="iwl7260-firmware-25.30.13.0-121.el8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866098" comment="libertas-sd8686-firmware-20240111-121.gitb3132c18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866099" comment="libertas-sd8787-firmware-20240111-121.gitb3132c18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866100" comment="libertas-usb8388-firmware-20240111-121.gitb3132c18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866101" comment="libertas-usb8388-olpc-firmware-20240111-121.gitb3132c18.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866102" comment="linux-firmware-20240111-121.gitb3132c18.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2959" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692/" source="CVE"/>
		<reference ref_id="CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693/" source="CVE"/>
		<reference ref_id="CVE-2024-1048" ref_url="https://www.suse.com/security/cve/CVE-2024-1048/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1048/">CVE-2024-1048 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1048">CVE-2024-1048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866103" comment="grub2-common-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866104" comment="grub2-efi-ia32-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866105" comment="grub2-efi-ia32-cdboot-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866106" comment="grub2-efi-ia32-modules-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866107" comment="grub2-efi-x64-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866108" comment="grub2-efi-x64-cdboot-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866109" comment="grub2-efi-x64-modules-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866110" comment="grub2-pc-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866111" comment="grub2-pc-modules-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866112" comment="grub2-tools-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866113" comment="grub2-tools-efi-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866114" comment="grub2-tools-extra-2.02-156.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866115" comment="grub2-tools-minimal-2.02-156.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2960" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-7008" ref_url="https://www.suse.com/security/cve/CVE-2023-7008/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3203.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3203.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-7008/">CVE-2023-7008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7008">CVE-2023-7008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866116" comment="systemd-239-82.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866117" comment="systemd-container-239-82.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866118" comment="systemd-devel-239-82.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866119" comment="systemd-journal-remote-239-82.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866120" comment="systemd-libs-239-82.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866121" comment="systemd-pam-239-82.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866122" comment="systemd-tests-239-82.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866123" comment="systemd-udev-239-82.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2961" version="1" class="patch">
	<metadata>
		<title>security update for traceroute (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3211.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3211.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866124" comment="traceroute-2.1.0-8.el8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2962" version="1" class="patch">
	<metadata>
		<title>security update for gmp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3214.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3214.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866125" comment="gmp-6.1.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866126" comment="gmp-c++-6.1.2-11.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866127" comment="gmp-devel-6.1.2-11.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2963" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004/" source="CVE"/>
		<reference ref_id="CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3233.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3233.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866128" comment="libssh-0.9.6-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866129" comment="libssh-config-0.9.6-14.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866130" comment="libssh-devel-0.9.6-14.el8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2964" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3254.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3254.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867155" comment="aardvark-dns-1.10.0-1.module+el8.10.0+21209+52deeb51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867156" comment="buildah-1.33.7-1.module+el8.10.0+21590+d7d75709 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867157" comment="buildah-tests-1.33.7-1.module+el8.10.0+21590+d7d75709 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867158" comment="cockpit-podman-84.1-1.module+el8.10.0+21373+0d273fdf is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867159" comment="conmon-2.1.10-1.module+el8.10.0+21077+98b84d8a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867160" comment="container-selinux-2.229.0-2.module+el8.10.0+21196+3f0abbca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867161" comment="containernetworking-plugins-1.4.0-2.module+el8.10.0+21366+f9cb49f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867162" comment="containers-common-1-81.module+el8.10.0+21340+c6c7475a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867163" comment="crit-3.18-5.module+el8.10.0+21672+01ba06ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867164" comment="criu-3.18-5.module+el8.10.0+21672+01ba06ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867165" comment="criu-devel-3.18-5.module+el8.10.0+21672+01ba06ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867166" comment="criu-libs-3.18-5.module+el8.10.0+21672+01ba06ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867167" comment="crun-1.14.3-2.module+el8.10.0+21340+c6c7475a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867168" comment="fuse-overlayfs-1.13-1.module+el8.10.0+20412+95ee28e2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867169" comment="libslirp-4.4.0-2.module+el8.10.0+21672+01ba06ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867170" comment="libslirp-devel-4.4.0-2.module+el8.10.0+21672+01ba06ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867171" comment="netavark-1.10.3-1.module+el8.10.0+21306+6be40ce7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867172" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+20565+a40ba0e5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867173" comment="podman-4.9.4-1.module+el8.10.0+21632+761e0d34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867174" comment="podman-catatonit-4.9.4-1.module+el8.10.0+21632+761e0d34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867175" comment="podman-docker-4.9.4-1.module+el8.10.0+21632+761e0d34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867176" comment="podman-gvproxy-4.9.4-1.module+el8.10.0+21632+761e0d34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867177" comment="podman-plugins-4.9.4-1.module+el8.10.0+21632+761e0d34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867178" comment="podman-remote-4.9.4-1.module+el8.10.0+21632+761e0d34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867179" comment="podman-tests-4.9.4-1.module+el8.10.0+21632+761e0d34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867180" comment="python3-criu-3.18-5.module+el8.10.0+21672+01ba06ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867181" comment="python3-podman-4.9.0-1.module+el8.10.0+21196+3f0abbca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867182" comment="runc-1.1.12-1.module+el8.10.0+21251+62b7388c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867183" comment="skopeo-1.14.3-2.module+el8.10.0+21728+a1d9b0ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867184" comment="skopeo-tests-1.14.3-2.module+el8.10.0+21728+a1d9b0ab is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867185" comment="slirp4netns-1.2.3-1.module+el8.10.0+21306+6be40ce7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867186" comment="toolbox-0.0.99.5-2.module+el8.10.0+21341+ff0b5f89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867187" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+21341+ff0b5f89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867188" comment="udica-0.2.6-21.module+el8.10.0+21672+01ba06ae is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2965" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3258.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3258.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866131" comment="xorg-x11-server-Xdmx-1.20.11-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866132" comment="xorg-x11-server-Xephyr-1.20.11-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866133" comment="xorg-x11-server-Xnest-1.20.11-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866134" comment="xorg-x11-server-Xorg-1.20.11-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866135" comment="xorg-x11-server-Xvfb-1.20.11-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866136" comment="xorg-x11-server-common-1.20.11-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866137" comment="xorg-x11-server-devel-1.20.11-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866138" comment="xorg-x11-server-source-1.20.11-23.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2966" version="1" class="patch">
	<metadata>
		<title>security update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3259.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3259.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866139" comment="delve-1.21.2-3.module+el8.10.0+21244+5b2d9000 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866140" comment="go-toolset-1.21.9-1.module+el8.10.0+21671+b35c3b78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866141" comment="golang-1.21.9-1.module+el8.10.0+21671+b35c3b78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866142" comment="golang-bin-1.21.9-1.module+el8.10.0+21671+b35c3b78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866143" comment="golang-docs-1.21.9-1.module+el8.10.0+21671+b35c3b78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866144" comment="golang-misc-1.21.9-1.module+el8.10.0+21671+b35c3b78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866145" comment="golang-src-1.21.9-1.module+el8.10.0+21671+b35c3b78 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866146" comment="golang-tests-1.21.9-1.module+el8.10.0+21671+b35c3b78 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2967" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3261.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3261.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866147" comment="tigervnc-1.13.1-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866148" comment="tigervnc-icons-1.13.1-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866149" comment="tigervnc-license-1.13.1-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866150" comment="tigervnc-selinux-1.13.1-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866151" comment="tigervnc-server-1.13.1-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866152" comment="tigervnc-server-minimal-1.13.1-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866153" comment="tigervnc-server-module-1.13.1-10.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2968" version="1" class="patch">
	<metadata>
		<title>security update for pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-3019" ref_url="https://www.suse.com/security/cve/CVE-2024-3019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3264.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3264.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3019/">CVE-2024-3019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3019">CVE-2024-3019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872469" comment="pcp-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872470" comment="pcp-conf-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872471" comment="pcp-devel-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872472" comment="pcp-doc-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872473" comment="pcp-export-pcp2elasticsearch-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872474" comment="pcp-export-pcp2graphite-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872475" comment="pcp-export-pcp2influxdb-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872476" comment="pcp-export-pcp2json-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872477" comment="pcp-export-pcp2spark-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872478" comment="pcp-export-pcp2xml-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872479" comment="pcp-export-pcp2zabbix-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872480" comment="pcp-export-zabbix-agent-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872481" comment="pcp-gui-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872482" comment="pcp-import-collectl2pcp-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872483" comment="pcp-import-ganglia2pcp-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872484" comment="pcp-import-iostat2pcp-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872485" comment="pcp-import-mrtg2pcp-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872486" comment="pcp-import-sar2pcp-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872487" comment="pcp-libs-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872488" comment="pcp-libs-devel-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872489" comment="pcp-pmda-activemq-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872490" comment="pcp-pmda-apache-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872491" comment="pcp-pmda-bash-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872492" comment="pcp-pmda-bcc-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872493" comment="pcp-pmda-bind2-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872494" comment="pcp-pmda-bonding-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872495" comment="pcp-pmda-bpftrace-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872496" comment="pcp-pmda-cifs-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872497" comment="pcp-pmda-cisco-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872498" comment="pcp-pmda-dbping-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872499" comment="pcp-pmda-denki-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872500" comment="pcp-pmda-dm-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872501" comment="pcp-pmda-docker-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872502" comment="pcp-pmda-ds389-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872503" comment="pcp-pmda-ds389log-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872504" comment="pcp-pmda-elasticsearch-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872505" comment="pcp-pmda-gfs2-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872506" comment="pcp-pmda-gluster-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872507" comment="pcp-pmda-gpfs-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872508" comment="pcp-pmda-gpsd-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872509" comment="pcp-pmda-hacluster-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872510" comment="pcp-pmda-haproxy-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872511" comment="pcp-pmda-infiniband-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872512" comment="pcp-pmda-json-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872513" comment="pcp-pmda-libvirt-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872514" comment="pcp-pmda-lio-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872515" comment="pcp-pmda-lmsensors-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872516" comment="pcp-pmda-logger-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872517" comment="pcp-pmda-lustre-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872518" comment="pcp-pmda-lustrecomm-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872519" comment="pcp-pmda-mailq-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872520" comment="pcp-pmda-memcache-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872521" comment="pcp-pmda-mic-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872522" comment="pcp-pmda-mongodb-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872523" comment="pcp-pmda-mounts-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872524" comment="pcp-pmda-mssql-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872525" comment="pcp-pmda-mysql-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872526" comment="pcp-pmda-named-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872527" comment="pcp-pmda-netcheck-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872528" comment="pcp-pmda-netfilter-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872529" comment="pcp-pmda-news-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872530" comment="pcp-pmda-nfsclient-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872531" comment="pcp-pmda-nginx-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872532" comment="pcp-pmda-nvidia-gpu-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872533" comment="pcp-pmda-openmetrics-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872534" comment="pcp-pmda-openvswitch-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872535" comment="pcp-pmda-oracle-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872536" comment="pcp-pmda-pdns-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872537" comment="pcp-pmda-perfevent-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872538" comment="pcp-pmda-podman-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872539" comment="pcp-pmda-postfix-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872540" comment="pcp-pmda-postgresql-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872541" comment="pcp-pmda-rabbitmq-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872542" comment="pcp-pmda-redis-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872543" comment="pcp-pmda-roomtemp-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872544" comment="pcp-pmda-rsyslog-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872545" comment="pcp-pmda-samba-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872546" comment="pcp-pmda-sendmail-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872547" comment="pcp-pmda-shping-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872548" comment="pcp-pmda-slurm-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872549" comment="pcp-pmda-smart-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872550" comment="pcp-pmda-snmp-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872551" comment="pcp-pmda-sockets-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872552" comment="pcp-pmda-statsd-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872553" comment="pcp-pmda-summary-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872554" comment="pcp-pmda-systemd-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872555" comment="pcp-pmda-trace-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872556" comment="pcp-pmda-unbound-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872557" comment="pcp-pmda-weblog-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872558" comment="pcp-pmda-zimbra-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872559" comment="pcp-pmda-zswap-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872560" comment="pcp-selinux-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872561" comment="pcp-system-tools-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872562" comment="pcp-zeroconf-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872563" comment="perl-PCP-LogImport-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872564" comment="perl-PCP-LogSummary-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872565" comment="perl-PCP-MMV-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872566" comment="perl-PCP-PMDA-5.3.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872567" comment="python3-pcp-5.3.7-20.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2969" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1313" ref_url="https://www.suse.com/security/cve/CVE-2024-1313/" source="CVE"/>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3265.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3265.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1313/">CVE-2024-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1313">CVE-2024-1313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866154" comment="grafana-9.2.10-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866155" comment="grafana-selinux-9.2.10-16.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2970" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458/" source="CVE"/>
		<reference ref_id="CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3268.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3268.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866156" comment="krb5-devel-1.18.2-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866157" comment="krb5-libs-1.18.2-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866158" comment="krb5-pkinit-1.18.2-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866159" comment="krb5-server-1.18.2-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866160" comment="krb5-server-ldap-1.18.2-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866161" comment="krb5-workstation-1.18.2-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866162" comment="libkadm5-1.18.2-27.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2971" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3269.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3269.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866163" comment="compat-libpthread-nonshared-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866164" comment="glibc-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866165" comment="glibc-all-langpacks-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866166" comment="glibc-benchtests-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866167" comment="glibc-common-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866168" comment="glibc-devel-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866169" comment="glibc-doc-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866170" comment="glibc-gconv-extra-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866171" comment="glibc-headers-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866172" comment="glibc-langpack-aa-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866173" comment="glibc-langpack-af-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866174" comment="glibc-langpack-agr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866175" comment="glibc-langpack-ak-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866176" comment="glibc-langpack-am-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866177" comment="glibc-langpack-an-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866178" comment="glibc-langpack-anp-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866179" comment="glibc-langpack-ar-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866180" comment="glibc-langpack-as-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866181" comment="glibc-langpack-ast-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866182" comment="glibc-langpack-ayc-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866183" comment="glibc-langpack-az-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866184" comment="glibc-langpack-be-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866185" comment="glibc-langpack-bem-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866186" comment="glibc-langpack-ber-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866187" comment="glibc-langpack-bg-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866188" comment="glibc-langpack-bhb-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866189" comment="glibc-langpack-bho-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866190" comment="glibc-langpack-bi-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866191" comment="glibc-langpack-bn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866192" comment="glibc-langpack-bo-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866193" comment="glibc-langpack-br-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866194" comment="glibc-langpack-brx-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866195" comment="glibc-langpack-bs-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866196" comment="glibc-langpack-byn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866197" comment="glibc-langpack-ca-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866198" comment="glibc-langpack-ce-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866199" comment="glibc-langpack-chr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866200" comment="glibc-langpack-cmn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866201" comment="glibc-langpack-crh-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866202" comment="glibc-langpack-cs-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866203" comment="glibc-langpack-csb-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866204" comment="glibc-langpack-cv-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866205" comment="glibc-langpack-cy-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866206" comment="glibc-langpack-da-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866207" comment="glibc-langpack-de-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866208" comment="glibc-langpack-doi-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866209" comment="glibc-langpack-dsb-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866210" comment="glibc-langpack-dv-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866211" comment="glibc-langpack-dz-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866212" comment="glibc-langpack-el-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866213" comment="glibc-langpack-en-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866214" comment="glibc-langpack-eo-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866215" comment="glibc-langpack-es-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866216" comment="glibc-langpack-et-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866217" comment="glibc-langpack-eu-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866218" comment="glibc-langpack-fa-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866219" comment="glibc-langpack-ff-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866220" comment="glibc-langpack-fi-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866221" comment="glibc-langpack-fil-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866222" comment="glibc-langpack-fo-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866223" comment="glibc-langpack-fr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866224" comment="glibc-langpack-fur-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866225" comment="glibc-langpack-fy-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866226" comment="glibc-langpack-ga-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866227" comment="glibc-langpack-gd-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866228" comment="glibc-langpack-gez-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866229" comment="glibc-langpack-gl-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866230" comment="glibc-langpack-gu-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866231" comment="glibc-langpack-gv-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866232" comment="glibc-langpack-ha-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866233" comment="glibc-langpack-hak-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866234" comment="glibc-langpack-he-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866235" comment="glibc-langpack-hi-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866236" comment="glibc-langpack-hif-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866237" comment="glibc-langpack-hne-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866238" comment="glibc-langpack-hr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866239" comment="glibc-langpack-hsb-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866240" comment="glibc-langpack-ht-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866241" comment="glibc-langpack-hu-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866242" comment="glibc-langpack-hy-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866243" comment="glibc-langpack-ia-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866244" comment="glibc-langpack-id-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866245" comment="glibc-langpack-ig-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866246" comment="glibc-langpack-ik-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866247" comment="glibc-langpack-is-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866248" comment="glibc-langpack-it-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866249" comment="glibc-langpack-iu-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866250" comment="glibc-langpack-ja-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866251" comment="glibc-langpack-ka-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866252" comment="glibc-langpack-kab-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866253" comment="glibc-langpack-kk-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866254" comment="glibc-langpack-kl-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866255" comment="glibc-langpack-km-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866256" comment="glibc-langpack-kn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866257" comment="glibc-langpack-ko-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866258" comment="glibc-langpack-kok-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866259" comment="glibc-langpack-ks-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866260" comment="glibc-langpack-ku-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866261" comment="glibc-langpack-kw-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866262" comment="glibc-langpack-ky-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866263" comment="glibc-langpack-lb-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866264" comment="glibc-langpack-lg-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866265" comment="glibc-langpack-li-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866266" comment="glibc-langpack-lij-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866267" comment="glibc-langpack-ln-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866268" comment="glibc-langpack-lo-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866269" comment="glibc-langpack-lt-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866270" comment="glibc-langpack-lv-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866271" comment="glibc-langpack-lzh-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866272" comment="glibc-langpack-mag-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866273" comment="glibc-langpack-mai-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866274" comment="glibc-langpack-mfe-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866275" comment="glibc-langpack-mg-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866276" comment="glibc-langpack-mhr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866277" comment="glibc-langpack-mi-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866278" comment="glibc-langpack-miq-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866279" comment="glibc-langpack-mjw-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866280" comment="glibc-langpack-mk-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866281" comment="glibc-langpack-ml-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866282" comment="glibc-langpack-mn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866283" comment="glibc-langpack-mni-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866284" comment="glibc-langpack-mr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866285" comment="glibc-langpack-ms-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866286" comment="glibc-langpack-mt-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866287" comment="glibc-langpack-my-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866288" comment="glibc-langpack-nan-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866289" comment="glibc-langpack-nb-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866290" comment="glibc-langpack-nds-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866291" comment="glibc-langpack-ne-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866292" comment="glibc-langpack-nhn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866293" comment="glibc-langpack-niu-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866294" comment="glibc-langpack-nl-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866295" comment="glibc-langpack-nn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866296" comment="glibc-langpack-nr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866297" comment="glibc-langpack-nso-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866298" comment="glibc-langpack-oc-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866299" comment="glibc-langpack-om-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866300" comment="glibc-langpack-or-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866301" comment="glibc-langpack-os-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866302" comment="glibc-langpack-pa-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866303" comment="glibc-langpack-pap-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866304" comment="glibc-langpack-pl-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866305" comment="glibc-langpack-ps-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866306" comment="glibc-langpack-pt-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866307" comment="glibc-langpack-quz-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866308" comment="glibc-langpack-raj-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866309" comment="glibc-langpack-ro-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866310" comment="glibc-langpack-ru-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866311" comment="glibc-langpack-rw-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866312" comment="glibc-langpack-sa-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866313" comment="glibc-langpack-sah-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866314" comment="glibc-langpack-sat-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866315" comment="glibc-langpack-sc-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866316" comment="glibc-langpack-sd-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866317" comment="glibc-langpack-se-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866318" comment="glibc-langpack-sgs-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866319" comment="glibc-langpack-shn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866320" comment="glibc-langpack-shs-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866321" comment="glibc-langpack-si-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866322" comment="glibc-langpack-sid-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866323" comment="glibc-langpack-sk-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866324" comment="glibc-langpack-sl-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866325" comment="glibc-langpack-sm-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866326" comment="glibc-langpack-so-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866327" comment="glibc-langpack-sq-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866328" comment="glibc-langpack-sr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866329" comment="glibc-langpack-ss-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866330" comment="glibc-langpack-st-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866331" comment="glibc-langpack-sv-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866332" comment="glibc-langpack-sw-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866333" comment="glibc-langpack-szl-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866334" comment="glibc-langpack-ta-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866335" comment="glibc-langpack-tcy-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866336" comment="glibc-langpack-te-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866337" comment="glibc-langpack-tg-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866338" comment="glibc-langpack-th-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866339" comment="glibc-langpack-the-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866340" comment="glibc-langpack-ti-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866341" comment="glibc-langpack-tig-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866342" comment="glibc-langpack-tk-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866343" comment="glibc-langpack-tl-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866344" comment="glibc-langpack-tn-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866345" comment="glibc-langpack-to-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866346" comment="glibc-langpack-tpi-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866347" comment="glibc-langpack-tr-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866348" comment="glibc-langpack-ts-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866349" comment="glibc-langpack-tt-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866350" comment="glibc-langpack-ug-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866351" comment="glibc-langpack-uk-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866352" comment="glibc-langpack-unm-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866353" comment="glibc-langpack-ur-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866354" comment="glibc-langpack-uz-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866355" comment="glibc-langpack-ve-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866356" comment="glibc-langpack-vi-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866357" comment="glibc-langpack-wa-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866358" comment="glibc-langpack-wae-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866359" comment="glibc-langpack-wal-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866360" comment="glibc-langpack-wo-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866361" comment="glibc-langpack-xh-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866362" comment="glibc-langpack-yi-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866363" comment="glibc-langpack-yo-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866364" comment="glibc-langpack-yue-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866365" comment="glibc-langpack-yuw-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866366" comment="glibc-langpack-zh-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866367" comment="glibc-langpack-zu-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866368" comment="glibc-locale-source-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866369" comment="glibc-minimal-langpack-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866370" comment="glibc-nss-devel-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866371" comment="glibc-static-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866372" comment="glibc-utils-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866373" comment="libnsl-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866374" comment="nscd-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866375" comment="nss_db-2.28-251.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866376" comment="nss_hesiod-2.28-251.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2972" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-3758" ref_url="https://www.suse.com/security/cve/CVE-2023-3758/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3270.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3270.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3758/">CVE-2023-3758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872683" comment="libipa_hbac-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872684" comment="libsss_autofs-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872685" comment="libsss_certmap-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872686" comment="libsss_idmap-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872687" comment="libsss_nss_idmap-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872688" comment="libsss_nss_idmap-devel-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872689" comment="libsss_simpleifp-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872690" comment="libsss_sudo-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872691" comment="python3-libipa_hbac-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872692" comment="python3-libsss_nss_idmap-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872693" comment="python3-sss-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872694" comment="python3-sss-murmur-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872695" comment="python3-sssdconfig-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872696" comment="sssd-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872697" comment="sssd-ad-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872698" comment="sssd-client-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872699" comment="sssd-common-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872700" comment="sssd-common-pac-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872701" comment="sssd-dbus-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872702" comment="sssd-idp-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872703" comment="sssd-ipa-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872704" comment="sssd-kcm-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872705" comment="sssd-krb5-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872706" comment="sssd-krb5-common-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872707" comment="sssd-ldap-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872708" comment="sssd-nfs-idmap-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872709" comment="sssd-polkit-rules-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872710" comment="sssd-proxy-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872711" comment="sssd-tools-2.9.4-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872712" comment="sssd-winbind-idmap-2.9.4-3.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2973" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3271.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3271.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867189" comment="bind-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867190" comment="bind-chroot-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867191" comment="bind-devel-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867192" comment="bind-export-devel-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867193" comment="bind-export-libs-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867194" comment="bind-libs-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867195" comment="bind-libs-lite-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867196" comment="bind-license-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867197" comment="bind-lite-devel-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867198" comment="bind-pkcs11-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867199" comment="bind-pkcs11-devel-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867200" comment="bind-pkcs11-libs-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867201" comment="bind-pkcs11-utils-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867202" comment="bind-sdb-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867203" comment="bind-sdb-chroot-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867204" comment="bind-utils-9.11.36-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867205" comment="dhcp-client-4.3.6-50.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867206" comment="dhcp-common-4.3.6-50.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867207" comment="dhcp-libs-4.3.6-50.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867208" comment="dhcp-relay-4.3.6-50.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867209" comment="dhcp-server-4.3.6-50.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867210" comment="python3-bind-9.11.36-14.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2974" version="1" class="patch">
	<metadata>
		<title>security update for python-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3275.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3275.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866377" comment="python3-dns-1.15.0-12.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2975" version="1" class="patch">
	<metadata>
		<title>security update for dotnet7.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386/" source="CVE"/>
		<reference ref_id="CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404/" source="CVE"/>
		<reference ref_id="CVE-2024-30045" ref_url="https://www.suse.com/security/cve/CVE-2024-30045/" source="CVE"/>
		<reference ref_id="CVE-2024-30046" ref_url="https://www.suse.com/security/cve/CVE-2024-30046/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3340.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3340.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30045/">CVE-2024-30045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30045">CVE-2024-30045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30046/">CVE-2024-30046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30046">CVE-2024-30046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874550" comment="aspnetcore-runtime-7.0-7.0.19-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874551" comment="aspnetcore-targeting-pack-7.0-7.0.19-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874552" comment="dotnet-apphost-pack-7.0-7.0.19-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874553" comment="dotnet-hostfxr-7.0-7.0.19-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874554" comment="dotnet-runtime-7.0-7.0.19-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874555" comment="dotnet-sdk-7.0-7.0.119-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874556" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874557" comment="dotnet-targeting-pack-7.0-7.0.19-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874558" comment="dotnet-templates-7.0-7.0.119-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2976" version="1" class="patch">
	<metadata>
		<title>security update for gdk-pixbuf2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3341.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3341.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874559" comment="gdk-pixbuf2-2.36.12-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874560" comment="gdk-pixbuf2-devel-2.36.12-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874561" comment="gdk-pixbuf2-modules-2.36.12-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874168" comment="gdk-pixbuf2-xlib-2.36.12-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874169" comment="gdk-pixbuf2-xlib-devel-2.36.12-6.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2977" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866378" comment="xorg-x11-server-Xwayland-21.1.3-16.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2978" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3344.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3344.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873490" comment="compat-libpthread-nonshared-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873491" comment="glibc-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873492" comment="glibc-all-langpacks-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873493" comment="glibc-benchtests-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873494" comment="glibc-common-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873495" comment="glibc-devel-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873496" comment="glibc-doc-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873497" comment="glibc-gconv-extra-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873498" comment="glibc-headers-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873499" comment="glibc-langpack-aa-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873500" comment="glibc-langpack-af-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873501" comment="glibc-langpack-agr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873502" comment="glibc-langpack-ak-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873503" comment="glibc-langpack-am-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873504" comment="glibc-langpack-an-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873505" comment="glibc-langpack-anp-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873506" comment="glibc-langpack-ar-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873507" comment="glibc-langpack-as-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873508" comment="glibc-langpack-ast-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873509" comment="glibc-langpack-ayc-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873510" comment="glibc-langpack-az-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873511" comment="glibc-langpack-be-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873512" comment="glibc-langpack-bem-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873513" comment="glibc-langpack-ber-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873514" comment="glibc-langpack-bg-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873515" comment="glibc-langpack-bhb-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873516" comment="glibc-langpack-bho-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873517" comment="glibc-langpack-bi-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873518" comment="glibc-langpack-bn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873519" comment="glibc-langpack-bo-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873520" comment="glibc-langpack-br-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873521" comment="glibc-langpack-brx-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873522" comment="glibc-langpack-bs-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873523" comment="glibc-langpack-byn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873524" comment="glibc-langpack-ca-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873525" comment="glibc-langpack-ce-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873526" comment="glibc-langpack-chr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873527" comment="glibc-langpack-cmn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873528" comment="glibc-langpack-crh-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873529" comment="glibc-langpack-cs-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873530" comment="glibc-langpack-csb-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873531" comment="glibc-langpack-cv-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873532" comment="glibc-langpack-cy-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873533" comment="glibc-langpack-da-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873534" comment="glibc-langpack-de-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873535" comment="glibc-langpack-doi-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873536" comment="glibc-langpack-dsb-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873537" comment="glibc-langpack-dv-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873538" comment="glibc-langpack-dz-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873539" comment="glibc-langpack-el-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873540" comment="glibc-langpack-en-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873541" comment="glibc-langpack-eo-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873542" comment="glibc-langpack-es-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873543" comment="glibc-langpack-et-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873544" comment="glibc-langpack-eu-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873545" comment="glibc-langpack-fa-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873546" comment="glibc-langpack-ff-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873547" comment="glibc-langpack-fi-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873548" comment="glibc-langpack-fil-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873549" comment="glibc-langpack-fo-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873550" comment="glibc-langpack-fr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873551" comment="glibc-langpack-fur-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873552" comment="glibc-langpack-fy-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873553" comment="glibc-langpack-ga-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873554" comment="glibc-langpack-gd-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873555" comment="glibc-langpack-gez-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873556" comment="glibc-langpack-gl-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873557" comment="glibc-langpack-gu-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873558" comment="glibc-langpack-gv-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873559" comment="glibc-langpack-ha-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873560" comment="glibc-langpack-hak-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873561" comment="glibc-langpack-he-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873562" comment="glibc-langpack-hi-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873563" comment="glibc-langpack-hif-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873564" comment="glibc-langpack-hne-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873565" comment="glibc-langpack-hr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873566" comment="glibc-langpack-hsb-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873567" comment="glibc-langpack-ht-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873568" comment="glibc-langpack-hu-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873569" comment="glibc-langpack-hy-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873570" comment="glibc-langpack-ia-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873571" comment="glibc-langpack-id-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873572" comment="glibc-langpack-ig-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873573" comment="glibc-langpack-ik-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873574" comment="glibc-langpack-is-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873575" comment="glibc-langpack-it-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873576" comment="glibc-langpack-iu-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873577" comment="glibc-langpack-ja-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873578" comment="glibc-langpack-ka-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873579" comment="glibc-langpack-kab-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873580" comment="glibc-langpack-kk-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873581" comment="glibc-langpack-kl-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873582" comment="glibc-langpack-km-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873583" comment="glibc-langpack-kn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873584" comment="glibc-langpack-ko-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873585" comment="glibc-langpack-kok-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873586" comment="glibc-langpack-ks-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873587" comment="glibc-langpack-ku-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873588" comment="glibc-langpack-kw-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873589" comment="glibc-langpack-ky-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873590" comment="glibc-langpack-lb-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873591" comment="glibc-langpack-lg-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873592" comment="glibc-langpack-li-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873593" comment="glibc-langpack-lij-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873594" comment="glibc-langpack-ln-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873595" comment="glibc-langpack-lo-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873596" comment="glibc-langpack-lt-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873597" comment="glibc-langpack-lv-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873598" comment="glibc-langpack-lzh-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873599" comment="glibc-langpack-mag-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873600" comment="glibc-langpack-mai-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873601" comment="glibc-langpack-mfe-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873602" comment="glibc-langpack-mg-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873603" comment="glibc-langpack-mhr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873604" comment="glibc-langpack-mi-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873605" comment="glibc-langpack-miq-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873606" comment="glibc-langpack-mjw-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873607" comment="glibc-langpack-mk-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873608" comment="glibc-langpack-ml-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873609" comment="glibc-langpack-mn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873610" comment="glibc-langpack-mni-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873611" comment="glibc-langpack-mr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873612" comment="glibc-langpack-ms-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873613" comment="glibc-langpack-mt-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873614" comment="glibc-langpack-my-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873615" comment="glibc-langpack-nan-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873616" comment="glibc-langpack-nb-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873617" comment="glibc-langpack-nds-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873618" comment="glibc-langpack-ne-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873619" comment="glibc-langpack-nhn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873620" comment="glibc-langpack-niu-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873621" comment="glibc-langpack-nl-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873622" comment="glibc-langpack-nn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873623" comment="glibc-langpack-nr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873624" comment="glibc-langpack-nso-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873625" comment="glibc-langpack-oc-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873626" comment="glibc-langpack-om-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873627" comment="glibc-langpack-or-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873628" comment="glibc-langpack-os-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873629" comment="glibc-langpack-pa-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873630" comment="glibc-langpack-pap-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873631" comment="glibc-langpack-pl-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873632" comment="glibc-langpack-ps-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873633" comment="glibc-langpack-pt-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873634" comment="glibc-langpack-quz-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873635" comment="glibc-langpack-raj-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873636" comment="glibc-langpack-ro-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873637" comment="glibc-langpack-ru-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873638" comment="glibc-langpack-rw-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873639" comment="glibc-langpack-sa-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873640" comment="glibc-langpack-sah-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873641" comment="glibc-langpack-sat-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873642" comment="glibc-langpack-sc-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873643" comment="glibc-langpack-sd-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873644" comment="glibc-langpack-se-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873645" comment="glibc-langpack-sgs-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873646" comment="glibc-langpack-shn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873647" comment="glibc-langpack-shs-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873648" comment="glibc-langpack-si-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873649" comment="glibc-langpack-sid-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873650" comment="glibc-langpack-sk-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873651" comment="glibc-langpack-sl-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873652" comment="glibc-langpack-sm-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873653" comment="glibc-langpack-so-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873654" comment="glibc-langpack-sq-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873655" comment="glibc-langpack-sr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873656" comment="glibc-langpack-ss-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873657" comment="glibc-langpack-st-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873658" comment="glibc-langpack-sv-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873659" comment="glibc-langpack-sw-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873660" comment="glibc-langpack-szl-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873661" comment="glibc-langpack-ta-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873662" comment="glibc-langpack-tcy-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873663" comment="glibc-langpack-te-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873664" comment="glibc-langpack-tg-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873665" comment="glibc-langpack-th-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873666" comment="glibc-langpack-the-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873667" comment="glibc-langpack-ti-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873668" comment="glibc-langpack-tig-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873669" comment="glibc-langpack-tk-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873670" comment="glibc-langpack-tl-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873671" comment="glibc-langpack-tn-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873672" comment="glibc-langpack-to-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873673" comment="glibc-langpack-tpi-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873674" comment="glibc-langpack-tr-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873675" comment="glibc-langpack-ts-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873676" comment="glibc-langpack-tt-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873677" comment="glibc-langpack-ug-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873678" comment="glibc-langpack-uk-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873679" comment="glibc-langpack-unm-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873680" comment="glibc-langpack-ur-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873681" comment="glibc-langpack-uz-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873682" comment="glibc-langpack-ve-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873683" comment="glibc-langpack-vi-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873684" comment="glibc-langpack-wa-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873685" comment="glibc-langpack-wae-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873686" comment="glibc-langpack-wal-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873687" comment="glibc-langpack-wo-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873688" comment="glibc-langpack-xh-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873689" comment="glibc-langpack-yi-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873690" comment="glibc-langpack-yo-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873691" comment="glibc-langpack-yue-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873692" comment="glibc-langpack-yuw-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873693" comment="glibc-langpack-zh-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873694" comment="glibc-langpack-zu-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873695" comment="glibc-locale-source-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873696" comment="glibc-minimal-langpack-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873697" comment="glibc-nss-devel-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873698" comment="glibc-static-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873699" comment="glibc-utils-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873700" comment="libnsl-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873701" comment="nscd-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873702" comment="nss_db-2.28-251.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873703" comment="nss_hesiod-2.28-251.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2979" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-30045" ref_url="https://www.suse.com/security/cve/CVE-2024-30045/" source="CVE"/>
		<reference ref_id="CVE-2024-30046" ref_url="https://www.suse.com/security/cve/CVE-2024-30046/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3345.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3345.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30045/">CVE-2024-30045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30045">CVE-2024-30045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30046/">CVE-2024-30046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30046">CVE-2024-30046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873290" comment="aspnetcore-runtime-8.0-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873291" comment="aspnetcore-runtime-dbg-8.0-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873292" comment="aspnetcore-targeting-pack-8.0-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873293" comment="dotnet-8.0.105-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873294" comment="dotnet-apphost-pack-8.0-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873295" comment="dotnet-host-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873296" comment="dotnet-hostfxr-8.0-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873297" comment="dotnet-runtime-8.0-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873298" comment="dotnet-runtime-dbg-8.0-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873299" comment="dotnet-sdk-8.0-8.0.105-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873300" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873301" comment="dotnet-sdk-dbg-8.0-8.0.105-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873302" comment="dotnet-targeting-pack-8.0-8.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873303" comment="dotnet-templates-8.0-8.0.105-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873304" comment="netstandard-targeting-pack-2.1-8.0.105-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2980" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3346.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3346.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873704" comment="git-lfs-3.4.1-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2981" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3347.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3347.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866379" comment="platform-python-3.6.8-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866380" comment="platform-python-debug-3.6.8-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866381" comment="platform-python-devel-3.6.8-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866382" comment="python3-idle-3.6.8-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866383" comment="python3-libs-3.6.8-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866384" comment="python3-test-3.6.8-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866385" comment="python3-tkinter-3.6.8-62.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2982" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<reference ref_id="CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756/" source="CVE"/>
		<reference ref_id="CVE-2024-27280" ref_url="https://www.suse.com/security/cve/CVE-2024-27280/" source="CVE"/>
		<reference ref_id="CVE-2024-27281" ref_url="https://www.suse.com/security/cve/CVE-2024-27281/" source="CVE"/>
		<reference ref_id="CVE-2024-27282" ref_url="https://www.suse.com/security/cve/CVE-2024-27282/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3500.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3500.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27280/">CVE-2024-27280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27280">CVE-2024-27280 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27281/">CVE-2024-27281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27281">CVE-2024-27281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27282/">CVE-2024-27282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27282">CVE-2024-27282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874562" comment="ruby-3.0.7-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874563" comment="ruby-default-gems-3.0.7-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874564" comment="ruby-devel-3.0.7-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874565" comment="ruby-doc-3.0.7-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874566" comment="ruby-libs-3.0.7-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874567" comment="rubygem-abrt-0.4.0-1.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874568" comment="rubygem-abrt-doc-0.4.0-1.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874569" comment="rubygem-bigdecimal-3.0.0-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874570" comment="rubygem-bundler-2.2.33-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874571" comment="rubygem-io-console-0.5.7-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874572" comment="rubygem-irb-1.3.5-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874573" comment="rubygem-json-2.5.1-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874574" comment="rubygem-minitest-5.14.2-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874575" comment="rubygem-mysql2-0.5.3-2.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874576" comment="rubygem-mysql2-doc-0.5.3-2.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874577" comment="rubygem-pg-1.2.3-1.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874578" comment="rubygem-pg-doc-1.2.3-1.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874579" comment="rubygem-power_assert-1.2.1-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874580" comment="rubygem-psych-3.3.2-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874581" comment="rubygem-rake-13.0.3-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874582" comment="rubygem-rbs-1.4.0-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874583" comment="rubygem-rdoc-6.3.4.1-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874584" comment="rubygem-rexml-3.2.5-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874585" comment="rubygem-rss-0.2.9-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874586" comment="rubygem-test-unit-3.3.7-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874587" comment="rubygem-typeprof-0.15.2-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874588" comment="rubygems-3.2.33-143.module+el8.10.0+21858+d19f3934 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874589" comment="rubygems-devel-3.2.33-143.module+el8.10.0+21858+d19f3934 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2983" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-27280" ref_url="https://www.suse.com/security/cve/CVE-2024-27280/" source="CVE"/>
		<reference ref_id="CVE-2024-27281" ref_url="https://www.suse.com/security/cve/CVE-2024-27281/" source="CVE"/>
		<reference ref_id="CVE-2024-27282" ref_url="https://www.suse.com/security/cve/CVE-2024-27282/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3546.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3546.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27280/">CVE-2024-27280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27280">CVE-2024-27280 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27281/">CVE-2024-27281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27281">CVE-2024-27281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27282/">CVE-2024-27282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27282">CVE-2024-27282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874590" comment="ruby-3.1.5-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874591" comment="ruby-bundled-gems-3.1.5-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874592" comment="ruby-default-gems-3.1.5-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874593" comment="ruby-devel-3.1.5-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874594" comment="ruby-doc-3.1.5-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874595" comment="ruby-libs-3.1.5-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874596" comment="rubygem-abrt-0.4.0-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874597" comment="rubygem-abrt-doc-0.4.0-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874598" comment="rubygem-bigdecimal-3.1.1-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874599" comment="rubygem-bundler-2.3.27-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874600" comment="rubygem-io-console-0.5.11-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874601" comment="rubygem-irb-1.4.1-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874602" comment="rubygem-json-2.6.1-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874603" comment="rubygem-minitest-5.15.0-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874604" comment="rubygem-mysql2-0.5.3-3.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874605" comment="rubygem-mysql2-doc-0.5.3-3.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874606" comment="rubygem-pg-1.3.2-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874607" comment="rubygem-pg-doc-1.3.2-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874608" comment="rubygem-power_assert-2.0.1-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874609" comment="rubygem-psych-4.0.4-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874610" comment="rubygem-rake-13.0.6-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874611" comment="rubygem-rbs-2.7.0-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874612" comment="rubygem-rdoc-6.4.1.1-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874613" comment="rubygem-rexml-3.2.5-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874614" comment="rubygem-rss-0.2.9-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874615" comment="rubygem-test-unit-3.5.3-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874616" comment="rubygem-typeprof-0.21.3-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874617" comment="rubygems-3.3.27-143.module+el8.10.0+21792+e2f63d26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874618" comment="rubygems-devel-3.3.27-143.module+el8.10.0+21792+e2f63d26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2984" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-25162" ref_url="https://www.suse.com/security/cve/CVE-2019-25162/" source="CVE"/>
		<reference ref_id="CVE-2020-36777" ref_url="https://www.suse.com/security/cve/CVE-2020-36777/" source="CVE"/>
		<reference ref_id="CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934/" source="CVE"/>
		<reference ref_id="CVE-2021-47013" ref_url="https://www.suse.com/security/cve/CVE-2021-47013/" source="CVE"/>
		<reference ref_id="CVE-2021-47055" ref_url="https://www.suse.com/security/cve/CVE-2021-47055/" source="CVE"/>
		<reference ref_id="CVE-2021-47118" ref_url="https://www.suse.com/security/cve/CVE-2021-47118/" source="CVE"/>
		<reference ref_id="CVE-2021-47153" ref_url="https://www.suse.com/security/cve/CVE-2021-47153/" source="CVE"/>
		<reference ref_id="CVE-2021-47171" ref_url="https://www.suse.com/security/cve/CVE-2021-47171/" source="CVE"/>
		<reference ref_id="CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185/" source="CVE"/>
		<reference ref_id="CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627/" source="CVE"/>
		<reference ref_id="CVE-2022-48669" ref_url="https://www.suse.com/security/cve/CVE-2022-48669/" source="CVE"/>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477/" source="CVE"/>
		<reference ref_id="CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513/" source="CVE"/>
		<reference ref_id="CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520/" source="CVE"/>
		<reference ref_id="CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528/" source="CVE"/>
		<reference ref_id="CVE-2023-52565" ref_url="https://www.suse.com/security/cve/CVE-2023-52565/" source="CVE"/>
		<reference ref_id="CVE-2023-52578" ref_url="https://www.suse.com/security/cve/CVE-2023-52578/" source="CVE"/>
		<reference ref_id="CVE-2023-52594" ref_url="https://www.suse.com/security/cve/CVE-2023-52594/" source="CVE"/>
		<reference ref_id="CVE-2023-52595" ref_url="https://www.suse.com/security/cve/CVE-2023-52595/" source="CVE"/>
		<reference ref_id="CVE-2023-52598" ref_url="https://www.suse.com/security/cve/CVE-2023-52598/" source="CVE"/>
		<reference ref_id="CVE-2023-52606" ref_url="https://www.suse.com/security/cve/CVE-2023-52606/" source="CVE"/>
		<reference ref_id="CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607/" source="CVE"/>
		<reference ref_id="CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610/" source="CVE"/>
		<reference ref_id="CVE-2023-54170" ref_url="https://www.suse.com/security/cve/CVE-2023-54170/" source="CVE"/>
		<reference ref_id="CVE-2023-6240" ref_url="https://www.suse.com/security/cve/CVE-2023-6240/" source="CVE"/>
		<reference ref_id="CVE-2024-0340" ref_url="https://www.suse.com/security/cve/CVE-2024-0340/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603/" source="CVE"/>
		<reference ref_id="CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610/" source="CVE"/>
		<reference ref_id="CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615/" source="CVE"/>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-26659" ref_url="https://www.suse.com/security/cve/CVE-2024-26659/" source="CVE"/>
		<reference ref_id="CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664/" source="CVE"/>
		<reference ref_id="CVE-2024-26693" ref_url="https://www.suse.com/security/cve/CVE-2024-26693/" source="CVE"/>
		<reference ref_id="CVE-2024-26694" ref_url="https://www.suse.com/security/cve/CVE-2024-26694/" source="CVE"/>
		<reference ref_id="CVE-2024-26743" ref_url="https://www.suse.com/security/cve/CVE-2024-26743/" source="CVE"/>
		<reference ref_id="CVE-2024-26744" ref_url="https://www.suse.com/security/cve/CVE-2024-26744/" source="CVE"/>
		<reference ref_id="CVE-2024-26779" ref_url="https://www.suse.com/security/cve/CVE-2024-26779/" source="CVE"/>
		<reference ref_id="CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782/" source="CVE"/>
		<reference ref_id="CVE-2024-26872" ref_url="https://www.suse.com/security/cve/CVE-2024-26872/" source="CVE"/>
		<reference ref_id="CVE-2024-26892" ref_url="https://www.suse.com/security/cve/CVE-2024-26892/" source="CVE"/>
		<reference ref_id="CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897/" source="CVE"/>
		<reference ref_id="CVE-2024-26901" ref_url="https://www.suse.com/security/cve/CVE-2024-26901/" source="CVE"/>
		<reference ref_id="CVE-2024-26919" ref_url="https://www.suse.com/security/cve/CVE-2024-26919/" source="CVE"/>
		<reference ref_id="CVE-2024-26933" ref_url="https://www.suse.com/security/cve/CVE-2024-26933/" source="CVE"/>
		<reference ref_id="CVE-2024-26934" ref_url="https://www.suse.com/security/cve/CVE-2024-26934/" source="CVE"/>
		<reference ref_id="CVE-2024-26964" ref_url="https://www.suse.com/security/cve/CVE-2024-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-26973" ref_url="https://www.suse.com/security/cve/CVE-2024-26973/" source="CVE"/>
		<reference ref_id="CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993/" source="CVE"/>
		<reference ref_id="CVE-2024-27014" ref_url="https://www.suse.com/security/cve/CVE-2024-27014/" source="CVE"/>
		<reference ref_id="CVE-2024-27048" ref_url="https://www.suse.com/security/cve/CVE-2024-27048/" source="CVE"/>
		<reference ref_id="CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052/" source="CVE"/>
		<reference ref_id="CVE-2024-27056" ref_url="https://www.suse.com/security/cve/CVE-2024-27056/" source="CVE"/>
		<reference ref_id="CVE-2024-27059" ref_url="https://www.suse.com/security/cve/CVE-2024-27059/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3618.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3618.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25162/">CVE-2019-25162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25162">CVE-2019-25162 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-36777/">CVE-2020-36777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36777">CVE-2020-36777 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47013/">CVE-2021-47013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47013">CVE-2021-47013 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47055/">CVE-2021-47055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47055">CVE-2021-47055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47118/">CVE-2021-47118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47118">CVE-2021-47118 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47153/">CVE-2021-47153 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47153">CVE-2021-47153 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47171/">CVE-2021-47171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47171">CVE-2021-47171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48669/">CVE-2022-48669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48669">CVE-2022-48669 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52565/">CVE-2023-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52565">CVE-2023-52565 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52578/">CVE-2023-52578 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52578">CVE-2023-52578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52594/">CVE-2023-52594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52595/">CVE-2023-52595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52598/">CVE-2023-52598 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52606/">CVE-2023-52606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54170/">CVE-2023-54170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54170">CVE-2023-54170 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6240/">CVE-2023-6240 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6240">CVE-2023-6240 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0340/">CVE-2024-0340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26659/">CVE-2024-26659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26693/">CVE-2024-26693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26693">CVE-2024-26693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26694/">CVE-2024-26694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26694">CVE-2024-26694 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26743/">CVE-2024-26743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26744/">CVE-2024-26744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26779/">CVE-2024-26779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26872/">CVE-2024-26872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26872">CVE-2024-26872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26892/">CVE-2024-26892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26892">CVE-2024-26892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26901/">CVE-2024-26901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26901">CVE-2024-26901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26919/">CVE-2024-26919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26919">CVE-2024-26919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26933/">CVE-2024-26933 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26934/">CVE-2024-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26964/">CVE-2024-26964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26973/">CVE-2024-26973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27014/">CVE-2024-27014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27048/">CVE-2024-27048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27048">CVE-2024-27048 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27056/">CVE-2024-27056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27056">CVE-2024-27056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27059/">CVE-2024-27059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866386" comment="bpftool-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866387" comment="kernel-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866388" comment="kernel-abi-stablelists-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866389" comment="kernel-core-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866390" comment="kernel-cross-headers-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866391" comment="kernel-debug-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866392" comment="kernel-debug-core-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866394" comment="kernel-debug-modules-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866395" comment="kernel-debug-modules-extra-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866397" comment="kernel-doc-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866398" comment="kernel-headers-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866399" comment="kernel-modules-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866400" comment="kernel-modules-extra-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866401" comment="kernel-tools-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866402" comment="kernel-tools-libs-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866404" comment="perf-4.18.0-553.5.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866405" comment="python3-perf-4.18.0-553.5.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2985" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3626.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3626.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866406" comment="libxml2-2.9.7-18.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866407" comment="libxml2-devel-2.9.7-18.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866408" comment="python3-libxml2-2.9.7-18.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2986" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672/" source="CVE"/>
		<reference ref_id="CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3666.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3666.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866409" comment="tomcat-9.0.87-1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866410" comment="tomcat-admin-webapps-9.0.87-1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866411" comment="tomcat-docs-webapp-9.0.87-1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866412" comment="tomcat-el-3.0-api-9.0.87-1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866413" comment="tomcat-jsp-2.3-api-9.0.87-1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866414" comment="tomcat-lib-9.0.87-1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866415" comment="tomcat-servlet-4.0-api-9.0.87-1.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866416" comment="tomcat-webapps-9.0.87-1.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2987" version="1" class="patch">
	<metadata>
		<title>security update for cockpit (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2947" ref_url="https://www.suse.com/security/cve/CVE-2024-2947/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2947/">CVE-2024-2947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2947">CVE-2024-2947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866417" comment="cockpit-310.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866418" comment="cockpit-bridge-310.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866419" comment="cockpit-doc-310.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866420" comment="cockpit-system-310.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866421" comment="cockpit-ws-310.4-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2988" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-27280" ref_url="https://www.suse.com/security/cve/CVE-2024-27280/" source="CVE"/>
		<reference ref_id="CVE-2024-27281" ref_url="https://www.suse.com/security/cve/CVE-2024-27281/" source="CVE"/>
		<reference ref_id="CVE-2024-27282" ref_url="https://www.suse.com/security/cve/CVE-2024-27282/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3670.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3670.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27280/">CVE-2024-27280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27280">CVE-2024-27280 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27281/">CVE-2024-27281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27281">CVE-2024-27281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27282/">CVE-2024-27282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27282">CVE-2024-27282 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874619" comment="ruby-3.3.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874620" comment="ruby-bundled-gems-3.3.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874621" comment="ruby-default-gems-3.3.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874622" comment="ruby-devel-3.3.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874623" comment="ruby-doc-3.3.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874624" comment="ruby-libs-3.3.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874625" comment="rubygem-abrt-0.4.0-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874626" comment="rubygem-abrt-doc-0.4.0-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874627" comment="rubygem-bigdecimal-3.1.5-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874628" comment="rubygem-bundler-2.5.9-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874629" comment="rubygem-io-console-0.7.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874630" comment="rubygem-irb-1.11.0-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874631" comment="rubygem-json-2.7.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874632" comment="rubygem-minitest-5.20.0-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874633" comment="rubygem-mysql2-0.5.5-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874634" comment="rubygem-mysql2-doc-0.5.5-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874635" comment="rubygem-pg-1.5.4-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874636" comment="rubygem-pg-doc-1.5.4-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874637" comment="rubygem-power_assert-2.0.3-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874638" comment="rubygem-psych-5.1.2-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874639" comment="rubygem-racc-1.7.3-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874640" comment="rubygem-rake-13.1.0-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874641" comment="rubygem-rbs-3.4.0-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874642" comment="rubygem-rdoc-6.6.3.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874643" comment="rubygem-rexml-3.2.6-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874644" comment="rubygem-rss-0.3.0-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874645" comment="rubygem-test-unit-3.6.1-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874646" comment="rubygem-typeprof-0.21.9-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874647" comment="rubygems-3.5.9-2.module+el8.10.0+21860+47fbda2a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874648" comment="rubygems-devel-3.5.9-2.module+el8.10.0+21860+47fbda2a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2989" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3783.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3783.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866422" comment="firefox-115.11.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2990" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3784.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3784.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866423" comment="thunderbird-115.11.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2991" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3954.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3954.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869888" comment="firefox-115.12.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2992" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3961.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3961.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872713" comment="flatpak-1.12.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872714" comment="flatpak-devel-1.12.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872715" comment="flatpak-libs-1.12.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872716" comment="flatpak-selinux-1.12.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872717" comment="flatpak-session-helper-1.12.9-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2993" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-28176" ref_url="https://www.suse.com/security/cve/CVE-2024-28176/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3968.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3968.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28176/">CVE-2024-28176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28176">CVE-2024-28176 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873923" comment="aardvark-dns-1.10.0-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873924" comment="buildah-1.33.7-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873925" comment="buildah-tests-1.33.7-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873926" comment="cockpit-podman-84.1-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873927" comment="conmon-2.1.10-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873928" comment="container-selinux-2.229.0-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873929" comment="containernetworking-plugins-1.4.0-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873930" comment="containers-common-1-81.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873931" comment="crit-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873932" comment="criu-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873933" comment="criu-devel-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873934" comment="criu-libs-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873935" comment="crun-1.14.3-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873936" comment="fuse-overlayfs-1.13-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873937" comment="libslirp-4.4.0-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873938" comment="libslirp-devel-4.4.0-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873939" comment="netavark-1.10.3-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873940" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873941" comment="podman-4.9.4-3.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873942" comment="podman-catatonit-4.9.4-3.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873943" comment="podman-docker-4.9.4-3.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873944" comment="podman-gvproxy-4.9.4-3.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873945" comment="podman-plugins-4.9.4-3.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873946" comment="podman-remote-4.9.4-3.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873947" comment="podman-tests-4.9.4-3.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873948" comment="python3-criu-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873949" comment="python3-podman-4.9.0-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873950" comment="runc-1.1.12-1.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873951" comment="skopeo-1.14.3-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873952" comment="skopeo-tests-1.14.3-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873953" comment="slirp4netns-1.2.3-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873954" comment="toolbox-0.0.99.5-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873955" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873956" comment="udica-0.2.6-21.module+el8.10.0+21962+8143777b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2994" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-33871" ref_url="https://www.suse.com/security/cve/CVE-2024-33871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4000.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4000.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-33871/">CVE-2024-33871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33871">CVE-2024-33871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869889" comment="ghostscript-9.27-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869890" comment="ghostscript-doc-9.27-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869891" comment="ghostscript-tools-dvipdf-9.27-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869892" comment="ghostscript-tools-fonts-9.27-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869893" comment="ghostscript-tools-printing-9.27-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869894" comment="ghostscript-x11-9.27-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869895" comment="libgs-9.27-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869896" comment="libgs-devel-9.27-13.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2995" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4036.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4036.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869897" comment="thunderbird-115.12.1-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2996" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4058.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4058.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869898" comment="python3.11-3.11.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869899" comment="python3.11-debug-3.11.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869900" comment="python3.11-devel-3.11.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869901" comment="python3.11-idle-3.11.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869902" comment="python3.11-libs-3.11.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869903" comment="python3.11-rpm-macros-3.11.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869904" comment="python3.11-test-3.11.9-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869905" comment="python3.11-tkinter-3.11.9-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2997" version="1" class="patch">
	<metadata>
		<title>security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-32002" ref_url="https://www.suse.com/security/cve/CVE-2024-32002/" source="CVE"/>
		<reference ref_id="CVE-2024-32004" ref_url="https://www.suse.com/security/cve/CVE-2024-32004/" source="CVE"/>
		<reference ref_id="CVE-2024-32020" ref_url="https://www.suse.com/security/cve/CVE-2024-32020/" source="CVE"/>
		<reference ref_id="CVE-2024-32021" ref_url="https://www.suse.com/security/cve/CVE-2024-32021/" source="CVE"/>
		<reference ref_id="CVE-2024-32465" ref_url="https://www.suse.com/security/cve/CVE-2024-32465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4084.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4084.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32002/">CVE-2024-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32004/">CVE-2024-32004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32020/">CVE-2024-32020 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32021/">CVE-2024-32021 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32465/">CVE-2024-32465 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869906" comment="git-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869907" comment="git-all-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869908" comment="git-core-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869909" comment="git-core-doc-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869910" comment="git-credential-libsecret-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869911" comment="git-daemon-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869912" comment="git-email-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869913" comment="git-gui-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869914" comment="git-instaweb-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869915" comment="git-subtree-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869916" comment="git-svn-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869917" comment="gitk-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869918" comment="gitweb-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869919" comment="perl-Git-2.43.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869920" comment="perl-Git-SVN-2.43.5-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2998" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-38709" ref_url="https://www.suse.com/security/cve/CVE-2023-38709/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38709/">CVE-2023-38709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38709">CVE-2023-38709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874649" comment="httpd-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874650" comment="httpd-devel-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874651" comment="httpd-filesystem-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874652" comment="httpd-manual-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874653" comment="httpd-tools-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866046" comment="mod_http2-1.15.7-10.module+el8.10.0+21653+eaff63f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874654" comment="mod_ldap-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854384" comment="mod_md-2.0.8-8.module+el8.9.0+19080+567b90f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874655" comment="mod_proxy_html-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874656" comment="mod_session-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874657" comment="mod_ssl-2.4.37-65.module+el8.10.0+21982+14717793 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2999" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2021-46909" ref_url="https://www.suse.com/security/cve/CVE-2021-46909/" source="CVE"/>
		<reference ref_id="CVE-2021-46972" ref_url="https://www.suse.com/security/cve/CVE-2021-46972/" source="CVE"/>
		<reference ref_id="CVE-2021-47069" ref_url="https://www.suse.com/security/cve/CVE-2021-47069/" source="CVE"/>
		<reference ref_id="CVE-2021-47073" ref_url="https://www.suse.com/security/cve/CVE-2021-47073/" source="CVE"/>
		<reference ref_id="CVE-2021-47236" ref_url="https://www.suse.com/security/cve/CVE-2021-47236/" source="CVE"/>
		<reference ref_id="CVE-2021-47310" ref_url="https://www.suse.com/security/cve/CVE-2021-47310/" source="CVE"/>
		<reference ref_id="CVE-2021-47311" ref_url="https://www.suse.com/security/cve/CVE-2021-47311/" source="CVE"/>
		<reference ref_id="CVE-2021-47353" ref_url="https://www.suse.com/security/cve/CVE-2021-47353/" source="CVE"/>
		<reference ref_id="CVE-2021-47356" ref_url="https://www.suse.com/security/cve/CVE-2021-47356/" source="CVE"/>
		<reference ref_id="CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456/" source="CVE"/>
		<reference ref_id="CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495/" source="CVE"/>
		<reference ref_id="CVE-2022-49057" ref_url="https://www.suse.com/security/cve/CVE-2022-49057/" source="CVE"/>
		<reference ref_id="CVE-2023-5090" ref_url="https://www.suse.com/security/cve/CVE-2023-5090/" source="CVE"/>
		<reference ref_id="CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464/" source="CVE"/>
		<reference ref_id="CVE-2023-52560" ref_url="https://www.suse.com/security/cve/CVE-2023-52560/" source="CVE"/>
		<reference ref_id="CVE-2023-52615" ref_url="https://www.suse.com/security/cve/CVE-2023-52615/" source="CVE"/>
		<reference ref_id="CVE-2023-52626" ref_url="https://www.suse.com/security/cve/CVE-2023-52626/" source="CVE"/>
		<reference ref_id="CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667/" source="CVE"/>
		<reference ref_id="CVE-2023-52669" ref_url="https://www.suse.com/security/cve/CVE-2023-52669/" source="CVE"/>
		<reference ref_id="CVE-2023-52675" ref_url="https://www.suse.com/security/cve/CVE-2023-52675/" source="CVE"/>
		<reference ref_id="CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686/" source="CVE"/>
		<reference ref_id="CVE-2023-52700" ref_url="https://www.suse.com/security/cve/CVE-2023-52700/" source="CVE"/>
		<reference ref_id="CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703/" source="CVE"/>
		<reference ref_id="CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781/" source="CVE"/>
		<reference ref_id="CVE-2023-52813" ref_url="https://www.suse.com/security/cve/CVE-2023-52813/" source="CVE"/>
		<reference ref_id="CVE-2023-52835" ref_url="https://www.suse.com/security/cve/CVE-2023-52835/" source="CVE"/>
		<reference ref_id="CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877/" source="CVE"/>
		<reference ref_id="CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26656" ref_url="https://www.suse.com/security/cve/CVE-2024-26656/" source="CVE"/>
		<reference ref_id="CVE-2024-26675" ref_url="https://www.suse.com/security/cve/CVE-2024-26675/" source="CVE"/>
		<reference ref_id="CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735/" source="CVE"/>
		<reference ref_id="CVE-2024-26759" ref_url="https://www.suse.com/security/cve/CVE-2024-26759/" source="CVE"/>
		<reference ref_id="CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801/" source="CVE"/>
		<reference ref_id="CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804/" source="CVE"/>
		<reference ref_id="CVE-2024-26826" ref_url="https://www.suse.com/security/cve/CVE-2024-26826/" source="CVE"/>
		<reference ref_id="CVE-2024-26859" ref_url="https://www.suse.com/security/cve/CVE-2024-26859/" source="CVE"/>
		<reference ref_id="CVE-2024-26906" ref_url="https://www.suse.com/security/cve/CVE-2024-26906/" source="CVE"/>
		<reference ref_id="CVE-2024-26907" ref_url="https://www.suse.com/security/cve/CVE-2024-26907/" source="CVE"/>
		<reference ref_id="CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974/" source="CVE"/>
		<reference ref_id="CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982/" source="CVE"/>
		<reference ref_id="CVE-2024-27397" ref_url="https://www.suse.com/security/cve/CVE-2024-27397/" source="CVE"/>
		<reference ref_id="CVE-2024-27410" ref_url="https://www.suse.com/security/cve/CVE-2024-27410/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35835" ref_url="https://www.suse.com/security/cve/CVE-2024-35835/" source="CVE"/>
		<reference ref_id="CVE-2024-35838" ref_url="https://www.suse.com/security/cve/CVE-2024-35838/" source="CVE"/>
		<reference ref_id="CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845/" source="CVE"/>
		<reference ref_id="CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852/" source="CVE"/>
		<reference ref_id="CVE-2024-35853" ref_url="https://www.suse.com/security/cve/CVE-2024-35853/" source="CVE"/>
		<reference ref_id="CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854/" source="CVE"/>
		<reference ref_id="CVE-2024-35855" ref_url="https://www.suse.com/security/cve/CVE-2024-35855/" source="CVE"/>
		<reference ref_id="CVE-2024-35888" ref_url="https://www.suse.com/security/cve/CVE-2024-35888/" source="CVE"/>
		<reference ref_id="CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890/" source="CVE"/>
		<reference ref_id="CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958/" source="CVE"/>
		<reference ref_id="CVE-2024-35959" ref_url="https://www.suse.com/security/cve/CVE-2024-35959/" source="CVE"/>
		<reference ref_id="CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960/" source="CVE"/>
		<reference ref_id="CVE-2024-36004" ref_url="https://www.suse.com/security/cve/CVE-2024-36004/" source="CVE"/>
		<reference ref_id="CVE-2024-36007" ref_url="https://www.suse.com/security/cve/CVE-2024-36007/" source="CVE"/>
		<reference ref_id="CVE-2024-42159" ref_url="https://www.suse.com/security/cve/CVE-2024-42159/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4211.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4211.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46909/">CVE-2021-46909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46909">CVE-2021-46909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46972/">CVE-2021-46972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46972">CVE-2021-46972 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47069/">CVE-2021-47069 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47069">CVE-2021-47069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47073/">CVE-2021-47073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47073">CVE-2021-47073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47236/">CVE-2021-47236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47236">CVE-2021-47236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47310/">CVE-2021-47310 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47310">CVE-2021-47310 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47311/">CVE-2021-47311 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47311">CVE-2021-47311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47353/">CVE-2021-47353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47353">CVE-2021-47353 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47356/">CVE-2021-47356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47356">CVE-2021-47356 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49057/">CVE-2022-49057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49057">CVE-2022-49057 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5090/">CVE-2023-5090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5090">CVE-2023-5090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52560/">CVE-2023-52560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52560">CVE-2023-52560 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52615/">CVE-2023-52615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52626/">CVE-2023-52626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52626">CVE-2023-52626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52669/">CVE-2023-52669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52669">CVE-2023-52669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52675/">CVE-2023-52675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52675">CVE-2023-52675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52700/">CVE-2023-52700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52700">CVE-2023-52700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52813/">CVE-2023-52813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52813">CVE-2023-52813 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52835/">CVE-2023-52835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52835">CVE-2023-52835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26656/">CVE-2024-26656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26675/">CVE-2024-26675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26759/">CVE-2024-26759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26759">CVE-2024-26759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26826/">CVE-2024-26826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26826">CVE-2024-26826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26859/">CVE-2024-26859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26859">CVE-2024-26859 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26906/">CVE-2024-26906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26906">CVE-2024-26906 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26907/">CVE-2024-26907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26907">CVE-2024-26907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27397/">CVE-2024-27397 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27397">CVE-2024-27397 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27410/">CVE-2024-27410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27410">CVE-2024-27410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35835/">CVE-2024-35835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35835">CVE-2024-35835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35838/">CVE-2024-35838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35838">CVE-2024-35838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35853/">CVE-2024-35853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35855/">CVE-2024-35855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35888/">CVE-2024-35888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35888">CVE-2024-35888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35959/">CVE-2024-35959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36004/">CVE-2024-36004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36007/">CVE-2024-36007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42159/">CVE-2024-42159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42159">CVE-2024-42159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872718" comment="bpftool-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872719" comment="kernel-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872720" comment="kernel-abi-stablelists-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872721" comment="kernel-core-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872722" comment="kernel-cross-headers-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872723" comment="kernel-debug-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872724" comment="kernel-debug-core-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872726" comment="kernel-debug-modules-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872727" comment="kernel-debug-modules-extra-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872729" comment="kernel-doc-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872730" comment="kernel-headers-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872731" comment="kernel-modules-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872732" comment="kernel-modules-extra-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872733" comment="kernel-tools-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872734" comment="kernel-tools-libs-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872736" comment="perf-4.18.0-553.8.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872737" comment="python3-perf-4.18.0-553.8.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3000" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-28219" ref_url="https://www.suse.com/security/cve/CVE-2024-28219/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4227.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4227.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-28219/">CVE-2024-28219 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28219">CVE-2024-28219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871854" comment="python3-pillow-5.1.1-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871855" comment="python3-pillow-devel-5.1.1-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871856" comment="python3-pillow-doc-5.1.1-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871857" comment="python3-pillow-tk-5.1.1-21.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3001" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4231.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4231.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871858" comment="python3-jinja2-2.10.1-5.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3002" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199/" source="CVE"/>
		<reference ref_id="CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4235.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4235.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871859" comment="389-ds-base-1.4.3.39-7.module+el8.10.0+21985+3665ccdb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871860" comment="389-ds-base-devel-1.4.3.39-7.module+el8.10.0+21985+3665ccdb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871861" comment="389-ds-base-legacy-tools-1.4.3.39-7.module+el8.10.0+21985+3665ccdb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871862" comment="389-ds-base-libs-1.4.3.39-7.module+el8.10.0+21985+3665ccdb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871863" comment="389-ds-base-snmp-1.4.3.39-7.module+el8.10.0+21985+3665ccdb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871864" comment="python3-lib389-1.4.3.39-7.module+el8.10.0+21985+3665ccdb is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3003" version="1" class="patch">
	<metadata>
		<title>security update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4237.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4237.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009866139" comment="delve-1.21.2-3.module+el8.10.0+21244+5b2d9000 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873705" comment="go-toolset-1.21.11-1.module+el8.10.0+21986+2112108a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873706" comment="golang-1.21.11-1.module+el8.10.0+21986+2112108a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873707" comment="golang-bin-1.21.11-1.module+el8.10.0+21986+2112108a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873708" comment="golang-docs-1.21.11-1.module+el8.10.0+21986+2112108a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873709" comment="golang-misc-1.21.11-1.module+el8.10.0+21986+2112108a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873710" comment="golang-src-1.21.11-1.module+el8.10.0+21986+2112108a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873711" comment="golang-tests-1.21.11-1.module+el8.10.0+21986+2112108a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3004" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-7250" ref_url="https://www.suse.com/security/cve/CVE-2023-7250/" source="CVE"/>
		<reference ref_id="CVE-2024-26306" ref_url="https://www.suse.com/security/cve/CVE-2024-26306/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4241.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4241.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-7250/">CVE-2023-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7250">CVE-2023-7250 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26306/">CVE-2024-26306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26306">CVE-2024-26306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873957" comment="iperf3-3.5-10.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3005" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4243.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4243.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873958" comment="python3.12-3.12.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873959" comment="python3.12-debug-3.12.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873960" comment="python3.12-devel-3.12.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873961" comment="python3.12-idle-3.12.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873962" comment="python3.12-libs-3.12.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873963" comment="python3.12-rpm-macros-3.12.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873964" comment="python3.12-test-3.12.3-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873965" comment="python3.12-tkinter-3.12.3-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3006" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-PyMySQL (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-36039" ref_url="https://www.suse.com/security/cve/CVE-2024-36039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4244.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4244.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36039/">CVE-2024-36039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36039">CVE-2024-36039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873966" comment="python3.11-PyMySQL-1.0.2-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3007" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-PyMySQL (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-36039" ref_url="https://www.suse.com/security/cve/CVE-2024-36039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4245.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4245.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36039/">CVE-2024-36039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36039">CVE-2024-36039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873967" comment="python3.12-PyMySQL-1.1.0-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3008" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4246.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4246.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873923" comment="aardvark-dns-1.10.0-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874658" comment="buildah-1.33.8-1.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874659" comment="buildah-tests-1.33.8-1.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873926" comment="cockpit-podman-84.1-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873927" comment="conmon-2.1.10-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873928" comment="container-selinux-2.229.0-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873929" comment="containernetworking-plugins-1.4.0-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873930" comment="containers-common-1-81.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873931" comment="crit-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873932" comment="criu-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873933" comment="criu-devel-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873934" comment="criu-libs-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873935" comment="crun-1.14.3-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873936" comment="fuse-overlayfs-1.13-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873937" comment="libslirp-4.4.0-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873938" comment="libslirp-devel-4.4.0-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873939" comment="netavark-1.10.3-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873940" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874660" comment="podman-4.9.4-4.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874661" comment="podman-catatonit-4.9.4-4.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874662" comment="podman-docker-4.9.4-4.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874663" comment="podman-gvproxy-4.9.4-4.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874664" comment="podman-plugins-4.9.4-4.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874665" comment="podman-remote-4.9.4-4.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874666" comment="podman-tests-4.9.4-4.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873948" comment="python3-criu-3.18-5.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873949" comment="python3-podman-4.9.0-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873950" comment="runc-1.1.12-1.module+el8.10.0+21974+acd2159c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874667" comment="skopeo-1.14.4-1.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874668" comment="skopeo-tests-1.14.4-1.module+el8.10.0+21995+81e8507c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873953" comment="slirp4netns-1.2.3-1.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873954" comment="toolbox-0.0.99.5-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873955" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+21962+8143777b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873956" comment="udica-0.2.6-21.module+el8.10.0+21962+8143777b is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3009" version="1" class="patch">
	<metadata>
		<title>security update for libuv (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4247.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4247.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873968" comment="libuv-1.41.1-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873969" comment="libuv-devel-1.41.1-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3010" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4249.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4249.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873970" comment="c-ares-1.13.0-11.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873971" comment="c-ares-devel-1.13.0-11.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3011" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4252.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4252.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874170" comment="libnghttp2-1.33.0-6.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874171" comment="libnghttp2-devel-1.33.0-6.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874172" comment="nghttp2-1.33.0-6.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3012" version="1" class="patch">
	<metadata>
		<title>security update for less (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624/" source="CVE"/>
		<reference ref_id="CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4256.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4256.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873972" comment="less-530-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3013" version="1" class="patch">
	<metadata>
		<title>security update for xmlrpc-c (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4259.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4259.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874173" comment="xmlrpc-c-1.51.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874174" comment="xmlrpc-c-c++-1.51.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874175" comment="xmlrpc-c-client-1.51.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874176" comment="xmlrpc-c-client++-1.51.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874177" comment="xmlrpc-c-devel-1.51.0-9.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3014" version="1" class="patch">
	<metadata>
		<title>security update for python-idna (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4260.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4260.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873973" comment="python3-idna-2.5-7.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3015" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-31346" ref_url="https://www.suse.com/security/cve/CVE-2023-31346/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4262.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4262.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-31346/">CVE-2023-31346 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31346">CVE-2023-31346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873974" comment="iwl100-firmware-39.31.5.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873975" comment="iwl1000-firmware-39.31.5.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873976" comment="iwl105-firmware-18.168.6.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873977" comment="iwl135-firmware-18.168.6.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873978" comment="iwl2000-firmware-18.168.6.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873979" comment="iwl2030-firmware-18.168.6.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873980" comment="iwl3160-firmware-25.30.13.0-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873981" comment="iwl3945-firmware-15.32.2.9-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873982" comment="iwl4965-firmware-228.61.2.24-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873983" comment="iwl5000-firmware-8.83.5.1_1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873984" comment="iwl5150-firmware-8.24.2.2-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873985" comment="iwl6000-firmware-9.221.4.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873986" comment="iwl6000g2a-firmware-18.168.6.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873987" comment="iwl6000g2b-firmware-18.168.6.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873988" comment="iwl6050-firmware-41.28.5.1-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873989" comment="iwl7260-firmware-25.30.13.0-122.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873990" comment="libertas-sd8686-firmware-20240610-122.git90df68d2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873991" comment="libertas-sd8787-firmware-20240610-122.git90df68d2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873992" comment="libertas-usb8388-firmware-20240610-122.git90df68d2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873993" comment="libertas-usb8388-olpc-firmware-20240610-122.git90df68d2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873994" comment="linux-firmware-20240610-122.git90df68d2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3016" version="1" class="patch">
	<metadata>
		<title>security update for openldap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-2953" ref_url="https://www.suse.com/security/cve/CVE-2023-2953/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4264.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4264.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2953/">CVE-2023-2953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873995" comment="openldap-2.4.46-19.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873996" comment="openldap-clients-2.4.46-19.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873997" comment="openldap-devel-2.4.46-19.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873998" comment="openldap-servers-2.4.46-19.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3017" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4265.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4265.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873999" comment="cups-2.2.6-60.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874000" comment="cups-client-2.2.6-60.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874001" comment="cups-devel-2.2.6-60.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874002" comment="cups-filesystem-2.2.6-60.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874003" comment="cups-ipptool-2.2.6-60.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874004" comment="cups-libs-2.2.6-60.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874005" comment="cups-lpd-2.2.6-60.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3018" version="1" class="patch">
	<metadata>
		<title>security update for fontforge (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-25081" ref_url="https://www.suse.com/security/cve/CVE-2024-25081/" source="CVE"/>
		<reference ref_id="CVE-2024-25082" ref_url="https://www.suse.com/security/cve/CVE-2024-25082/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4267.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4267.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25081/">CVE-2024-25081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25081">CVE-2024-25081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25082/">CVE-2024-25082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25082">CVE-2024-25082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943403" comment="fontforge-20200314-6.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3019" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-3652" ref_url="https://www.suse.com/security/cve/CVE-2024-3652/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4376.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4376.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3652/">CVE-2024-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3652">CVE-2024-3652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874006" comment="libreswan-4.12-2.el8_10.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3020" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-38095" ref_url="https://www.suse.com/security/cve/CVE-2024-38095/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4438.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4438.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38095/">CVE-2024-38095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38095">CVE-2024-38095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009875430" comment="aspnetcore-runtime-6.0-6.0.32-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875431" comment="aspnetcore-targeting-pack-6.0-6.0.32-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875432" comment="dotnet-apphost-pack-6.0-6.0.32-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875433" comment="dotnet-hostfxr-6.0-6.0.32-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875434" comment="dotnet-runtime-6.0-6.0.32-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875435" comment="dotnet-sdk-6.0-6.0.132-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876075" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875436" comment="dotnet-targeting-pack-6.0-6.0.32-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875437" comment="dotnet-templates-6.0-6.0.132-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3021" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-30105" ref_url="https://www.suse.com/security/cve/CVE-2024-30105/" source="CVE"/>
		<reference ref_id="CVE-2024-35264" ref_url="https://www.suse.com/security/cve/CVE-2024-35264/" source="CVE"/>
		<reference ref_id="CVE-2024-38095" ref_url="https://www.suse.com/security/cve/CVE-2024-38095/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4451.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4451.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30105/">CVE-2024-30105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30105">CVE-2024-30105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35264/">CVE-2024-35264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35264">CVE-2024-35264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38095/">CVE-2024-38095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38095">CVE-2024-38095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873712" comment="aspnetcore-runtime-8.0-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873713" comment="aspnetcore-runtime-dbg-8.0-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873714" comment="aspnetcore-targeting-pack-8.0-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873715" comment="dotnet-8.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873716" comment="dotnet-apphost-pack-8.0-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873717" comment="dotnet-host-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873718" comment="dotnet-hostfxr-8.0-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873719" comment="dotnet-runtime-8.0-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873720" comment="dotnet-runtime-dbg-8.0-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873721" comment="dotnet-sdk-8.0-8.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873722" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873723" comment="dotnet-sdk-dbg-8.0-8.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873724" comment="dotnet-targeting-pack-8.0-8.0.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873725" comment="dotnet-templates-8.0-8.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873726" comment="netstandard-targeting-pack-2.1-8.0.107-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3022" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-36617" ref_url="https://www.suse.com/security/cve/CVE-2023-36617/" source="CVE"/>
		<reference ref_id="CVE-2024-27280" ref_url="https://www.suse.com/security/cve/CVE-2024-27280/" source="CVE"/>
		<reference ref_id="CVE-2024-27281" ref_url="https://www.suse.com/security/cve/CVE-2024-27281/" source="CVE"/>
		<reference ref_id="CVE-2024-27282" ref_url="https://www.suse.com/security/cve/CVE-2024-27282/" source="CVE"/>
		<reference ref_id="CVE-2024-35176" ref_url="https://www.suse.com/security/cve/CVE-2024-35176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4499.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4499.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36617/">CVE-2023-36617 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36617">CVE-2023-36617 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27280/">CVE-2024-27280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27280">CVE-2024-27280 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27281/">CVE-2024-27281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27281">CVE-2024-27281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27282/">CVE-2024-27282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27282">CVE-2024-27282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35176/">CVE-2024-35176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35176">CVE-2024-35176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873727" comment="ruby-2.5.9-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873728" comment="ruby-devel-2.5.9-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873729" comment="ruby-doc-2.5.9-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873730" comment="ruby-irb-2.5.9-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873731" comment="ruby-libs-2.5.9-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873732" comment="rubygem-abrt-0.3.0-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873733" comment="rubygem-abrt-doc-0.3.0-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873734" comment="rubygem-bigdecimal-1.3.4-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843367" comment="rubygem-bson-4.3.0-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843368" comment="rubygem-bson-doc-4.3.0-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873735" comment="rubygem-bundler-1.16.1-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873736" comment="rubygem-bundler-doc-1.16.1-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873737" comment="rubygem-did_you_mean-1.2.0-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873738" comment="rubygem-io-console-0.4.6-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873739" comment="rubygem-json-2.1.0-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873740" comment="rubygem-minitest-5.10.3-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843375" comment="rubygem-mongo-2.5.1-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843376" comment="rubygem-mongo-doc-2.5.1-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843377" comment="rubygem-mysql2-0.4.10-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843378" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873741" comment="rubygem-net-telnet-0.1.1-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873742" comment="rubygem-openssl-2.1.2-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843381" comment="rubygem-pg-1.0.0-3.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843382" comment="rubygem-pg-doc-1.0.0-3.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873743" comment="rubygem-power_assert-1.1.1-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873744" comment="rubygem-psych-3.0.2-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873745" comment="rubygem-rake-12.3.3-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873746" comment="rubygem-rdoc-6.0.1.1-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873747" comment="rubygem-test-unit-3.2.7-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873748" comment="rubygem-xmlrpc-0.3.0-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873749" comment="rubygems-2.7.6.3-112.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873750" comment="rubygems-devel-2.7.6.3-112.module+el8.10.0+22021+135c76a8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3023" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4517.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4517.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877200" comment="firefox-115.13.0-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3024" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4563.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4563.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876076" comment="java-1.8.0-openjdk-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876077" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876078" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.422.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876079" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876080" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876081" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876082" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876083" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876084" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876085" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876086" comment="java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876087" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876088" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876089" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876090" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876091" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876092" comment="java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876093" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876094" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876095" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3025" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4567.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4567.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876330" comment="java-11-openjdk-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876331" comment="java-11-openjdk-demo-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876332" comment="java-11-openjdk-demo-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876333" comment="java-11-openjdk-demo-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876334" comment="java-11-openjdk-devel-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876335" comment="java-11-openjdk-devel-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876336" comment="java-11-openjdk-devel-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876337" comment="java-11-openjdk-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876338" comment="java-11-openjdk-headless-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876339" comment="java-11-openjdk-headless-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876340" comment="java-11-openjdk-headless-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876341" comment="java-11-openjdk-javadoc-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876342" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876343" comment="java-11-openjdk-jmods-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876344" comment="java-11-openjdk-jmods-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876345" comment="java-11-openjdk-jmods-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876346" comment="java-11-openjdk-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876347" comment="java-11-openjdk-src-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876348" comment="java-11-openjdk-src-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876349" comment="java-11-openjdk-src-slowdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876350" comment="java-11-openjdk-static-libs-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876351" comment="java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876352" comment="java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3026" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4568.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4568.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876096" comment="java-17-openjdk-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876097" comment="java-17-openjdk-demo-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876098" comment="java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876099" comment="java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876100" comment="java-17-openjdk-devel-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876101" comment="java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876102" comment="java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876103" comment="java-17-openjdk-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876104" comment="java-17-openjdk-headless-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876105" comment="java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876106" comment="java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876107" comment="java-17-openjdk-javadoc-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876108" comment="java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876109" comment="java-17-openjdk-jmods-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876110" comment="java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876111" comment="java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876112" comment="java-17-openjdk-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876113" comment="java-17-openjdk-src-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876114" comment="java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876115" comment="java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876116" comment="java-17-openjdk-static-libs-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876117" comment="java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876118" comment="java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3027" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4573.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4573.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874669" comment="java-21-openjdk-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874670" comment="java-21-openjdk-demo-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874671" comment="java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874672" comment="java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874673" comment="java-21-openjdk-devel-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874674" comment="java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874675" comment="java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874676" comment="java-21-openjdk-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874677" comment="java-21-openjdk-headless-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874678" comment="java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874679" comment="java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874680" comment="java-21-openjdk-javadoc-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874681" comment="java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874682" comment="java-21-openjdk-jmods-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874683" comment="java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874684" comment="java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874685" comment="java-21-openjdk-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874686" comment="java-21-openjdk-src-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874687" comment="java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874688" comment="java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874689" comment="java-21-openjdk-static-libs-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874690" comment="java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874691" comment="java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3028" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4617.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4617.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874692" comment="qt5-qtbase-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874693" comment="qt5-qtbase-common-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874694" comment="qt5-qtbase-devel-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874695" comment="qt5-qtbase-examples-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874696" comment="qt5-qtbase-gui-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874697" comment="qt5-qtbase-mysql-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874698" comment="qt5-qtbase-odbc-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874699" comment="qt5-qtbase-postgresql-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874700" comment="qt5-qtbase-private-devel-5.15.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874701" comment="qt5-qtbase-static-5.15.3-8.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3029" version="1" class="patch">
	<metadata>
		<title>security update for libndp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4620.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4620.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874702" comment="libndp-1.7-7.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3030" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4635.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4635.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877068" comment="thunderbird-115.13.0-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3031" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-38473" ref_url="https://www.suse.com/security/cve/CVE-2024-38473/" source="CVE"/>
		<reference ref_id="CVE-2024-38474" ref_url="https://www.suse.com/security/cve/CVE-2024-38474/" source="CVE"/>
		<reference ref_id="CVE-2024-38475" ref_url="https://www.suse.com/security/cve/CVE-2024-38475/" source="CVE"/>
		<reference ref_id="CVE-2024-38477" ref_url="https://www.suse.com/security/cve/CVE-2024-38477/" source="CVE"/>
		<reference ref_id="CVE-2024-39573" ref_url="https://www.suse.com/security/cve/CVE-2024-39573/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4720.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4720.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38473/">CVE-2024-38473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38473">CVE-2024-38473 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38474/">CVE-2024-38474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38474">CVE-2024-38474 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38475/">CVE-2024-38475 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38475">CVE-2024-38475 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38477/">CVE-2024-38477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38477">CVE-2024-38477 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39573/">CVE-2024-39573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39573">CVE-2024-39573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876177" comment="httpd-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876178" comment="httpd-devel-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876179" comment="httpd-filesystem-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876180" comment="httpd-manual-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876181" comment="httpd-tools-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866046" comment="mod_http2-1.15.7-10.module+el8.10.0+21653+eaff63f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876182" comment="mod_ldap-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854384" comment="mod_md-2.0.8-8.module+el8.9.0+19080+567b90f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876183" comment="mod_proxy_html-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876184" comment="mod_session-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876185" comment="mod_ssl-2.4.37-65.module+el8.10.0+22069+b47f5c72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3032" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4936.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4936.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877785" comment="freeradius-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877786" comment="freeradius-devel-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877787" comment="freeradius-doc-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877788" comment="freeradius-krb5-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877789" comment="freeradius-ldap-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877790" comment="freeradius-mysql-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877791" comment="freeradius-perl-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877792" comment="freeradius-postgresql-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877793" comment="freeradius-rest-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877794" comment="freeradius-sqlite-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877795" comment="freeradius-unixODBC-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877796" comment="freeradius-utils-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877797" comment="python3-freeradius-3.0.20-15.module+el8.10.0+22065+aa3d48ca is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3033" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-15209" ref_url="https://www.suse.com/security/cve/CVE-2018-15209/" source="CVE"/>
		<reference ref_id="CVE-2023-25433" ref_url="https://www.suse.com/security/cve/CVE-2023-25433/" source="CVE"/>
		<reference ref_id="CVE-2023-52356" ref_url="https://www.suse.com/security/cve/CVE-2023-52356/" source="CVE"/>
		<reference ref_id="CVE-2023-6228" ref_url="https://www.suse.com/security/cve/CVE-2023-6228/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15209/">CVE-2018-15209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15209">CVE-2018-15209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25433/">CVE-2023-25433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25433">CVE-2023-25433 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52356/">CVE-2023-52356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52356">CVE-2023-52356 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6228/">CVE-2023-6228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6228">CVE-2023-6228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879078" comment="libtiff-4.0.9-32.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879079" comment="libtiff-devel-4.0.9-32.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879080" comment="libtiff-tools-4.0.9-32.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3034" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-46939" ref_url="https://www.suse.com/security/cve/CVE-2021-46939/" source="CVE"/>
		<reference ref_id="CVE-2021-47018" ref_url="https://www.suse.com/security/cve/CVE-2021-47018/" source="CVE"/>
		<reference ref_id="CVE-2021-47257" ref_url="https://www.suse.com/security/cve/CVE-2021-47257/" source="CVE"/>
		<reference ref_id="CVE-2021-47284" ref_url="https://www.suse.com/security/cve/CVE-2021-47284/" source="CVE"/>
		<reference ref_id="CVE-2021-47304" ref_url="https://www.suse.com/security/cve/CVE-2021-47304/" source="CVE"/>
		<reference ref_id="CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373/" source="CVE"/>
		<reference ref_id="CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408/" source="CVE"/>
		<reference ref_id="CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461/" source="CVE"/>
		<reference ref_id="CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468/" source="CVE"/>
		<reference ref_id="CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491/" source="CVE"/>
		<reference ref_id="CVE-2021-47548" ref_url="https://www.suse.com/security/cve/CVE-2021-47548/" source="CVE"/>
		<reference ref_id="CVE-2021-47579" ref_url="https://www.suse.com/security/cve/CVE-2021-47579/" source="CVE"/>
		<reference ref_id="CVE-2021-47624" ref_url="https://www.suse.com/security/cve/CVE-2021-47624/" source="CVE"/>
		<reference ref_id="CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632/" source="CVE"/>
		<reference ref_id="CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743/" source="CVE"/>
		<reference ref_id="CVE-2022-48747" ref_url="https://www.suse.com/security/cve/CVE-2022-48747/" source="CVE"/>
		<reference ref_id="CVE-2022-48757" ref_url="https://www.suse.com/security/cve/CVE-2022-48757/" source="CVE"/>
		<reference ref_id="CVE-2022-50372" ref_url="https://www.suse.com/security/cve/CVE-2022-50372/" source="CVE"/>
		<reference ref_id="CVE-2022-50495" ref_url="https://www.suse.com/security/cve/CVE-2022-50495/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52471" ref_url="https://www.suse.com/security/cve/CVE-2023-52471/" source="CVE"/>
		<reference ref_id="CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486/" source="CVE"/>
		<reference ref_id="CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530/" source="CVE"/>
		<reference ref_id="CVE-2023-52619" ref_url="https://www.suse.com/security/cve/CVE-2023-52619/" source="CVE"/>
		<reference ref_id="CVE-2023-52622" ref_url="https://www.suse.com/security/cve/CVE-2023-52622/" source="CVE"/>
		<reference ref_id="CVE-2023-52623" ref_url="https://www.suse.com/security/cve/CVE-2023-52623/" source="CVE"/>
		<reference ref_id="CVE-2023-52648" ref_url="https://www.suse.com/security/cve/CVE-2023-52648/" source="CVE"/>
		<reference ref_id="CVE-2023-52653" ref_url="https://www.suse.com/security/cve/CVE-2023-52653/" source="CVE"/>
		<reference ref_id="CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658/" source="CVE"/>
		<reference ref_id="CVE-2023-52662" ref_url="https://www.suse.com/security/cve/CVE-2023-52662/" source="CVE"/>
		<reference ref_id="CVE-2023-52679" ref_url="https://www.suse.com/security/cve/CVE-2023-52679/" source="CVE"/>
		<reference ref_id="CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707/" source="CVE"/>
		<reference ref_id="CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730/" source="CVE"/>
		<reference ref_id="CVE-2023-52756" ref_url="https://www.suse.com/security/cve/CVE-2023-52756/" source="CVE"/>
		<reference ref_id="CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762/" source="CVE"/>
		<reference ref_id="CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764/" source="CVE"/>
		<reference ref_id="CVE-2023-52775" ref_url="https://www.suse.com/security/cve/CVE-2023-52775/" source="CVE"/>
		<reference ref_id="CVE-2023-52777" ref_url="https://www.suse.com/security/cve/CVE-2023-52777/" source="CVE"/>
		<reference ref_id="CVE-2023-52784" ref_url="https://www.suse.com/security/cve/CVE-2023-52784/" source="CVE"/>
		<reference ref_id="CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791/" source="CVE"/>
		<reference ref_id="CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796/" source="CVE"/>
		<reference ref_id="CVE-2023-52803" ref_url="https://www.suse.com/security/cve/CVE-2023-52803/" source="CVE"/>
		<reference ref_id="CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834/" source="CVE"/>
		<reference ref_id="CVE-2023-52845" ref_url="https://www.suse.com/security/cve/CVE-2023-52845/" source="CVE"/>
		<reference ref_id="CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2023-53597" ref_url="https://www.suse.com/security/cve/CVE-2023-53597/" source="CVE"/>
		<reference ref_id="CVE-2023-54114" ref_url="https://www.suse.com/security/cve/CVE-2023-54114/" source="CVE"/>
		<reference ref_id="CVE-2024-21823" ref_url="https://www.suse.com/security/cve/CVE-2024-21823/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-25739" ref_url="https://www.suse.com/security/cve/CVE-2024-25739/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614/" source="CVE"/>
		<reference ref_id="CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640/" source="CVE"/>
		<reference ref_id="CVE-2024-26660" ref_url="https://www.suse.com/security/cve/CVE-2024-26660/" source="CVE"/>
		<reference ref_id="CVE-2024-26669" ref_url="https://www.suse.com/security/cve/CVE-2024-26669/" source="CVE"/>
		<reference ref_id="CVE-2024-26686" ref_url="https://www.suse.com/security/cve/CVE-2024-26686/" source="CVE"/>
		<reference ref_id="CVE-2024-26698" ref_url="https://www.suse.com/security/cve/CVE-2024-26698/" source="CVE"/>
		<reference ref_id="CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26740" ref_url="https://www.suse.com/security/cve/CVE-2024-26740/" source="CVE"/>
		<reference ref_id="CVE-2024-26772" ref_url="https://www.suse.com/security/cve/CVE-2024-26772/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26802" ref_url="https://www.suse.com/security/cve/CVE-2024-26802/" source="CVE"/>
		<reference ref_id="CVE-2024-26810" ref_url="https://www.suse.com/security/cve/CVE-2024-26810/" source="CVE"/>
		<reference ref_id="CVE-2024-26837" ref_url="https://www.suse.com/security/cve/CVE-2024-26837/" source="CVE"/>
		<reference ref_id="CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840/" source="CVE"/>
		<reference ref_id="CVE-2024-26843" ref_url="https://www.suse.com/security/cve/CVE-2024-26843/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853/" source="CVE"/>
		<reference ref_id="CVE-2024-26870" ref_url="https://www.suse.com/security/cve/CVE-2024-26870/" source="CVE"/>
		<reference ref_id="CVE-2024-26878" ref_url="https://www.suse.com/security/cve/CVE-2024-26878/" source="CVE"/>
		<reference ref_id="CVE-2024-26908" ref_url="https://www.suse.com/security/cve/CVE-2024-26908/" source="CVE"/>
		<reference ref_id="CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931/" source="CVE"/>
		<reference ref_id="CVE-2024-26940" ref_url="https://www.suse.com/security/cve/CVE-2024-26940/" source="CVE"/>
		<reference ref_id="CVE-2024-26958" ref_url="https://www.suse.com/security/cve/CVE-2024-26958/" source="CVE"/>
		<reference ref_id="CVE-2024-26960" ref_url="https://www.suse.com/security/cve/CVE-2024-26960/" source="CVE"/>
		<reference ref_id="CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961/" source="CVE"/>
		<reference ref_id="CVE-2024-27010" ref_url="https://www.suse.com/security/cve/CVE-2024-27010/" source="CVE"/>
		<reference ref_id="CVE-2024-27011" ref_url="https://www.suse.com/security/cve/CVE-2024-27011/" source="CVE"/>
		<reference ref_id="CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019/" source="CVE"/>
		<reference ref_id="CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020/" source="CVE"/>
		<reference ref_id="CVE-2024-27025" ref_url="https://www.suse.com/security/cve/CVE-2024-27025/" source="CVE"/>
		<reference ref_id="CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065/" source="CVE"/>
		<reference ref_id="CVE-2024-27388" ref_url="https://www.suse.com/security/cve/CVE-2024-27388/" source="CVE"/>
		<reference ref_id="CVE-2024-27395" ref_url="https://www.suse.com/security/cve/CVE-2024-27395/" source="CVE"/>
		<reference ref_id="CVE-2024-27434" ref_url="https://www.suse.com/security/cve/CVE-2024-27434/" source="CVE"/>
		<reference ref_id="CVE-2024-31076" ref_url="https://www.suse.com/security/cve/CVE-2024-31076/" source="CVE"/>
		<reference ref_id="CVE-2024-33621" ref_url="https://www.suse.com/security/cve/CVE-2024-33621/" source="CVE"/>
		<reference ref_id="CVE-2024-35790" ref_url="https://www.suse.com/security/cve/CVE-2024-35790/" source="CVE"/>
		<reference ref_id="CVE-2024-35801" ref_url="https://www.suse.com/security/cve/CVE-2024-35801/" source="CVE"/>
		<reference ref_id="CVE-2024-35807" ref_url="https://www.suse.com/security/cve/CVE-2024-35807/" source="CVE"/>
		<reference ref_id="CVE-2024-35810" ref_url="https://www.suse.com/security/cve/CVE-2024-35810/" source="CVE"/>
		<reference ref_id="CVE-2024-35814" ref_url="https://www.suse.com/security/cve/CVE-2024-35814/" source="CVE"/>
		<reference ref_id="CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823/" source="CVE"/>
		<reference ref_id="CVE-2024-35824" ref_url="https://www.suse.com/security/cve/CVE-2024-35824/" source="CVE"/>
		<reference ref_id="CVE-2024-35847" ref_url="https://www.suse.com/security/cve/CVE-2024-35847/" source="CVE"/>
		<reference ref_id="CVE-2024-35876" ref_url="https://www.suse.com/security/cve/CVE-2024-35876/" source="CVE"/>
		<reference ref_id="CVE-2024-35893" ref_url="https://www.suse.com/security/cve/CVE-2024-35893/" source="CVE"/>
		<reference ref_id="CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896/" source="CVE"/>
		<reference ref_id="CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897/" source="CVE"/>
		<reference ref_id="CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899/" source="CVE"/>
		<reference ref_id="CVE-2024-35900" ref_url="https://www.suse.com/security/cve/CVE-2024-35900/" source="CVE"/>
		<reference ref_id="CVE-2024-35910" ref_url="https://www.suse.com/security/cve/CVE-2024-35910/" source="CVE"/>
		<reference ref_id="CVE-2024-35912" ref_url="https://www.suse.com/security/cve/CVE-2024-35912/" source="CVE"/>
		<reference ref_id="CVE-2024-35924" ref_url="https://www.suse.com/security/cve/CVE-2024-35924/" source="CVE"/>
		<reference ref_id="CVE-2024-35925" ref_url="https://www.suse.com/security/cve/CVE-2024-35925/" source="CVE"/>
		<reference ref_id="CVE-2024-35930" ref_url="https://www.suse.com/security/cve/CVE-2024-35930/" source="CVE"/>
		<reference ref_id="CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937/" source="CVE"/>
		<reference ref_id="CVE-2024-35938" ref_url="https://www.suse.com/security/cve/CVE-2024-35938/" source="CVE"/>
		<reference ref_id="CVE-2024-35946" ref_url="https://www.suse.com/security/cve/CVE-2024-35946/" source="CVE"/>
		<reference ref_id="CVE-2024-35947" ref_url="https://www.suse.com/security/cve/CVE-2024-35947/" source="CVE"/>
		<reference ref_id="CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952/" source="CVE"/>
		<reference ref_id="CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962/" source="CVE"/>
		<reference ref_id="CVE-2024-36000" ref_url="https://www.suse.com/security/cve/CVE-2024-36000/" source="CVE"/>
		<reference ref_id="CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005/" source="CVE"/>
		<reference ref_id="CVE-2024-36006" ref_url="https://www.suse.com/security/cve/CVE-2024-36006/" source="CVE"/>
		<reference ref_id="CVE-2024-36010" ref_url="https://www.suse.com/security/cve/CVE-2024-36010/" source="CVE"/>
		<reference ref_id="CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016/" source="CVE"/>
		<reference ref_id="CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017/" source="CVE"/>
		<reference ref_id="CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020/" source="CVE"/>
		<reference ref_id="CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025/" source="CVE"/>
		<reference ref_id="CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270/" source="CVE"/>
		<reference ref_id="CVE-2024-36286" ref_url="https://www.suse.com/security/cve/CVE-2024-36286/" source="CVE"/>
		<reference ref_id="CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489/" source="CVE"/>
		<reference ref_id="CVE-2024-36886" ref_url="https://www.suse.com/security/cve/CVE-2024-36886/" source="CVE"/>
		<reference ref_id="CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889/" source="CVE"/>
		<reference ref_id="CVE-2024-36896" ref_url="https://www.suse.com/security/cve/CVE-2024-36896/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36905" ref_url="https://www.suse.com/security/cve/CVE-2024-36905/" source="CVE"/>
		<reference ref_id="CVE-2024-36917" ref_url="https://www.suse.com/security/cve/CVE-2024-36917/" source="CVE"/>
		<reference ref_id="CVE-2024-36921" ref_url="https://www.suse.com/security/cve/CVE-2024-36921/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36927" ref_url="https://www.suse.com/security/cve/CVE-2024-36927/" source="CVE"/>
		<reference ref_id="CVE-2024-36928" ref_url="https://www.suse.com/security/cve/CVE-2024-36928/" source="CVE"/>
		<reference ref_id="CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929/" source="CVE"/>
		<reference ref_id="CVE-2024-36933" ref_url="https://www.suse.com/security/cve/CVE-2024-36933/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36945" ref_url="https://www.suse.com/security/cve/CVE-2024-36945/" source="CVE"/>
		<reference ref_id="CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-36954" ref_url="https://www.suse.com/security/cve/CVE-2024-36954/" source="CVE"/>
		<reference ref_id="CVE-2024-36960" ref_url="https://www.suse.com/security/cve/CVE-2024-36960/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-36979" ref_url="https://www.suse.com/security/cve/CVE-2024-36979/" source="CVE"/>
		<reference ref_id="CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573/" source="CVE"/>
		<reference ref_id="CVE-2024-38575" ref_url="https://www.suse.com/security/cve/CVE-2024-38575/" source="CVE"/>
		<reference ref_id="CVE-2024-38596" ref_url="https://www.suse.com/security/cve/CVE-2024-38596/" source="CVE"/>
		<reference ref_id="CVE-2024-38598" ref_url="https://www.suse.com/security/cve/CVE-2024-38598/" source="CVE"/>
		<reference ref_id="CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615/" source="CVE"/>
		<reference ref_id="CVE-2024-38627" ref_url="https://www.suse.com/security/cve/CVE-2024-38627/" source="CVE"/>
		<reference ref_id="CVE-2024-39276" ref_url="https://www.suse.com/security/cve/CVE-2024-39276/" source="CVE"/>
		<reference ref_id="CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472/" source="CVE"/>
		<reference ref_id="CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476/" source="CVE"/>
		<reference ref_id="CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487/" source="CVE"/>
		<reference ref_id="CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502/" source="CVE"/>
		<reference ref_id="CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927/" source="CVE"/>
		<reference ref_id="CVE-2024-40974" ref_url="https://www.suse.com/security/cve/CVE-2024-40974/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5101.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5101.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46939/">CVE-2021-46939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46939">CVE-2021-46939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-47018/">CVE-2021-47018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47018">CVE-2021-47018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47257/">CVE-2021-47257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47257">CVE-2021-47257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47284/">CVE-2021-47284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47284">CVE-2021-47284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47304/">CVE-2021-47304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47304">CVE-2021-47304 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47548/">CVE-2021-47548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47548">CVE-2021-47548 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47579/">CVE-2021-47579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47579">CVE-2021-47579 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47624/">CVE-2021-47624 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47624">CVE-2021-47624 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48747/">CVE-2022-48747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48747">CVE-2022-48747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48757/">CVE-2022-48757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48757">CVE-2022-48757 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50372/">CVE-2022-50372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50372">CVE-2022-50372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50495/">CVE-2022-50495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50495">CVE-2022-50495 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52471/">CVE-2023-52471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52471">CVE-2023-52471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52619/">CVE-2023-52619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52622/">CVE-2023-52622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52623/">CVE-2023-52623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52648/">CVE-2023-52648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52648">CVE-2023-52648 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52653/">CVE-2023-52653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52653">CVE-2023-52653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52662/">CVE-2023-52662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52662">CVE-2023-52662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52679/">CVE-2023-52679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52679">CVE-2023-52679 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52756/">CVE-2023-52756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52756">CVE-2023-52756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52775/">CVE-2023-52775 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52775">CVE-2023-52775 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52777/">CVE-2023-52777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52777">CVE-2023-52777 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52784/">CVE-2023-52784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52784">CVE-2023-52784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52803/">CVE-2023-52803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52803">CVE-2023-52803 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52845/">CVE-2023-52845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52845">CVE-2023-52845 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53597/">CVE-2023-53597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53597">CVE-2023-53597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54114/">CVE-2023-54114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54114">CVE-2023-54114 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-21823/">CVE-2024-21823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21823">CVE-2024-21823 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25739/">CVE-2024-25739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25739">CVE-2024-25739 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26660/">CVE-2024-26660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26669/">CVE-2024-26669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26686/">CVE-2024-26686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26686">CVE-2024-26686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26698/">CVE-2024-26698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26740/">CVE-2024-26740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26740">CVE-2024-26740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26772/">CVE-2024-26772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26802/">CVE-2024-26802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26810/">CVE-2024-26810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26810">CVE-2024-26810 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26837/">CVE-2024-26837 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26837">CVE-2024-26837 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26843/">CVE-2024-26843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26843">CVE-2024-26843 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26870/">CVE-2024-26870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26870">CVE-2024-26870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26878/">CVE-2024-26878 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26878">CVE-2024-26878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26908/">CVE-2024-26908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26908">CVE-2024-26908 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26940/">CVE-2024-26940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26958/">CVE-2024-26958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26960/">CVE-2024-26960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27010/">CVE-2024-27010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27010">CVE-2024-27010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27011/">CVE-2024-27011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27011">CVE-2024-27011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27025/">CVE-2024-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27025">CVE-2024-27025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27388/">CVE-2024-27388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27388">CVE-2024-27388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27395/">CVE-2024-27395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27434/">CVE-2024-27434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27434">CVE-2024-27434 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31076/">CVE-2024-31076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33621/">CVE-2024-33621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-33621">CVE-2024-33621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35790/">CVE-2024-35790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35801/">CVE-2024-35801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35807/">CVE-2024-35807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35810/">CVE-2024-35810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35810">CVE-2024-35810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35814/">CVE-2024-35814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35824/">CVE-2024-35824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35824">CVE-2024-35824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35847/">CVE-2024-35847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35876/">CVE-2024-35876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35876">CVE-2024-35876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35893/">CVE-2024-35893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35900/">CVE-2024-35900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35910/">CVE-2024-35910 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35910">CVE-2024-35910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35912/">CVE-2024-35912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35924/">CVE-2024-35924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35925/">CVE-2024-35925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35930/">CVE-2024-35930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35938/">CVE-2024-35938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35946/">CVE-2024-35946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35946">CVE-2024-35946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35947/">CVE-2024-35947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36000/">CVE-2024-36000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36006/">CVE-2024-36006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36010/">CVE-2024-36010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36010">CVE-2024-36010 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36286/">CVE-2024-36286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36886/">CVE-2024-36886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36896/">CVE-2024-36896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36905/">CVE-2024-36905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36905">CVE-2024-36905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36917/">CVE-2024-36917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36921/">CVE-2024-36921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36927/">CVE-2024-36927 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36927">CVE-2024-36927 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36928/">CVE-2024-36928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36933/">CVE-2024-36933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36945/">CVE-2024-36945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36954/">CVE-2024-36954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36954">CVE-2024-36954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36960/">CVE-2024-36960 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36979/">CVE-2024-36979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36979">CVE-2024-36979 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38575/">CVE-2024-38575 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38575">CVE-2024-38575 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38596/">CVE-2024-38596 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38598/">CVE-2024-38598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38627/">CVE-2024-38627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39276/">CVE-2024-39276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40974/">CVE-2024-40974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40974">CVE-2024-40974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879081" comment="bpftool-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879082" comment="kernel-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879083" comment="kernel-abi-stablelists-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879084" comment="kernel-core-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879085" comment="kernel-cross-headers-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879086" comment="kernel-debug-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879087" comment="kernel-debug-core-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879089" comment="kernel-debug-modules-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879090" comment="kernel-debug-modules-extra-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879092" comment="kernel-doc-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879093" comment="kernel-headers-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879094" comment="kernel-modules-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879095" comment="kernel-modules-extra-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879096" comment="kernel-tools-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879097" comment="kernel-tools-libs-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879099" comment="perf-4.18.0-553.16.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879100" comment="python3-perf-4.18.0-553.16.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3035" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-38476" ref_url="https://www.suse.com/security/cve/CVE-2024-38476/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-38476/">CVE-2024-38476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38476">CVE-2024-38476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879101" comment="httpd-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879102" comment="httpd-devel-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879103" comment="httpd-filesystem-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879104" comment="httpd-manual-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879105" comment="httpd-tools-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009866046" comment="mod_http2-1.15.7-10.module+el8.10.0+21653+eaff63f0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879106" comment="mod_ldap-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854384" comment="mod_md-2.0.8-8.module+el8.9.0+19080+567b90f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879107" comment="mod_proxy_html-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879108" comment="mod_session-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879109" comment="mod_ssl-2.4.37-65.module+el8.10.0+22196+d82931da.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3036" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2024-37298" ref_url="https://www.suse.com/security/cve/CVE-2024-37298/" source="CVE"/>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5258.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5258.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37298/">CVE-2024-37298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37298">CVE-2024-37298 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879589" comment="aardvark-dns-1.10.0-1.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879590" comment="buildah-1.33.8-4.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879591" comment="buildah-tests-1.33.8-4.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879592" comment="cockpit-podman-84.1-1.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879593" comment="conmon-2.1.10-1.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879594" comment="container-selinux-2.229.0-2.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879595" comment="containernetworking-plugins-1.4.0-5.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879596" comment="containers-common-1-82.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879597" comment="crit-3.18-5.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879598" comment="criu-3.18-5.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879599" comment="criu-devel-3.18-5.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879600" comment="criu-libs-3.18-5.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879601" comment="crun-1.14.3-2.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879602" comment="fuse-overlayfs-1.13-1.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879603" comment="libslirp-4.4.0-2.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879604" comment="libslirp-devel-4.4.0-2.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879605" comment="netavark-1.10.3-1.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879606" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879607" comment="podman-4.9.4-12.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879608" comment="podman-catatonit-4.9.4-12.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879609" comment="podman-docker-4.9.4-12.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879610" comment="podman-gvproxy-4.9.4-12.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879611" comment="podman-plugins-4.9.4-12.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879612" comment="podman-remote-4.9.4-12.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879613" comment="podman-tests-4.9.4-12.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879614" comment="python3-criu-3.18-5.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879615" comment="python3-podman-4.9.0-2.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879616" comment="runc-1.1.12-4.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879617" comment="skopeo-1.14.5-3.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879618" comment="skopeo-tests-1.14.5-3.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879619" comment="slirp4netns-1.2.3-1.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879620" comment="toolbox-0.0.99.5-2.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879621" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+22202+761b9a65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879622" comment="udica-0.2.6-21.module+el8.10.0+22202+761b9a65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3037" version="1" class="patch">
	<metadata>
		<title>security update for cjose (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24814" ref_url="https://www.suse.com/security/cve/CVE-2024-24814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5289.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5289.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24814/">CVE-2024-24814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24814">CVE-2024-24814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881234" comment="cjose-0.6.1-4.module+el8.10.0+21813+b5444eb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881235" comment="cjose-devel-0.6.1-4.module+el8.10.0+21813+b5444eb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881236" comment="mod_auth_openidc-2.4.9.4-6.module+el8.10.0+21813+b5444eb8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3038" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5291.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5291.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881327" comment="grafana-9.2.10-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881328" comment="grafana-selinux-9.2.10-17.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3039" version="1" class="patch">
	<metadata>
		<title>security update for jose (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-50967" ref_url="https://www.suse.com/security/cve/CVE-2023-50967/" source="CVE"/>
		<reference ref_id="CVE-2024-28176" ref_url="https://www.suse.com/security/cve/CVE-2024-28176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5294.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5294.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50967/">CVE-2023-50967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50967">CVE-2023-50967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28176/">CVE-2024-28176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28176">CVE-2024-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881329" comment="jose-10-2.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881330" comment="libjose-10-2.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881331" comment="libjose-devel-10-2.el8_10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3040" version="1" class="patch">
	<metadata>
		<title>security update for edk2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45236" ref_url="https://www.suse.com/security/cve/CVE-2023-45236/" source="CVE"/>
		<reference ref_id="CVE-2023-45237" ref_url="https://www.suse.com/security/cve/CVE-2023-45237/" source="CVE"/>
		<reference ref_id="CVE-2024-1298" ref_url="https://www.suse.com/security/cve/CVE-2024-1298/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5297.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5297.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45236/">CVE-2023-45236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45236">CVE-2023-45236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45237/">CVE-2023-45237 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45237">CVE-2023-45237 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1298/">CVE-2024-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1298">CVE-2024-1298 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881237" comment="edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3041" version="1" class="patch">
	<metadata>
		<title>security update for gnome-shell (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-36472" ref_url="https://www.suse.com/security/cve/CVE-2024-36472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5298.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5298.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36472/">CVE-2024-36472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36472">CVE-2024-36472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881332" comment="gnome-shell-3.32.2-56.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3042" version="1" class="patch">
	<metadata>
		<title>security update for wget (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-38428" ref_url="https://www.suse.com/security/cve/CVE-2024-38428/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5299.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5299.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38428/">CVE-2024-38428 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38428">CVE-2024-38428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881333" comment="wget-1.19.5-12.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3043" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6239" ref_url="https://www.suse.com/security/cve/CVE-2024-6239/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5305.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5305.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6239/">CVE-2024-6239 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6239">CVE-2024-6239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881334" comment="poppler-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881335" comment="poppler-cpp-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881336" comment="poppler-cpp-devel-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881337" comment="poppler-devel-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881338" comment="poppler-glib-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881339" comment="poppler-glib-devel-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881340" comment="poppler-glib-doc-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881341" comment="poppler-qt5-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881342" comment="poppler-qt5-devel-20.11.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881343" comment="poppler-utils-20.11.0-12.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3044" version="1" class="patch">
	<metadata>
		<title>security update for orc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5306.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5306.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881344" comment="orc-0.4.28-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881345" comment="orc-compiler-0.4.28-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881346" comment="orc-devel-0.4.28-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3045" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5309.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5309.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881347" comment="python3-urllib3-1.24.2-8.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3046" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5312.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5312.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881348" comment="krb5-devel-1.18.2-29.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881349" comment="krb5-libs-1.18.2-29.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881350" comment="krb5-pkinit-1.18.2-29.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881351" comment="krb5-server-1.18.2-29.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881352" comment="krb5-server-ldap-1.18.2-29.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881353" comment="krb5-workstation-1.18.2-29.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881354" comment="libkadm5-1.18.2-29.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3047" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-38167" ref_url="https://www.suse.com/security/cve/CVE-2024-38167/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38167/">CVE-2024-38167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38167">CVE-2024-38167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881355" comment="aspnetcore-runtime-8.0-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881356" comment="aspnetcore-runtime-dbg-8.0-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881357" comment="aspnetcore-targeting-pack-8.0-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881358" comment="dotnet-8.0.108-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881359" comment="dotnet-apphost-pack-8.0-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881360" comment="dotnet-host-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881361" comment="dotnet-hostfxr-8.0-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881362" comment="dotnet-runtime-8.0-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881363" comment="dotnet-runtime-dbg-8.0-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881364" comment="dotnet-sdk-8.0-8.0.108-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881365" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881366" comment="dotnet-sdk-dbg-8.0-8.0.108-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881367" comment="dotnet-targeting-pack-8.0-8.0.8-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881368" comment="dotnet-templates-8.0-8.0.108-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881369" comment="netstandard-targeting-pack-2.1-8.0.108-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3048" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-35176" ref_url="https://www.suse.com/security/cve/CVE-2024-35176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35176/">CVE-2024-35176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35176">CVE-2024-35176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943026" comment="pcs-0.10.18-2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943027" comment="pcs-snmp-0.10.18-2.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3049" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737/" source="CVE"/>
		<reference ref_id="CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975/" source="CVE"/>
		<reference ref_id="CVE-2024-4076" ref_url="https://www.suse.com/security/cve/CVE-2024-4076/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5390.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5390.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4076/">CVE-2024-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4076">CVE-2024-4076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880813" comment="bind9.16-9.16.23-0.22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880814" comment="bind9.16-chroot-9.16.23-0.22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880815" comment="bind9.16-devel-9.16.23-0.22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880816" comment="bind9.16-dnssec-utils-9.16.23-0.22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880817" comment="bind9.16-doc-9.16.23-0.22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880818" comment="bind9.16-libs-9.16.23-0.22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880819" comment="bind9.16-license-9.16.23-0.22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880820" comment="bind9.16-utils-9.16.23-0.22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880821" comment="python3-bind9.16-9.16.23-0.22.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3050" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7524" ref_url="https://www.suse.com/security/cve/CVE-2024-7524/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5391.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5391.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7524/">CVE-2024-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880857" comment="firefox-115.14.0-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3051" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5402.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5402.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880858" comment="thunderbird-115.14.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3052" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737/" source="CVE"/>
		<reference ref_id="CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5524.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5524.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880210" comment="bind-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880211" comment="bind-chroot-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880212" comment="bind-devel-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880213" comment="bind-export-devel-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880214" comment="bind-export-libs-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880215" comment="bind-libs-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880216" comment="bind-libs-lite-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880217" comment="bind-license-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880218" comment="bind-lite-devel-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880219" comment="bind-pkcs11-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880220" comment="bind-pkcs11-devel-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880221" comment="bind-pkcs11-libs-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880222" comment="bind-pkcs11-utils-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880223" comment="bind-sdb-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880224" comment="bind-sdb-chroot-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880225" comment="bind-utils-9.11.36-16.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880226" comment="python3-bind-9.11.36-16.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3053" version="1" class="patch">
	<metadata>
		<title>security update for python-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5530.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5530.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880227" comment="platform-python-setuptools-39.2.0-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880228" comment="python3-setuptools-39.2.0-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880229" comment="python3-setuptools-wheel-39.2.0-8.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3054" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5531.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5531.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880230" comment="python3.12-setuptools-68.2.2-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880231" comment="python3.12-setuptools-wheel-68.2.2-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3055" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5532.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5532.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880232" comment="python3.11-setuptools-65.5.1-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880233" comment="python3.11-setuptools-wheel-65.5.1-3.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3056" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5654.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5654.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880859" comment="curl-7.61.1-34.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880860" comment="libcurl-7.61.1-34.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880861" comment="libcurl-devel-7.61.1-34.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880862" comment="libcurl-minimal-7.61.1-34.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3057" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750/" source="CVE"/>
		<reference ref_id="CVE-2024-38286" ref_url="https://www.suse.com/security/cve/CVE-2024-38286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5694.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5694.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38286/">CVE-2024-38286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38286">CVE-2024-38286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880863" comment="tomcat-9.0.87-1.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880864" comment="tomcat-admin-webapps-9.0.87-1.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880865" comment="tomcat-docs-webapp-9.0.87-1.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880866" comment="tomcat-el-3.0-api-9.0.87-1.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880867" comment="tomcat-jsp-2.3-api-9.0.87-1.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880868" comment="tomcat-lib-9.0.87-1.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880869" comment="tomcat-servlet-4.0-api-9.0.87-1.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880870" comment="tomcat-webapps-9.0.87-1.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3058" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-22018" ref_url="https://www.suse.com/security/cve/CVE-2024-22018/" source="CVE"/>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-28863" ref_url="https://www.suse.com/security/cve/CVE-2024-28863/" source="CVE"/>
		<reference ref_id="CVE-2024-36137" ref_url="https://www.suse.com/security/cve/CVE-2024-36137/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5814.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5814.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22018/">CVE-2024-22018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22018">CVE-2024-22018 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28863/">CVE-2024-28863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28863">CVE-2024-28863 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36137/">CVE-2024-36137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36137">CVE-2024-36137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881238" comment="nodejs-20.16.0-1.module+el8.10.0+22203+a88c8310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881239" comment="nodejs-devel-20.16.0-1.module+el8.10.0+22203+a88c8310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881240" comment="nodejs-docs-20.16.0-1.module+el8.10.0+22203+a88c8310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881241" comment="nodejs-full-i18n-20.16.0-1.module+el8.10.0+22203+a88c8310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843609" comment="nodejs-nodemon-3.0.1-1.module+el8.9.0+20473+c4e3d824 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843610" comment="nodejs-packaging-2021.06-4.module+el8.9.0+19519+e25b965a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843611" comment="nodejs-packaging-bundler-2021.06-4.module+el8.9.0+19519+e25b965a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881242" comment="npm-10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3059" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5927.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5927.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881423" comment="pg_repack-1.4.8-1.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881424" comment="pgaudit-16.0-1.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881425" comment="postgres-decoderbufs-2.4.0-1.Final.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881426" comment="postgresql-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881427" comment="postgresql-contrib-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881428" comment="postgresql-docs-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881429" comment="postgresql-plperl-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881430" comment="postgresql-plpython3-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881431" comment="postgresql-pltcl-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881432" comment="postgresql-private-devel-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881433" comment="postgresql-private-libs-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881434" comment="postgresql-server-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881435" comment="postgresql-server-devel-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881436" comment="postgresql-static-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881437" comment="postgresql-test-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881438" comment="postgresql-test-rpm-macros-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881439" comment="postgresql-upgrade-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881440" comment="postgresql-upgrade-devel-16.4-1.module+el8.10.0+22209+060d7a0a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3060" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-6349" ref_url="https://www.suse.com/security/cve/CVE-2023-6349/" source="CVE"/>
		<reference ref_id="CVE-2024-5197" ref_url="https://www.suse.com/security/cve/CVE-2024-5197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5941.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5941.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6349/">CVE-2023-6349 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6349">CVE-2023-6349 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5197/">CVE-2024-5197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5197">CVE-2024-5197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881441" comment="libvpx-1.7.0-11.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881442" comment="libvpx-devel-1.7.0-11.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3061" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-28863" ref_url="https://www.suse.com/security/cve/CVE-2024-28863/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6148.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6148.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28863/">CVE-2024-28863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28863">CVE-2024-28863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940502" comment="nodejs-18.20.4-1.module+el8.10.0+22199+56ea0ead is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940503" comment="nodejs-devel-18.20.4-1.module+el8.10.0+22199+56ea0ead is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940504" comment="nodejs-docs-18.20.4-1.module+el8.10.0+22199+56ea0ead is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940505" comment="nodejs-full-i18n-18.20.4-1.module+el8.10.0+22199+56ea0ead is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940506" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+21159+f5a7145d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940507" comment="nodejs-packaging-2021.06-4.module+el8.9.0+19439+7b18b275 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940508" comment="nodejs-packaging-bundler-2021.06-4.module+el8.9.0+19439+7b18b275 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940509" comment="npm-10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3062" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6309.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6309.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942163" comment="fence-agents-aliyun-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942164" comment="fence-agents-all-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942165" comment="fence-agents-amt-ws-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942166" comment="fence-agents-apc-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942167" comment="fence-agents-apc-snmp-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942168" comment="fence-agents-aws-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942169" comment="fence-agents-azure-arm-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942170" comment="fence-agents-bladecenter-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942171" comment="fence-agents-brocade-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942172" comment="fence-agents-cisco-mds-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942173" comment="fence-agents-cisco-ucs-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942174" comment="fence-agents-common-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942175" comment="fence-agents-compute-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942176" comment="fence-agents-drac5-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942177" comment="fence-agents-eaton-snmp-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942178" comment="fence-agents-emerson-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942179" comment="fence-agents-eps-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942180" comment="fence-agents-gce-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942181" comment="fence-agents-heuristics-ping-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942182" comment="fence-agents-hpblade-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942183" comment="fence-agents-ibm-powervs-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942184" comment="fence-agents-ibm-vpc-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942185" comment="fence-agents-ibmblade-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942186" comment="fence-agents-ifmib-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942187" comment="fence-agents-ilo-moonshot-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942188" comment="fence-agents-ilo-mp-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942189" comment="fence-agents-ilo-ssh-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942190" comment="fence-agents-ilo2-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942191" comment="fence-agents-intelmodular-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942192" comment="fence-agents-ipdu-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942193" comment="fence-agents-ipmilan-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942194" comment="fence-agents-kdump-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942195" comment="fence-agents-kubevirt-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942196" comment="fence-agents-lpar-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942197" comment="fence-agents-mpath-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942198" comment="fence-agents-openstack-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942199" comment="fence-agents-redfish-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942200" comment="fence-agents-rhevm-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942201" comment="fence-agents-rsa-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942202" comment="fence-agents-rsb-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942203" comment="fence-agents-sbd-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942204" comment="fence-agents-scsi-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942205" comment="fence-agents-virsh-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942206" comment="fence-agents-vmware-rest-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942207" comment="fence-agents-vmware-soap-4.2.1-129.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942208" comment="fence-agents-wti-4.2.1-129.el8_10.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3063" version="1" class="patch">
	<metadata>
		<title>security update for resource-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6311.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6311.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942209" comment="resource-agents-4.9.0-54.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942210" comment="resource-agents-aliyun-4.9.0-54.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942211" comment="resource-agents-gcp-4.9.0-54.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942212" comment="resource-agents-paf-4.9.0-54.el8_10.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3064" version="1" class="patch">
	<metadata>
		<title>security update for bubblewrap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941414" comment="bubblewrap-0.4.0-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941415" comment="flatpak-1.12.9-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941416" comment="flatpak-devel-1.12.9-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941417" comment="flatpak-libs-1.12.9-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941418" comment="flatpak-selinux-1.12.9-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941419" comment="flatpak-session-helper-1.12.9-3.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3065" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6569.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6569.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942213" comment="389-ds-base-1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942214" comment="389-ds-base-devel-1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942215" comment="389-ds-base-legacy-tools-1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942216" comment="389-ds-base-libs-1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942217" comment="389-ds-base-snmp-1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942218" comment="python3-lib389-1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3066" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-41123" ref_url="https://www.suse.com/security/cve/CVE-2024-41123/" source="CVE"/>
		<reference ref_id="CVE-2024-41946" ref_url="https://www.suse.com/security/cve/CVE-2024-41946/" source="CVE"/>
		<reference ref_id="CVE-2024-43398" ref_url="https://www.suse.com/security/cve/CVE-2024-43398/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6670.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6670.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41123/">CVE-2024-41123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41946/">CVE-2024-41946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43398/">CVE-2024-43398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43398">CVE-2024-43398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943404" comment="pcs-0.10.18-2.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943405" comment="pcs-snmp-0.10.18-2.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3067" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-7652" ref_url="https://www.suse.com/security/cve/CVE-2024-7652/" source="CVE"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6682.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6682.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-7652/">CVE-2024-7652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7652">CVE-2024-7652 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944937" comment="firefox-128.2.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3068" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-7652" ref_url="https://www.suse.com/security/cve/CVE-2024-7652/" source="CVE"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<reference ref_id="CVE-2024-8394" ref_url="https://www.suse.com/security/cve/CVE-2024-8394/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6684.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6684.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-7652/">CVE-2024-7652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7652">CVE-2024-7652 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8394/">CVE-2024-8394 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8394">CVE-2024-8394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944785" comment="thunderbird-128.2.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3069" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-39908" ref_url="https://www.suse.com/security/cve/CVE-2024-39908/" source="CVE"/>
		<reference ref_id="CVE-2024-41123" ref_url="https://www.suse.com/security/cve/CVE-2024-41123/" source="CVE"/>
		<reference ref_id="CVE-2024-41946" ref_url="https://www.suse.com/security/cve/CVE-2024-41946/" source="CVE"/>
		<reference ref_id="CVE-2024-43398" ref_url="https://www.suse.com/security/cve/CVE-2024-43398/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6784.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6784.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39908/">CVE-2024-39908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39908">CVE-2024-39908 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41123/">CVE-2024-41123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41946/">CVE-2024-41946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43398/">CVE-2024-43398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43398">CVE-2024-43398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943406" comment="ruby-3.3.5-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943407" comment="ruby-bundled-gems-3.3.5-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943408" comment="ruby-default-gems-3.3.5-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943409" comment="ruby-devel-3.3.5-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943410" comment="ruby-doc-3.3.5-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943411" comment="ruby-libs-3.3.5-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874625" comment="rubygem-abrt-0.4.0-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874626" comment="rubygem-abrt-doc-0.4.0-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943412" comment="rubygem-bigdecimal-3.1.5-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943413" comment="rubygem-bundler-2.5.16-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943414" comment="rubygem-io-console-0.7.1-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943415" comment="rubygem-irb-1.13.1-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943416" comment="rubygem-json-2.7.1-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943417" comment="rubygem-minitest-5.20.0-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874633" comment="rubygem-mysql2-0.5.5-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874634" comment="rubygem-mysql2-doc-0.5.5-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874635" comment="rubygem-pg-1.5.4-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874636" comment="rubygem-pg-doc-1.5.4-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943418" comment="rubygem-power_assert-2.0.3-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943419" comment="rubygem-psych-5.1.2-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943420" comment="rubygem-racc-1.7.3-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943421" comment="rubygem-rake-13.1.0-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943422" comment="rubygem-rbs-3.4.0-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943423" comment="rubygem-rdoc-6.6.3.1-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943424" comment="rubygem-rexml-3.3.6-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943425" comment="rubygem-rss-0.3.1-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943426" comment="rubygem-test-unit-3.6.1-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943427" comment="rubygem-typeprof-0.21.9-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943428" comment="rubygems-3.5.16-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943429" comment="rubygems-devel-3.5.16-3.module+el8.10.0+22271+6a48b0b9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3070" version="1" class="patch">
	<metadata>
		<title>security update for pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-45769" ref_url="https://www.suse.com/security/cve/CVE-2024-45769/" source="CVE"/>
		<reference ref_id="CVE-2024-45770" ref_url="https://www.suse.com/security/cve/CVE-2024-45770/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45769/">CVE-2024-45769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45769">CVE-2024-45769 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45770/">CVE-2024-45770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45770">CVE-2024-45770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943719" comment="pcp-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943720" comment="pcp-conf-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943721" comment="pcp-devel-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943722" comment="pcp-doc-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943723" comment="pcp-export-pcp2elasticsearch-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943724" comment="pcp-export-pcp2graphite-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943725" comment="pcp-export-pcp2influxdb-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943726" comment="pcp-export-pcp2json-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943727" comment="pcp-export-pcp2spark-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943728" comment="pcp-export-pcp2xml-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943729" comment="pcp-export-pcp2zabbix-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943730" comment="pcp-export-zabbix-agent-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943731" comment="pcp-gui-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943732" comment="pcp-import-collectl2pcp-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943733" comment="pcp-import-ganglia2pcp-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943734" comment="pcp-import-iostat2pcp-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943735" comment="pcp-import-mrtg2pcp-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943736" comment="pcp-import-sar2pcp-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943737" comment="pcp-libs-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943738" comment="pcp-libs-devel-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943739" comment="pcp-pmda-activemq-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943740" comment="pcp-pmda-apache-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943741" comment="pcp-pmda-bash-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943742" comment="pcp-pmda-bcc-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943743" comment="pcp-pmda-bind2-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943744" comment="pcp-pmda-bonding-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943745" comment="pcp-pmda-bpftrace-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943746" comment="pcp-pmda-cifs-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943747" comment="pcp-pmda-cisco-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943748" comment="pcp-pmda-dbping-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943749" comment="pcp-pmda-denki-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943750" comment="pcp-pmda-dm-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943751" comment="pcp-pmda-docker-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943752" comment="pcp-pmda-ds389-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943753" comment="pcp-pmda-ds389log-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943754" comment="pcp-pmda-elasticsearch-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943755" comment="pcp-pmda-gfs2-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943756" comment="pcp-pmda-gluster-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943757" comment="pcp-pmda-gpfs-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943758" comment="pcp-pmda-gpsd-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943759" comment="pcp-pmda-hacluster-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943760" comment="pcp-pmda-haproxy-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943761" comment="pcp-pmda-infiniband-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943762" comment="pcp-pmda-json-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943763" comment="pcp-pmda-libvirt-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943764" comment="pcp-pmda-lio-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943765" comment="pcp-pmda-lmsensors-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943766" comment="pcp-pmda-logger-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943767" comment="pcp-pmda-lustre-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943768" comment="pcp-pmda-lustrecomm-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943769" comment="pcp-pmda-mailq-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943770" comment="pcp-pmda-memcache-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943771" comment="pcp-pmda-mic-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943772" comment="pcp-pmda-mongodb-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943773" comment="pcp-pmda-mounts-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943774" comment="pcp-pmda-mssql-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943775" comment="pcp-pmda-mysql-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943776" comment="pcp-pmda-named-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943777" comment="pcp-pmda-netcheck-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943778" comment="pcp-pmda-netfilter-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943779" comment="pcp-pmda-news-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943780" comment="pcp-pmda-nfsclient-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943781" comment="pcp-pmda-nginx-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943782" comment="pcp-pmda-nvidia-gpu-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943783" comment="pcp-pmda-openmetrics-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943784" comment="pcp-pmda-openvswitch-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943785" comment="pcp-pmda-oracle-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943786" comment="pcp-pmda-pdns-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943787" comment="pcp-pmda-perfevent-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943788" comment="pcp-pmda-podman-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943789" comment="pcp-pmda-postfix-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943790" comment="pcp-pmda-postgresql-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943791" comment="pcp-pmda-rabbitmq-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943792" comment="pcp-pmda-redis-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943793" comment="pcp-pmda-roomtemp-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943794" comment="pcp-pmda-rsyslog-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943795" comment="pcp-pmda-samba-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943796" comment="pcp-pmda-sendmail-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943797" comment="pcp-pmda-shping-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943798" comment="pcp-pmda-slurm-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943799" comment="pcp-pmda-smart-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943800" comment="pcp-pmda-snmp-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943801" comment="pcp-pmda-sockets-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943802" comment="pcp-pmda-statsd-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943803" comment="pcp-pmda-summary-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943804" comment="pcp-pmda-systemd-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943805" comment="pcp-pmda-trace-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943806" comment="pcp-pmda-unbound-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943807" comment="pcp-pmda-weblog-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943808" comment="pcp-pmda-zimbra-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943809" comment="pcp-pmda-zswap-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943810" comment="pcp-selinux-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943811" comment="pcp-system-tools-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943812" comment="pcp-zeroconf-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943813" comment="perl-PCP-LogImport-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943814" comment="perl-PCP-LogSummary-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943815" comment="perl-PCP-MMV-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943816" comment="perl-PCP-PMDA-5.3.7-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943817" comment="python3-pcp-5.3.7-22.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3071" version="1" class="patch">
	<metadata>
		<title>security update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6908.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6908.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944938" comment="delve-1.21.2-4.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944939" comment="go-toolset-1.21.13-1.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944940" comment="golang-1.21.13-2.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944941" comment="golang-bin-1.21.13-2.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944942" comment="golang-docs-1.21.13-2.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944943" comment="golang-misc-1.21.13-2.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944944" comment="golang-src-1.21.13-2.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944945" comment="golang-tests-1.21.13-2.module+el8.10.0+22329+6cd5c9c6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3072" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6961.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6961.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944430" comment="python3.12-3.12.5-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944431" comment="python3.12-debug-3.12.5-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944432" comment="python3.12-devel-3.12.5-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944433" comment="python3.12-idle-3.12.5-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944434" comment="python3.12-libs-3.12.5-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944435" comment="python3.12-rpm-macros-3.12.5-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944436" comment="python3.12-test-3.12.5-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944437" comment="python3.12-tkinter-3.12.5-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3073" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6962.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6962.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944438" comment="python3.11-3.11.9-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944439" comment="python3.11-debug-3.11.9-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944440" comment="python3.11-devel-3.11.9-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944441" comment="python3.11-idle-3.11.9-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944442" comment="python3.11-libs-3.11.9-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944443" comment="python3.11-rpm-macros-3.11.9-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944444" comment="python3.11-test-3.11.9-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944445" comment="python3.11-tkinter-3.11.9-7.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3074" version="1" class="patch">
	<metadata>
		<title>security update for gtk3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6963.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6963.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944446" comment="gtk-update-icon-cache-3.22.30-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944447" comment="gtk3-3.22.30-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944448" comment="gtk3-devel-3.22.30-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944449" comment="gtk3-devel-docs-3.22.30-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944450" comment="gtk3-immodule-xim-3.22.30-12.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3075" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6969.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6969.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944946" comment="aardvark-dns-1.10.0-1.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944947" comment="buildah-1.33.8-4.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944948" comment="buildah-tests-1.33.8-4.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944949" comment="cockpit-podman-84.1-1.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944950" comment="conmon-2.1.10-1.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944951" comment="container-selinux-2.229.0-2.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944952" comment="containernetworking-plugins-1.4.0-5.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944953" comment="containers-common-1-82.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944954" comment="crit-3.18-5.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944955" comment="criu-3.18-5.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944956" comment="criu-devel-3.18-5.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944957" comment="criu-libs-3.18-5.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944958" comment="crun-1.14.3-2.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944959" comment="fuse-overlayfs-1.13-1.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944960" comment="libslirp-4.4.0-2.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944961" comment="libslirp-devel-4.4.0-2.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944962" comment="netavark-1.10.3-1.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944963" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944964" comment="podman-4.9.4-13.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944965" comment="podman-catatonit-4.9.4-13.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944966" comment="podman-docker-4.9.4-13.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944967" comment="podman-gvproxy-4.9.4-13.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944968" comment="podman-plugins-4.9.4-13.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944969" comment="podman-remote-4.9.4-13.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944970" comment="podman-tests-4.9.4-13.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944971" comment="python3-criu-3.18-5.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944972" comment="python3-podman-4.9.0-2.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944973" comment="runc-1.1.12-4.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944974" comment="skopeo-1.14.5-3.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944975" comment="skopeo-tests-1.14.5-3.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944976" comment="slirp4netns-1.2.3-1.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944977" comment="toolbox-0.0.99.5-2.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944978" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+22283+6d6d094a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944979" comment="udica-0.2.6-21.module+el8.10.0+22283+6d6d094a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3076" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-23184" ref_url="https://www.suse.com/security/cve/CVE-2024-23184/" source="CVE"/>
		<reference ref_id="CVE-2024-23185" ref_url="https://www.suse.com/security/cve/CVE-2024-23185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6973.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6973.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-23184/">CVE-2024-23184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23184">CVE-2024-23184 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23185/">CVE-2024-23185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23185">CVE-2024-23185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944451" comment="dovecot-2.3.16-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944452" comment="dovecot-devel-2.3.16-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944453" comment="dovecot-mysql-2.3.16-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944454" comment="dovecot-pgsql-2.3.16-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944455" comment="dovecot-pigeonhole-2.3.16-6.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3077" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6975.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6975.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944677" comment="platform-python-3.6.8-67.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944678" comment="platform-python-debug-3.6.8-67.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944679" comment="platform-python-devel-3.6.8-67.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944680" comment="python3-idle-3.6.8-67.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944681" comment="python3-libs-3.6.8-67.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944682" comment="python3-test-3.6.8-67.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944683" comment="python3-tkinter-3.6.8-67.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3078" version="1" class="patch">
	<metadata>
		<title>security update for nano (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-5742" ref_url="https://www.suse.com/security/cve/CVE-2024-5742/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6986.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6986.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5742/">CVE-2024-5742 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5742">CVE-2024-5742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944456" comment="nano-2.9.8-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3079" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-30203" ref_url="https://www.suse.com/security/cve/CVE-2024-30203/" source="CVE"/>
		<reference ref_id="CVE-2024-30205" ref_url="https://www.suse.com/security/cve/CVE-2024-30205/" source="CVE"/>
		<reference ref_id="CVE-2024-39331" ref_url="https://www.suse.com/security/cve/CVE-2024-39331/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6987.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6987.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30203/">CVE-2024-30203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30203">CVE-2024-30203 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30205/">CVE-2024-30205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30205">CVE-2024-30205 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39331/">CVE-2024-39331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39331">CVE-2024-39331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944786" comment="emacs-26.1-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944787" comment="emacs-common-26.1-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944788" comment="emacs-filesystem-26.1-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944789" comment="emacs-lucid-26.1-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944790" comment="emacs-nox-26.1-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944791" comment="emacs-terminal-26.1-12.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3080" version="1" class="patch">
	<metadata>
		<title>security update for expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6989.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6989.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944457" comment="expat-2.2.5-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944458" comment="expat-devel-2.2.5-15.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3081" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2021-46984" ref_url="https://www.suse.com/security/cve/CVE-2021-46984/" source="CVE"/>
		<reference ref_id="CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097/" source="CVE"/>
		<reference ref_id="CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101/" source="CVE"/>
		<reference ref_id="CVE-2021-47287" ref_url="https://www.suse.com/security/cve/CVE-2021-47287/" source="CVE"/>
		<reference ref_id="CVE-2021-47289" ref_url="https://www.suse.com/security/cve/CVE-2021-47289/" source="CVE"/>
		<reference ref_id="CVE-2021-47321" ref_url="https://www.suse.com/security/cve/CVE-2021-47321/" source="CVE"/>
		<reference ref_id="CVE-2021-47338" ref_url="https://www.suse.com/security/cve/CVE-2021-47338/" source="CVE"/>
		<reference ref_id="CVE-2021-47352" ref_url="https://www.suse.com/security/cve/CVE-2021-47352/" source="CVE"/>
		<reference ref_id="CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383/" source="CVE"/>
		<reference ref_id="CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384/" source="CVE"/>
		<reference ref_id="CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385/" source="CVE"/>
		<reference ref_id="CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386/" source="CVE"/>
		<reference ref_id="CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393/" source="CVE"/>
		<reference ref_id="CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412/" source="CVE"/>
		<reference ref_id="CVE-2021-47432" ref_url="https://www.suse.com/security/cve/CVE-2021-47432/" source="CVE"/>
		<reference ref_id="CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441/" source="CVE"/>
		<reference ref_id="CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455/" source="CVE"/>
		<reference ref_id="CVE-2021-47466" ref_url="https://www.suse.com/security/cve/CVE-2021-47466/" source="CVE"/>
		<reference ref_id="CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497/" source="CVE"/>
		<reference ref_id="CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560/" source="CVE"/>
		<reference ref_id="CVE-2021-47582" ref_url="https://www.suse.com/security/cve/CVE-2021-47582/" source="CVE"/>
		<reference ref_id="CVE-2021-47609" ref_url="https://www.suse.com/security/cve/CVE-2021-47609/" source="CVE"/>
		<reference ref_id="CVE-2022-48619" ref_url="https://www.suse.com/security/cve/CVE-2022-48619/" source="CVE"/>
		<reference ref_id="CVE-2022-48754" ref_url="https://www.suse.com/security/cve/CVE-2022-48754/" source="CVE"/>
		<reference ref_id="CVE-2022-48760" ref_url="https://www.suse.com/security/cve/CVE-2022-48760/" source="CVE"/>
		<reference ref_id="CVE-2022-48804" ref_url="https://www.suse.com/security/cve/CVE-2022-48804/" source="CVE"/>
		<reference ref_id="CVE-2022-48836" ref_url="https://www.suse.com/security/cve/CVE-2022-48836/" source="CVE"/>
		<reference ref_id="CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866/" source="CVE"/>
		<reference ref_id="CVE-2022-49226" ref_url="https://www.suse.com/security/cve/CVE-2022-49226/" source="CVE"/>
		<reference ref_id="CVE-2022-49316" ref_url="https://www.suse.com/security/cve/CVE-2022-49316/" source="CVE"/>
		<reference ref_id="CVE-2022-50072" ref_url="https://www.suse.com/security/cve/CVE-2022-50072/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-52522" ref_url="https://www.suse.com/security/cve/CVE-2023-52522/" source="CVE"/>
		<reference ref_id="CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605/" source="CVE"/>
		<reference ref_id="CVE-2023-52683" ref_url="https://www.suse.com/security/cve/CVE-2023-52683/" source="CVE"/>
		<reference ref_id="CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840/" source="CVE"/>
		<reference ref_id="CVE-2023-53847" ref_url="https://www.suse.com/security/cve/CVE-2023-53847/" source="CVE"/>
		<reference ref_id="CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040/" source="CVE"/>
		<reference ref_id="CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848/" source="CVE"/>
		<reference ref_id="CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="CVE-2024-26638" ref_url="https://www.suse.com/security/cve/CVE-2024-26638/" source="CVE"/>
		<reference ref_id="CVE-2024-26645" ref_url="https://www.suse.com/security/cve/CVE-2024-26645/" source="CVE"/>
		<reference ref_id="CVE-2024-26649" ref_url="https://www.suse.com/security/cve/CVE-2024-26649/" source="CVE"/>
		<reference ref_id="CVE-2024-26665" ref_url="https://www.suse.com/security/cve/CVE-2024-26665/" source="CVE"/>
		<reference ref_id="CVE-2024-26717" ref_url="https://www.suse.com/security/cve/CVE-2024-26717/" source="CVE"/>
		<reference ref_id="CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720/" source="CVE"/>
		<reference ref_id="CVE-2024-26769" ref_url="https://www.suse.com/security/cve/CVE-2024-26769/" source="CVE"/>
		<reference ref_id="CVE-2024-26846" ref_url="https://www.suse.com/security/cve/CVE-2024-26846/" source="CVE"/>
		<reference ref_id="CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855/" source="CVE"/>
		<reference ref_id="CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880/" source="CVE"/>
		<reference ref_id="CVE-2024-26894" ref_url="https://www.suse.com/security/cve/CVE-2024-26894/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-26939" ref_url="https://www.suse.com/security/cve/CVE-2024-26939/" source="CVE"/>
		<reference ref_id="CVE-2024-27013" ref_url="https://www.suse.com/security/cve/CVE-2024-27013/" source="CVE"/>
		<reference ref_id="CVE-2024-27042" ref_url="https://www.suse.com/security/cve/CVE-2024-27042/" source="CVE"/>
		<reference ref_id="CVE-2024-35809" ref_url="https://www.suse.com/security/cve/CVE-2024-35809/" source="CVE"/>
		<reference ref_id="CVE-2024-35877" ref_url="https://www.suse.com/security/cve/CVE-2024-35877/" source="CVE"/>
		<reference ref_id="CVE-2024-35884" ref_url="https://www.suse.com/security/cve/CVE-2024-35884/" source="CVE"/>
		<reference ref_id="CVE-2024-35944" ref_url="https://www.suse.com/security/cve/CVE-2024-35944/" source="CVE"/>
		<reference ref_id="CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989/" source="CVE"/>
		<reference ref_id="CVE-2024-36883" ref_url="https://www.suse.com/security/cve/CVE-2024-36883/" source="CVE"/>
		<reference ref_id="CVE-2024-36901" ref_url="https://www.suse.com/security/cve/CVE-2024-36901/" source="CVE"/>
		<reference ref_id="CVE-2024-36902" ref_url="https://www.suse.com/security/cve/CVE-2024-36902/" source="CVE"/>
		<reference ref_id="CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919/" source="CVE"/>
		<reference ref_id="CVE-2024-36920" ref_url="https://www.suse.com/security/cve/CVE-2024-36920/" source="CVE"/>
		<reference ref_id="CVE-2024-36922" ref_url="https://www.suse.com/security/cve/CVE-2024-36922/" source="CVE"/>
		<reference ref_id="CVE-2024-36939" ref_url="https://www.suse.com/security/cve/CVE-2024-36939/" source="CVE"/>
		<reference ref_id="CVE-2024-36953" ref_url="https://www.suse.com/security/cve/CVE-2024-36953/" source="CVE"/>
		<reference ref_id="CVE-2024-37356" ref_url="https://www.suse.com/security/cve/CVE-2024-37356/" source="CVE"/>
		<reference ref_id="CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570/" source="CVE"/>
		<reference ref_id="CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579/" source="CVE"/>
		<reference ref_id="CVE-2024-38581" ref_url="https://www.suse.com/security/cve/CVE-2024-38581/" source="CVE"/>
		<reference ref_id="CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619/" source="CVE"/>
		<reference ref_id="CVE-2024-39471" ref_url="https://www.suse.com/security/cve/CVE-2024-39471/" source="CVE"/>
		<reference ref_id="CVE-2024-39499" ref_url="https://www.suse.com/security/cve/CVE-2024-39499/" source="CVE"/>
		<reference ref_id="CVE-2024-39501" ref_url="https://www.suse.com/security/cve/CVE-2024-39501/" source="CVE"/>
		<reference ref_id="CVE-2024-39506" ref_url="https://www.suse.com/security/cve/CVE-2024-39506/" source="CVE"/>
		<reference ref_id="CVE-2024-40901" ref_url="https://www.suse.com/security/cve/CVE-2024-40901/" source="CVE"/>
		<reference ref_id="CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904/" source="CVE"/>
		<reference ref_id="CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911/" source="CVE"/>
		<reference ref_id="CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912/" source="CVE"/>
		<reference ref_id="CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929/" source="CVE"/>
		<reference ref_id="CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931/" source="CVE"/>
		<reference ref_id="CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958/" source="CVE"/>
		<reference ref_id="CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959/" source="CVE"/>
		<reference ref_id="CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960/" source="CVE"/>
		<reference ref_id="CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972/" source="CVE"/>
		<reference ref_id="CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977/" source="CVE"/>
		<reference ref_id="CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978/" source="CVE"/>
		<reference ref_id="CVE-2024-40988" ref_url="https://www.suse.com/security/cve/CVE-2024-40988/" source="CVE"/>
		<reference ref_id="CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989/" source="CVE"/>
		<reference ref_id="CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995/" source="CVE"/>
		<reference ref_id="CVE-2024-40997" ref_url="https://www.suse.com/security/cve/CVE-2024-40997/" source="CVE"/>
		<reference ref_id="CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998/" source="CVE"/>
		<reference ref_id="CVE-2024-41005" ref_url="https://www.suse.com/security/cve/CVE-2024-41005/" source="CVE"/>
		<reference ref_id="CVE-2024-41007" ref_url="https://www.suse.com/security/cve/CVE-2024-41007/" source="CVE"/>
		<reference ref_id="CVE-2024-41008" ref_url="https://www.suse.com/security/cve/CVE-2024-41008/" source="CVE"/>
		<reference ref_id="CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012/" source="CVE"/>
		<reference ref_id="CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013/" source="CVE"/>
		<reference ref_id="CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014/" source="CVE"/>
		<reference ref_id="CVE-2024-41023" ref_url="https://www.suse.com/security/cve/CVE-2024-41023/" source="CVE"/>
		<reference ref_id="CVE-2024-41035" ref_url="https://www.suse.com/security/cve/CVE-2024-41035/" source="CVE"/>
		<reference ref_id="CVE-2024-41038" ref_url="https://www.suse.com/security/cve/CVE-2024-41038/" source="CVE"/>
		<reference ref_id="CVE-2024-41039" ref_url="https://www.suse.com/security/cve/CVE-2024-41039/" source="CVE"/>
		<reference ref_id="CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040/" source="CVE"/>
		<reference ref_id="CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041/" source="CVE"/>
		<reference ref_id="CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044/" source="CVE"/>
		<reference ref_id="CVE-2024-41055" ref_url="https://www.suse.com/security/cve/CVE-2024-41055/" source="CVE"/>
		<reference ref_id="CVE-2024-41056" ref_url="https://www.suse.com/security/cve/CVE-2024-41056/" source="CVE"/>
		<reference ref_id="CVE-2024-41060" ref_url="https://www.suse.com/security/cve/CVE-2024-41060/" source="CVE"/>
		<reference ref_id="CVE-2024-41064" ref_url="https://www.suse.com/security/cve/CVE-2024-41064/" source="CVE"/>
		<reference ref_id="CVE-2024-41065" ref_url="https://www.suse.com/security/cve/CVE-2024-41065/" source="CVE"/>
		<reference ref_id="CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071/" source="CVE"/>
		<reference ref_id="CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091/" source="CVE"/>
		<reference ref_id="CVE-2024-41097" ref_url="https://www.suse.com/security/cve/CVE-2024-41097/" source="CVE"/>
		<reference ref_id="CVE-2024-42084" ref_url="https://www.suse.com/security/cve/CVE-2024-42084/" source="CVE"/>
		<reference ref_id="CVE-2024-42090" ref_url="https://www.suse.com/security/cve/CVE-2024-42090/" source="CVE"/>
		<reference ref_id="CVE-2024-42094" ref_url="https://www.suse.com/security/cve/CVE-2024-42094/" source="CVE"/>
		<reference ref_id="CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096/" source="CVE"/>
		<reference ref_id="CVE-2024-42114" ref_url="https://www.suse.com/security/cve/CVE-2024-42114/" source="CVE"/>
		<reference ref_id="CVE-2024-42124" ref_url="https://www.suse.com/security/cve/CVE-2024-42124/" source="CVE"/>
		<reference ref_id="CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131/" source="CVE"/>
		<reference ref_id="CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152/" source="CVE"/>
		<reference ref_id="CVE-2024-42154" ref_url="https://www.suse.com/security/cve/CVE-2024-42154/" source="CVE"/>
		<reference ref_id="CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225/" source="CVE"/>
		<reference ref_id="CVE-2024-42226" ref_url="https://www.suse.com/security/cve/CVE-2024-42226/" source="CVE"/>
		<reference ref_id="CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228/" source="CVE"/>
		<reference ref_id="CVE-2024-42237" ref_url="https://www.suse.com/security/cve/CVE-2024-42237/" source="CVE"/>
		<reference ref_id="CVE-2024-42238" ref_url="https://www.suse.com/security/cve/CVE-2024-42238/" source="CVE"/>
		<reference ref_id="CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240/" source="CVE"/>
		<reference ref_id="CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322/" source="CVE"/>
		<reference ref_id="CVE-2024-43830" ref_url="https://www.suse.com/security/cve/CVE-2024-43830/" source="CVE"/>
		<reference ref_id="CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871/" source="CVE"/>
		<reference ref_id="CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7000.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7000.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46984/">CVE-2021-46984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46984">CVE-2021-46984 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47287/">CVE-2021-47287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47287">CVE-2021-47287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47289/">CVE-2021-47289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47289">CVE-2021-47289 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47321/">CVE-2021-47321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47321">CVE-2021-47321 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47338/">CVE-2021-47338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47338">CVE-2021-47338 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47352/">CVE-2021-47352 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47352">CVE-2021-47352 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47432/">CVE-2021-47432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47432">CVE-2021-47432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47466/">CVE-2021-47466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47466">CVE-2021-47466 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47582/">CVE-2021-47582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47582">CVE-2021-47582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47609/">CVE-2021-47609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47609">CVE-2021-47609 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48619/">CVE-2022-48619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48619">CVE-2022-48619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48754/">CVE-2022-48754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48754">CVE-2022-48754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48760/">CVE-2022-48760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48760">CVE-2022-48760 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48804/">CVE-2022-48804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48804">CVE-2022-48804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48836/">CVE-2022-48836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48836">CVE-2022-48836 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49226/">CVE-2022-49226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49226">CVE-2022-49226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49316/">CVE-2022-49316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49316">CVE-2022-49316 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50072/">CVE-2022-50072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50072">CVE-2022-50072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52522/">CVE-2023-52522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52522">CVE-2023-52522 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52683/">CVE-2023-52683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52683">CVE-2023-52683 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53847/">CVE-2023-53847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53847">CVE-2023-53847 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26638/">CVE-2024-26638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26638">CVE-2024-26638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26645/">CVE-2024-26645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26649/">CVE-2024-26649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26649">CVE-2024-26649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26665/">CVE-2024-26665 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26717/">CVE-2024-26717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26769/">CVE-2024-26769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26846/">CVE-2024-26846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26846">CVE-2024-26846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26894/">CVE-2024-26894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26894">CVE-2024-26894 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26939/">CVE-2024-26939 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27013/">CVE-2024-27013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27042/">CVE-2024-27042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27042">CVE-2024-27042 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35809/">CVE-2024-35809 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35809">CVE-2024-35809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35877/">CVE-2024-35877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35884/">CVE-2024-35884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35944/">CVE-2024-35944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36883/">CVE-2024-36883 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36901/">CVE-2024-36901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36902/">CVE-2024-36902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36920/">CVE-2024-36920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36920">CVE-2024-36920 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36922/">CVE-2024-36922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36922">CVE-2024-36922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36939/">CVE-2024-36939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36953/">CVE-2024-36953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37356/">CVE-2024-37356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37356">CVE-2024-37356 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38581/">CVE-2024-38581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39471/">CVE-2024-39471 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39499/">CVE-2024-39499 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39501/">CVE-2024-39501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39506/">CVE-2024-39506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-40901/">CVE-2024-40901 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40988/">CVE-2024-40988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40997/">CVE-2024-40997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41005/">CVE-2024-41005 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41005">CVE-2024-41005 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41007/">CVE-2024-41007 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41007">CVE-2024-41007 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41008/">CVE-2024-41008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41008">CVE-2024-41008 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41023/">CVE-2024-41023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41023">CVE-2024-41023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41035/">CVE-2024-41035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41038/">CVE-2024-41038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41039/">CVE-2024-41039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41055/">CVE-2024-41055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41055">CVE-2024-41055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41056/">CVE-2024-41056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41060/">CVE-2024-41060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41064/">CVE-2024-41064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41065/">CVE-2024-41065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41097/">CVE-2024-41097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42084/">CVE-2024-42084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42084">CVE-2024-42084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42090/">CVE-2024-42090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42094/">CVE-2024-42094 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42094">CVE-2024-42094 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42114/">CVE-2024-42114 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42114">CVE-2024-42114 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42124/">CVE-2024-42124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42154/">CVE-2024-42154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42226/">CVE-2024-42226 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42237/">CVE-2024-42237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42237">CVE-2024-42237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42238/">CVE-2024-42238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42238">CVE-2024-42238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43830/">CVE-2024-43830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944980" comment="bpftool-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944981" comment="kernel-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944982" comment="kernel-abi-stablelists-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944983" comment="kernel-core-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944984" comment="kernel-cross-headers-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944985" comment="kernel-debug-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944986" comment="kernel-debug-core-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944988" comment="kernel-debug-modules-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944989" comment="kernel-debug-modules-extra-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944991" comment="kernel-doc-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944992" comment="kernel-headers-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944993" comment="kernel-modules-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944994" comment="kernel-modules-extra-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944995" comment="kernel-tools-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944996" comment="kernel-tools-libs-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944998" comment="perf-4.18.0-553.22.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944999" comment="python3-perf-4.18.0-553.22.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3082" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944792" comment="git-lfs-3.4.1-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3083" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7349.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7349.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945281" comment="grafana-9.2.10-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945282" comment="grafana-selinux-9.2.10-18.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3084" version="1" class="patch">
	<metadata>
		<title>security update for cups-filters (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47076" ref_url="https://www.suse.com/security/cve/CVE-2024-47076/" source="CVE"/>
		<reference ref_id="CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175/" source="CVE"/>
		<reference ref_id="CVE-2024-47176" ref_url="https://www.suse.com/security/cve/CVE-2024-47176/" source="CVE"/>
		<reference ref_id="CVE-2024-47850" ref_url="https://www.suse.com/security/cve/CVE-2024-47850/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7463.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7463.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47076/">CVE-2024-47076 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47076">CVE-2024-47076 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47176/">CVE-2024-47176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47176">CVE-2024-47176 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47850/">CVE-2024-47850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47850">CVE-2024-47850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945391" comment="cups-filters-1.20.0-35.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945392" comment="cups-filters-devel-1.20.0-35.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945393" comment="cups-filters-libs-1.20.0-35.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3085" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-20584" ref_url="https://www.suse.com/security/cve/CVE-2023-20584/" source="CVE"/>
		<reference ref_id="CVE-2023-31315" ref_url="https://www.suse.com/security/cve/CVE-2023-31315/" source="CVE"/>
		<reference ref_id="CVE-2023-31356" ref_url="https://www.suse.com/security/cve/CVE-2023-31356/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7481.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7481.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" cvss4="4/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2023-20584/">CVE-2023-20584 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20584">CVE-2023-20584 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31315/">CVE-2023-31315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-31356/">CVE-2023-31356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31356">CVE-2023-31356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945394" comment="iwl100-firmware-39.31.5.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945395" comment="iwl1000-firmware-39.31.5.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945396" comment="iwl105-firmware-18.168.6.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945397" comment="iwl135-firmware-18.168.6.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945398" comment="iwl2000-firmware-18.168.6.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945399" comment="iwl2030-firmware-18.168.6.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945400" comment="iwl3160-firmware-25.30.13.0-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945401" comment="iwl3945-firmware-15.32.2.9-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945402" comment="iwl4965-firmware-228.61.2.24-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945403" comment="iwl5000-firmware-8.83.5.1_1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945404" comment="iwl5150-firmware-8.24.2.2-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945405" comment="iwl6000-firmware-9.221.4.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945406" comment="iwl6000g2a-firmware-18.168.6.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945407" comment="iwl6000g2b-firmware-18.168.6.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945408" comment="iwl6050-firmware-41.28.5.1-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945409" comment="iwl7260-firmware-25.30.13.0-124.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945410" comment="libertas-sd8686-firmware-20240827-124.git3cff7109.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945411" comment="libertas-sd8787-firmware-20240827-124.git3cff7109.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945412" comment="libertas-usb8388-firmware-20240827-124.git3cff7109.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945413" comment="libertas-usb8388-olpc-firmware-20240827-124.git3cff7109.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945414" comment="linux-firmware-20240827-124.git3cff7109.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3086" version="1" class="patch">
	<metadata>
		<title>security update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7502.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7502.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944938" comment="delve-1.21.2-4.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944939" comment="go-toolset-1.21.13-1.module+el8.10.0+22329+6cd5c9c6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945472" comment="golang-1.21.13-3.module+el8.10.0+22345+acdd8d0e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945473" comment="golang-bin-1.21.13-3.module+el8.10.0+22345+acdd8d0e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945474" comment="golang-docs-1.21.13-3.module+el8.10.0+22345+acdd8d0e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945475" comment="golang-misc-1.21.13-3.module+el8.10.0+22345+acdd8d0e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945476" comment="golang-src-1.21.13-3.module+el8.10.0+22345+acdd8d0e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945477" comment="golang-tests-1.21.13-3.module+el8.10.0+22345+acdd8d0e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3087" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9403" ref_url="https://www.suse.com/security/cve/CVE-2024-9403/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7699.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7699.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9403/">CVE-2024-9403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9403">CVE-2024-9403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945818" comment="thunderbird-128.3.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3088" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945819" comment="firefox-128.3.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3089" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946421" comment="openssl-1.1.1k-14.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946422" comment="openssl-devel-1.1.1k-14.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946423" comment="openssl-libs-1.1.1k-14.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946424" comment="openssl-perl-1.1.1k-14.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3090" version="1" class="patch">
	<metadata>
		<title>security update for dotnet6.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-43483" ref_url="https://www.suse.com/security/cve/CVE-2024-43483/" source="CVE"/>
		<reference ref_id="CVE-2024-43484" ref_url="https://www.suse.com/security/cve/CVE-2024-43484/" source="CVE"/>
		<reference ref_id="CVE-2024-43485" ref_url="https://www.suse.com/security/cve/CVE-2024-43485/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7851.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7851.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43483/">CVE-2024-43483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43483">CVE-2024-43483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43484/">CVE-2024-43484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43484">CVE-2024-43484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43485/">CVE-2024-43485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43485">CVE-2024-43485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946425" comment="aspnetcore-runtime-6.0-6.0.35-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946426" comment="aspnetcore-targeting-pack-6.0-6.0.35-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946427" comment="dotnet-apphost-pack-6.0-6.0.35-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946428" comment="dotnet-hostfxr-6.0-6.0.35-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946429" comment="dotnet-runtime-6.0-6.0.35-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946430" comment="dotnet-sdk-6.0-6.0.135-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946431" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946432" comment="dotnet-targeting-pack-6.0-6.0.35-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946433" comment="dotnet-templates-6.0-6.0.135-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3091" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-38229" ref_url="https://www.suse.com/security/cve/CVE-2024-38229/" source="CVE"/>
		<reference ref_id="CVE-2024-43483" ref_url="https://www.suse.com/security/cve/CVE-2024-43483/" source="CVE"/>
		<reference ref_id="CVE-2024-43484" ref_url="https://www.suse.com/security/cve/CVE-2024-43484/" source="CVE"/>
		<reference ref_id="CVE-2024-43485" ref_url="https://www.suse.com/security/cve/CVE-2024-43485/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7868.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7868.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38229/">CVE-2024-38229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38229">CVE-2024-38229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43483/">CVE-2024-43483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43483">CVE-2024-43483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43484/">CVE-2024-43484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43484">CVE-2024-43484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43485/">CVE-2024-43485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43485">CVE-2024-43485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946434" comment="aspnetcore-runtime-8.0-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946435" comment="aspnetcore-runtime-dbg-8.0-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946436" comment="aspnetcore-targeting-pack-8.0-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946437" comment="dotnet-8.0.110-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946438" comment="dotnet-apphost-pack-8.0-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946439" comment="dotnet-host-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946440" comment="dotnet-hostfxr-8.0-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946441" comment="dotnet-runtime-8.0-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946442" comment="dotnet-runtime-dbg-8.0-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946443" comment="dotnet-sdk-8.0-8.0.110-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946444" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946445" comment="dotnet-sdk-dbg-8.0-8.0.110-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946446" comment="dotnet-targeting-pack-8.0-8.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946447" comment="dotnet-templates-8.0-8.0.110-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946448" comment="netstandard-targeting-pack-2.1-8.0.110-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3092" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7977.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7977.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947294" comment="firefox-128.3.1-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3093" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947301" comment="thunderbird-128.3.1-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3094" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8038.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8038.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947302" comment="aardvark-dns-1.10.1-2.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947303" comment="buildah-1.33.8-4.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947304" comment="buildah-tests-1.33.8-4.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947305" comment="cockpit-podman-84.1-1.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947306" comment="conmon-2.1.10-1.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947307" comment="container-selinux-2.229.0-2.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947308" comment="containernetworking-plugins-1.4.0-5.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947309" comment="containers-common-1-82.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947310" comment="crit-3.18-5.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947311" comment="criu-3.18-5.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947312" comment="criu-devel-3.18-5.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947313" comment="criu-libs-3.18-5.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947314" comment="crun-1.14.3-2.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947315" comment="fuse-overlayfs-1.13-1.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947316" comment="libslirp-4.4.0-2.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947317" comment="libslirp-devel-4.4.0-2.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947318" comment="netavark-1.10.3-1.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947319" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947320" comment="podman-4.9.4-13.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947321" comment="podman-catatonit-4.9.4-13.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947322" comment="podman-docker-4.9.4-13.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947323" comment="podman-gvproxy-4.9.4-13.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947324" comment="podman-plugins-4.9.4-13.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947325" comment="podman-remote-4.9.4-13.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947326" comment="podman-tests-4.9.4-13.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947327" comment="python3-criu-3.18-5.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947328" comment="python3-podman-4.9.0-2.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947329" comment="runc-1.1.12-5.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947330" comment="skopeo-1.14.5-3.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947331" comment="skopeo-tests-1.14.5-3.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947332" comment="slirp4netns-1.2.3-1.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947333" comment="toolbox-0.0.99.5-2.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947334" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+22346+28c02849 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947335" comment="udica-0.2.6-21.module+el8.10.0+22346+28c02849 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3095" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8117.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8117.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947853" comment="java-1.8.0-openjdk-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947854" comment="java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947855" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.432.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947856" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.432.b06-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947857" comment="java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947858" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947859" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947860" comment="java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947861" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947862" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947863" comment="java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947864" comment="java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947865" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947866" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947867" comment="java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947868" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947869" comment="java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947870" comment="java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947871" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947872" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3096" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8121.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8121.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947743" comment="java-11-openjdk-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947744" comment="java-11-openjdk-demo-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947745" comment="java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947746" comment="java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947747" comment="java-11-openjdk-devel-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947748" comment="java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947749" comment="java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947750" comment="java-11-openjdk-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947751" comment="java-11-openjdk-headless-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947752" comment="java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947753" comment="java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947754" comment="java-11-openjdk-javadoc-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947755" comment="java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947756" comment="java-11-openjdk-jmods-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947757" comment="java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947758" comment="java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947759" comment="java-11-openjdk-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947760" comment="java-11-openjdk-src-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947761" comment="java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947762" comment="java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947763" comment="java-11-openjdk-static-libs-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947764" comment="java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947765" comment="java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3097" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8124.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8124.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947873" comment="java-17-openjdk-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947874" comment="java-17-openjdk-demo-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947875" comment="java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947876" comment="java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947877" comment="java-17-openjdk-devel-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947878" comment="java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947879" comment="java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947880" comment="java-17-openjdk-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947881" comment="java-17-openjdk-headless-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947882" comment="java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947883" comment="java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947884" comment="java-17-openjdk-javadoc-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947885" comment="java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947886" comment="java-17-openjdk-jmods-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947887" comment="java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947888" comment="java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947889" comment="java-17-openjdk-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947890" comment="java-17-openjdk-src-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947891" comment="java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947892" comment="java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947893" comment="java-17-openjdk-static-libs-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947894" comment="java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947895" comment="java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3098" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948242" comment="java-21-openjdk-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948243" comment="java-21-openjdk-demo-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948244" comment="java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948245" comment="java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948246" comment="java-21-openjdk-devel-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948247" comment="java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948248" comment="java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948249" comment="java-21-openjdk-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948250" comment="java-21-openjdk-headless-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948251" comment="java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948252" comment="java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948253" comment="java-21-openjdk-javadoc-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948254" comment="java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948255" comment="java-21-openjdk-jmods-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948256" comment="java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948257" comment="java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948258" comment="java-21-openjdk-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948259" comment="java-21-openjdk-src-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948260" comment="java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948261" comment="java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948262" comment="java-21-openjdk-static-libs-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948263" comment="java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948264" comment="java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3099" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47875" ref_url="https://www.suse.com/security/cve/CVE-2024-47875/" source="CVE"/>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47875/">CVE-2024-47875 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47875">CVE-2024-47875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948416" comment="grafana-9.2.10-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948417" comment="grafana-selinux-9.2.10-20.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3100" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager-libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9050" ref_url="https://www.suse.com/security/cve/CVE-2024-9050/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8353.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8353.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9050/">CVE-2024-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9050">CVE-2024-9050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948418" comment="NetworkManager-libreswan-1.2.10-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948419" comment="NetworkManager-libreswan-gnome-1.2.10-7.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3101" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8729.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8729.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950851" comment="firefox-128.4.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3102" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8790.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8790.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951423" comment="thunderbird-128.4.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3103" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8798.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8798.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951223" comment="xorg-x11-server-Xdmx-1.20.11-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951224" comment="xorg-x11-server-Xephyr-1.20.11-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951225" comment="xorg-x11-server-Xnest-1.20.11-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951226" comment="xorg-x11-server-Xorg-1.20.11-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951227" comment="xorg-x11-server-Xvfb-1.20.11-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951228" comment="xorg-x11-server-Xwayland-21.1.3-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951229" comment="xorg-x11-server-common-1.20.11-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951230" comment="xorg-x11-server-devel-1.20.11-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951231" comment="xorg-x11-server-source-1.20.11-25.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3104" version="1" class="patch">
	<metadata>
		<title>security update for bpftrace (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2313" ref_url="https://www.suse.com/security/cve/CVE-2024-2313/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8830.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8830.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2313/">CVE-2024-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2313">CVE-2024-2313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951232" comment="bpftrace-0.16.0-6.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3105" version="1" class="patch">
	<metadata>
		<title>security update for bcc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-2314" ref_url="https://www.suse.com/security/cve/CVE-2024-2314/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8831.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8831.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2314/">CVE-2024-2314 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2314">CVE-2024-2314 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951233" comment="bcc-0.25.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951234" comment="bcc-devel-0.25.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951235" comment="bcc-doc-0.25.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951236" comment="bcc-tools-0.25.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951237" comment="python3-bcc-0.25.0-9.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3106" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-7006" ref_url="https://www.suse.com/security/cve/CVE-2024-7006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8833.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8833.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7006/">CVE-2024-7006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7006">CVE-2024-7006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951238" comment="libtiff-4.0.9-33.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951239" comment="libtiff-devel-4.0.9-33.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951240" comment="libtiff-tools-4.0.9-33.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3107" version="1" class="patch">
	<metadata>
		<title>security update for python-gevent (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-41419" ref_url="https://www.suse.com/security/cve/CVE-2023-41419/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41419/">CVE-2023-41419 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41419">CVE-2023-41419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951241" comment="python3-gevent-1.2.2-5.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3108" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8836.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8836.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951242" comment="python3.12-3.12.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951243" comment="python3.12-debug-3.12.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951244" comment="python3.12-devel-3.12.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951245" comment="python3.12-idle-3.12.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951246" comment="python3.12-libs-3.12.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951247" comment="python3.12-rpm-macros-3.12.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951248" comment="python3.12-test-3.12.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951249" comment="python3.12-tkinter-3.12.6-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3109" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951250" comment="python3.11-3.11.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951251" comment="python3.11-debug-3.11.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951252" comment="python3.11-devel-3.11.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951253" comment="python3.11-idle-3.11.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951254" comment="python3.11-libs-3.11.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951255" comment="python3.11-rpm-macros-3.11.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951256" comment="python3.11-test-3.11.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951257" comment="python3.11-tkinter-3.11.10-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3110" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951258" comment="python3.12-urllib3-1.26.19-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3111" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-urllib3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8843.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8843.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951424" comment="python3.11-urllib3-1.26.12-4.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3112" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8846.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8846.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951259" comment="aardvark-dns-1.10.1-2.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951260" comment="buildah-1.33.10-1.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951261" comment="buildah-tests-1.33.10-1.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951262" comment="cockpit-podman-84.1-1.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951263" comment="conmon-2.1.10-1.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951264" comment="container-selinux-2.229.0-2.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951265" comment="containernetworking-plugins-1.4.0-5.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951266" comment="containers-common-1-82.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951267" comment="crit-3.18-5.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951268" comment="criu-3.18-5.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951269" comment="criu-devel-3.18-5.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951270" comment="criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951271" comment="crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951272" comment="fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951273" comment="libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951274" comment="libslirp-devel-4.4.0-2.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951275" comment="netavark-1.10.3-1.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951276" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951277" comment="podman-4.9.4-15.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951278" comment="podman-catatonit-4.9.4-15.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951279" comment="podman-docker-4.9.4-15.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951280" comment="podman-gvproxy-4.9.4-15.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951281" comment="podman-plugins-4.9.4-15.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951282" comment="podman-remote-4.9.4-15.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951283" comment="podman-tests-4.9.4-15.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951284" comment="python3-criu-3.18-5.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951285" comment="python3-podman-4.9.0-2.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951286" comment="runc-1.1.12-5.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951287" comment="skopeo-1.14.5-3.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951288" comment="skopeo-tests-1.14.5-3.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951289" comment="slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951290" comment="toolbox-0.0.99.5-2.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951291" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+22397+e3c95ba6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951292" comment="udica-0.2.6-21.module+el8.10.0+22397+e3c95ba6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3113" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8847.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8847.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951293" comment="grafana-pcp-5.1.1-9.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3114" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-45539" ref_url="https://www.suse.com/security/cve/CVE-2023-45539/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8849.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8849.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45539/">CVE-2023-45539 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45539">CVE-2023-45539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951294" comment="haproxy-1.8.27-5.el8_10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3115" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48773" ref_url="https://www.suse.com/security/cve/CVE-2022-48773/" source="CVE"/>
		<reference ref_id="CVE-2022-48936" ref_url="https://www.suse.com/security/cve/CVE-2022-48936/" source="CVE"/>
		<reference ref_id="CVE-2022-50341" ref_url="https://www.suse.com/security/cve/CVE-2022-50341/" source="CVE"/>
		<reference ref_id="CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492/" source="CVE"/>
		<reference ref_id="CVE-2024-24857" ref_url="https://www.suse.com/security/cve/CVE-2024-24857/" source="CVE"/>
		<reference ref_id="CVE-2024-26851" ref_url="https://www.suse.com/security/cve/CVE-2024-26851/" source="CVE"/>
		<reference ref_id="CVE-2024-26924" ref_url="https://www.suse.com/security/cve/CVE-2024-26924/" source="CVE"/>
		<reference ref_id="CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976/" source="CVE"/>
		<reference ref_id="CVE-2024-27017" ref_url="https://www.suse.com/security/cve/CVE-2024-27017/" source="CVE"/>
		<reference ref_id="CVE-2024-27062" ref_url="https://www.suse.com/security/cve/CVE-2024-27062/" source="CVE"/>
		<reference ref_id="CVE-2024-35839" ref_url="https://www.suse.com/security/cve/CVE-2024-35839/" source="CVE"/>
		<reference ref_id="CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898/" source="CVE"/>
		<reference ref_id="CVE-2024-35939" ref_url="https://www.suse.com/security/cve/CVE-2024-35939/" source="CVE"/>
		<reference ref_id="CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586/" source="CVE"/>
		<reference ref_id="CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608/" source="CVE"/>
		<reference ref_id="CVE-2024-39503" ref_url="https://www.suse.com/security/cve/CVE-2024-39503/" source="CVE"/>
		<reference ref_id="CVE-2024-40924" ref_url="https://www.suse.com/security/cve/CVE-2024-40924/" source="CVE"/>
		<reference ref_id="CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961/" source="CVE"/>
		<reference ref_id="CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983/" source="CVE"/>
		<reference ref_id="CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41042" ref_url="https://www.suse.com/security/cve/CVE-2024-41042/" source="CVE"/>
		<reference ref_id="CVE-2024-41066" ref_url="https://www.suse.com/security/cve/CVE-2024-41066/" source="CVE"/>
		<reference ref_id="CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092/" source="CVE"/>
		<reference ref_id="CVE-2024-41093" ref_url="https://www.suse.com/security/cve/CVE-2024-41093/" source="CVE"/>
		<reference ref_id="CVE-2024-42070" ref_url="https://www.suse.com/security/cve/CVE-2024-42070/" source="CVE"/>
		<reference ref_id="CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079/" source="CVE"/>
		<reference ref_id="CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244/" source="CVE"/>
		<reference ref_id="CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284/" source="CVE"/>
		<reference ref_id="CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292/" source="CVE"/>
		<reference ref_id="CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-43880" ref_url="https://www.suse.com/security/cve/CVE-2024-43880/" source="CVE"/>
		<reference ref_id="CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889/" source="CVE"/>
		<reference ref_id="CVE-2024-43892" ref_url="https://www.suse.com/security/cve/CVE-2024-43892/" source="CVE"/>
		<reference ref_id="CVE-2024-44935" ref_url="https://www.suse.com/security/cve/CVE-2024-44935/" source="CVE"/>
		<reference ref_id="CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989/" source="CVE"/>
		<reference ref_id="CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990/" source="CVE"/>
		<reference ref_id="CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018/" source="CVE"/>
		<reference ref_id="CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679/" source="CVE"/>
		<reference ref_id="CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8856.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8856.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48773/">CVE-2022-48773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48773">CVE-2022-48773 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48936/">CVE-2022-48936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48936">CVE-2022-48936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50341/">CVE-2022-50341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50341">CVE-2022-50341 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-24857/">CVE-2024-24857 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24857">CVE-2024-24857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26851/">CVE-2024-26851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26851">CVE-2024-26851 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26924/">CVE-2024-26924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26924">CVE-2024-26924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27017/">CVE-2024-27017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27017">CVE-2024-27017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27062/">CVE-2024-27062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35839/">CVE-2024-35839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35839">CVE-2024-35839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35939/">CVE-2024-35939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39503/">CVE-2024-39503 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39503">CVE-2024-39503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40924/">CVE-2024-40924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41042/">CVE-2024-41042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41042">CVE-2024-41042 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41066/">CVE-2024-41066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41093/">CVE-2024-41093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42070/">CVE-2024-42070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43880/">CVE-2024-43880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43892/">CVE-2024-43892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44935/">CVE-2024-44935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951295" comment="bpftool-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951296" comment="kernel-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951297" comment="kernel-abi-stablelists-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951298" comment="kernel-core-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951299" comment="kernel-cross-headers-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951300" comment="kernel-debug-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951301" comment="kernel-debug-core-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951303" comment="kernel-debug-modules-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951304" comment="kernel-debug-modules-extra-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951306" comment="kernel-doc-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951307" comment="kernel-headers-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951308" comment="kernel-modules-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951309" comment="kernel-modules-extra-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951310" comment="kernel-tools-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951311" comment="kernel-tools-libs-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951313" comment="perf-4.18.0-553.27.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951314" comment="python3-perf-4.18.0-553.27.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3116" version="1" class="patch">
	<metadata>
		<title>security update for xmlrpc-c (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8859.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8859.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951315" comment="xmlrpc-c-1.51.0-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951316" comment="xmlrpc-c-c++-1.51.0-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951317" comment="xmlrpc-c-client-1.51.0-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951318" comment="xmlrpc-c-client++-1.51.0-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951319" comment="xmlrpc-c-devel-1.51.0-10.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3117" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8860.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8860.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951320" comment="krb5-devel-1.18.2-30.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951321" comment="krb5-libs-1.18.2-30.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951322" comment="krb5-pkinit-1.18.2-30.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951323" comment="krb5-server-1.18.2-30.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951324" comment="krb5-server-ldap-1.18.2-30.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951325" comment="krb5-workstation-1.18.2-30.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951326" comment="libkadm5-1.18.2-30.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3118" version="1" class="patch">
	<metadata>
		<title>security update for delve (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8876.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8876.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951327" comment="delve-1.22.1-1.module+el8.10.0+22223+9d99ca85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951328" comment="go-toolset-1.22.7-1.module+el8.10.0+22328+683b6a23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951329" comment="golang-1.22.7-1.module+el8.10.0+22325+dc584f75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951330" comment="golang-bin-1.22.7-1.module+el8.10.0+22325+dc584f75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951331" comment="golang-docs-1.22.7-1.module+el8.10.0+22325+dc584f75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951332" comment="golang-misc-1.22.7-1.module+el8.10.0+22325+dc584f75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951333" comment="golang-src-1.22.7-1.module+el8.10.0+22325+dc584f75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951334" comment="golang-tests-1.22.7-1.module+el8.10.0+22325+dc584f75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3119" version="1" class="patch">
	<metadata>
		<title>security update for bzip2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8922.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8922.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951335" comment="bzip2-1.0.6-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951336" comment="bzip2-devel-1.0.6-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951337" comment="bzip2-libs-1.0.6-27.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3120" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9056.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9056.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951959" comment="gstreamer1-plugins-base-1.16.1-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951960" comment="gstreamer1-plugins-base-devel-1.16.1-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3121" version="1" class="patch">
	<metadata>
		<title>security update for expat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9502.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9502.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952001" comment="expat-2.2.5-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952002" comment="expat-devel-2.2.5-16.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3122" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9540.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9540.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952074" comment="tigervnc-1.13.1-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952075" comment="tigervnc-icons-1.13.1-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952076" comment="tigervnc-license-1.13.1-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952077" comment="tigervnc-selinux-1.13.1-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952078" comment="tigervnc-server-1.13.1-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952079" comment="tigervnc-server-minimal-1.13.1-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952080" comment="tigervnc-server-module-1.13.1-14.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3123" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530/" source="CVE"/>
		<reference ref_id="CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9573.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9573.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953520" comment="libsoup-2.62.3-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953521" comment="libsoup-devel-2.62.3-6.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3124" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-42950" ref_url="https://www.suse.com/security/cve/CVE-2023-42950/" source="CVE"/>
		<reference ref_id="CVE-2024-23271" ref_url="https://www.suse.com/security/cve/CVE-2024-23271/" source="CVE"/>
		<reference ref_id="CVE-2024-27820" ref_url="https://www.suse.com/security/cve/CVE-2024-27820/" source="CVE"/>
		<reference ref_id="CVE-2024-27834" ref_url="https://www.suse.com/security/cve/CVE-2024-27834/" source="CVE"/>
		<reference ref_id="CVE-2024-27838" ref_url="https://www.suse.com/security/cve/CVE-2024-27838/" source="CVE"/>
		<reference ref_id="CVE-2024-27851" ref_url="https://www.suse.com/security/cve/CVE-2024-27851/" source="CVE"/>
		<reference ref_id="CVE-2024-27856" ref_url="https://www.suse.com/security/cve/CVE-2024-27856/" source="CVE"/>
		<reference ref_id="CVE-2024-40779" ref_url="https://www.suse.com/security/cve/CVE-2024-40779/" source="CVE"/>
		<reference ref_id="CVE-2024-40780" ref_url="https://www.suse.com/security/cve/CVE-2024-40780/" source="CVE"/>
		<reference ref_id="CVE-2024-40782" ref_url="https://www.suse.com/security/cve/CVE-2024-40782/" source="CVE"/>
		<reference ref_id="CVE-2024-40789" ref_url="https://www.suse.com/security/cve/CVE-2024-40789/" source="CVE"/>
		<reference ref_id="CVE-2024-40866" ref_url="https://www.suse.com/security/cve/CVE-2024-40866/" source="CVE"/>
		<reference ref_id="CVE-2024-44185" ref_url="https://www.suse.com/security/cve/CVE-2024-44185/" source="CVE"/>
		<reference ref_id="CVE-2024-44187" ref_url="https://www.suse.com/security/cve/CVE-2024-44187/" source="CVE"/>
		<reference ref_id="CVE-2024-44244" ref_url="https://www.suse.com/security/cve/CVE-2024-44244/" source="CVE"/>
		<reference ref_id="CVE-2024-44296" ref_url="https://www.suse.com/security/cve/CVE-2024-44296/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<reference ref_id="CVE-2024-54534" ref_url="https://www.suse.com/security/cve/CVE-2024-54534/" source="CVE"/>
		<reference ref_id="CVE-2024-54658" ref_url="https://www.suse.com/security/cve/CVE-2024-54658/" source="CVE"/>
		<reference ref_id="CVE-2025-43480" ref_url="https://www.suse.com/security/cve/CVE-2025-43480/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9636.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9636.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42950/">CVE-2023-42950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42950">CVE-2023-42950 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-23271/">CVE-2024-23271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23271">CVE-2024-23271 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27820/">CVE-2024-27820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27820">CVE-2024-27820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27834/">CVE-2024-27834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27834">CVE-2024-27834 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27838/">CVE-2024-27838 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27838">CVE-2024-27838 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27851/">CVE-2024-27851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27851">CVE-2024-27851 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-27856/">CVE-2024-27856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27856">CVE-2024-27856 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40779/">CVE-2024-40779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40779">CVE-2024-40779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40780/">CVE-2024-40780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40780">CVE-2024-40780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40782/">CVE-2024-40782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40782">CVE-2024-40782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40789/">CVE-2024-40789 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40789">CVE-2024-40789 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-40866/">CVE-2024-40866 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40866">CVE-2024-40866 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44185/">CVE-2024-44185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44185">CVE-2024-44185 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44187/">CVE-2024-44187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44187">CVE-2024-44187 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44244/">CVE-2024-44244 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44244">CVE-2024-44244 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44296/">CVE-2024-44296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44296">CVE-2024-44296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54534/">CVE-2024-54534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54534">CVE-2024-54534 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54658/">CVE-2024-54658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54658">CVE-2024-54658 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43480/">CVE-2025-43480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43480">CVE-2025-43480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952385" comment="webkit2gtk3-2.46.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952386" comment="webkit2gtk3-devel-2.46.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952387" comment="webkit2gtk3-jsc-2.46.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952388" comment="webkit2gtk3-jsc-devel-2.46.3-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3125" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-23638" ref_url="https://www.suse.com/security/cve/CVE-2024-23638/" source="CVE"/>
		<reference ref_id="CVE-2024-45802" ref_url="https://www.suse.com/security/cve/CVE-2024-45802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9644.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9644.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23638/">CVE-2024-23638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23638">CVE-2024-23638 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45802/">CVE-2024-45802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45802">CVE-2024-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850254" comment="libecap-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850255" comment="libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955014" comment="squid-4.15-10.module+el8.10.0+22489+b920747d.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3126" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2018-12699" ref_url="https://www.suse.com/security/cve/CVE-2018-12699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9689.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9689.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12699/">CVE-2018-12699 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12699">CVE-2018-12699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952389" comment="binutils-2.30-125.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952390" comment="binutils-devel-2.30-125.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3127" version="1" class="patch">
	<metadata>
		<title>security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0012.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0012.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959053" comment="python3-requests-2.20.0-5.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3128" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-54296" ref_url="https://www.suse.com/security/cve/CVE-2023-54296/" source="CVE"/>
		<reference ref_id="CVE-2024-53088" ref_url="https://www.suse.com/security/cve/CVE-2024-53088/" source="CVE"/>
		<reference ref_id="CVE-2024-53122" ref_url="https://www.suse.com/security/cve/CVE-2024-53122/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0065.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0065.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54296/">CVE-2023-54296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54296">CVE-2023-54296 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53088/">CVE-2024-53088 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53122/">CVE-2024-53122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53122">CVE-2024-53122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959302" comment="bpftool-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959303" comment="kernel-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959304" comment="kernel-abi-stablelists-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959305" comment="kernel-core-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959306" comment="kernel-cross-headers-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959307" comment="kernel-debug-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959308" comment="kernel-debug-core-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959310" comment="kernel-debug-modules-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959311" comment="kernel-debug-modules-extra-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959313" comment="kernel-doc-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959314" comment="kernel-headers-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959315" comment="kernel-modules-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959316" comment="kernel-modules-extra-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959317" comment="kernel-tools-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959318" comment="kernel-tools-libs-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959320" comment="perf-4.18.0-553.34.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959321" comment="python3-perf-4.18.0-553.34.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3129" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959704" comment="cups-2.2.6-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959705" comment="cups-client-2.2.6-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959706" comment="cups-devel-2.2.6-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959707" comment="cups-filesystem-2.2.6-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959708" comment="cups-ipptool-2.2.6-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959709" comment="cups-libs-2.2.6-62.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959710" comment="cups-lpd-2.2.6-62.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3130" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0144.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0144.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960004" comment="firefox-128.6.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3131" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-54479" ref_url="https://www.suse.com/security/cve/CVE-2024-54479/" source="CVE"/>
		<reference ref_id="CVE-2024-54502" ref_url="https://www.suse.com/security/cve/CVE-2024-54502/" source="CVE"/>
		<reference ref_id="CVE-2024-54505" ref_url="https://www.suse.com/security/cve/CVE-2024-54505/" source="CVE"/>
		<reference ref_id="CVE-2024-54508" ref_url="https://www.suse.com/security/cve/CVE-2024-54508/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54479/">CVE-2024-54479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54479">CVE-2024-54479 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54502/">CVE-2024-54502 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54502">CVE-2024-54502 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54505/">CVE-2024-54505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54505">CVE-2024-54505 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54508/">CVE-2024-54508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54508">CVE-2024-54508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959711" comment="webkit2gtk3-2.46.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959712" comment="webkit2gtk3-devel-2.46.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959713" comment="webkit2gtk3-jsc-2.46.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959714" comment="webkit2gtk3-jsc-devel-2.46.5-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3132" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-53580" ref_url="https://www.suse.com/security/cve/CVE-2024-53580/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0168.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0168.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53580/">CVE-2024-53580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53580">CVE-2024-53580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959715" comment="iperf3-3.5-11.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3133" version="1" class="patch">
	<metadata>
		<title>security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11614" ref_url="https://www.suse.com/security/cve/CVE-2024-11614/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0222.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0222.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11614/">CVE-2024-11614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11614">CVE-2024-11614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959716" comment="dpdk-23.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959717" comment="dpdk-devel-23.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959718" comment="dpdk-doc-23.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959719" comment="dpdk-tools-23.11-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3134" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237/" source="CVE"/>
		<reference ref_id="CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238/" source="CVE"/>
		<reference ref_id="CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239/" source="CVE"/>
		<reference ref_id="CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240/" source="CVE"/>
		<reference ref_id="CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241/" source="CVE"/>
		<reference ref_id="CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242/" source="CVE"/>
		<reference ref_id="CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960123" comment="thunderbird-128.6.0-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3135" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-3661" ref_url="https://www.suse.com/security/cve/CVE-2024-3661/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0288.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0288.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3661/">CVE-2024-3661 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3661">CVE-2024-3661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960069" comment="NetworkManager-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960070" comment="NetworkManager-adsl-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960071" comment="NetworkManager-bluetooth-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960072" comment="NetworkManager-cloud-setup-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960073" comment="NetworkManager-config-connectivity-suse-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960074" comment="NetworkManager-config-server-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960075" comment="NetworkManager-dispatcher-routing-rules-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960076" comment="NetworkManager-initscripts-updown-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960077" comment="NetworkManager-libnm-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960078" comment="NetworkManager-libnm-devel-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960079" comment="NetworkManager-ovs-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960080" comment="NetworkManager-ppp-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960081" comment="NetworkManager-team-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960082" comment="NetworkManager-tui-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960083" comment="NetworkManager-wifi-1.40.16-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960084" comment="NetworkManager-wwan-1.40.16-18.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3136" version="1" class="patch">
	<metadata>
		<title>security update for raptor2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-57823" ref_url="https://www.suse.com/security/cve/CVE-2024-57823/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0314.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0314.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57823/">CVE-2024-57823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57823">CVE-2024-57823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960340" comment="raptor2-2.0.15-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960341" comment="raptor2-devel-2.0.15-17.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3137" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-12085" ref_url="https://www.suse.com/security/cve/CVE-2024-12085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0325.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0325.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12085/">CVE-2024-12085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960342" comment="rsync-3.1.3-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960343" comment="rsync-daemon-3.1.3-20.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3138" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11831" ref_url="https://www.suse.com/security/cve/CVE-2024-11831/" source="CVE"/>
		<reference ref_id="CVE-2025-21172" ref_url="https://www.suse.com/security/cve/CVE-2025-21172/" source="CVE"/>
		<reference ref_id="CVE-2025-21173" ref_url="https://www.suse.com/security/cve/CVE-2025-21173/" source="CVE"/>
		<reference ref_id="CVE-2025-21176" ref_url="https://www.suse.com/security/cve/CVE-2025-21176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0381.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0381.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11831/">CVE-2024-11831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11831">CVE-2024-11831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21172/">CVE-2025-21172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21172">CVE-2025-21172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21173/">CVE-2025-21173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21173">CVE-2025-21173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21176/">CVE-2025-21176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21176">CVE-2025-21176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961327" comment="aspnetcore-runtime-8.0-8.0.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961328" comment="aspnetcore-runtime-dbg-8.0-8.0.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961329" comment="aspnetcore-targeting-pack-8.0-8.0.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961330" comment="dotnet-apphost-pack-8.0-8.0.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961331" comment="dotnet-hostfxr-8.0-8.0.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961332" comment="dotnet-runtime-8.0-8.0.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961333" comment="dotnet-runtime-dbg-8.0-8.0.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961334" comment="dotnet-sdk-8.0-8.0.112-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960789" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.112-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961335" comment="dotnet-sdk-dbg-8.0-8.0.112-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961336" comment="dotnet-targeting-pack-8.0-8.0.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961337" comment="dotnet-templates-8.0-8.0.112-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3139" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21171" ref_url="https://www.suse.com/security/cve/CVE-2025-21171/" source="CVE"/>
		<reference ref_id="CVE-2025-21172" ref_url="https://www.suse.com/security/cve/CVE-2025-21172/" source="CVE"/>
		<reference ref_id="CVE-2025-21173" ref_url="https://www.suse.com/security/cve/CVE-2025-21173/" source="CVE"/>
		<reference ref_id="CVE-2025-21176" ref_url="https://www.suse.com/security/cve/CVE-2025-21176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0382.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0382.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21171/">CVE-2025-21171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21171">CVE-2025-21171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21172/">CVE-2025-21172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21172">CVE-2025-21172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21173/">CVE-2025-21173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21173">CVE-2025-21173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21176/">CVE-2025-21176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21176">CVE-2025-21176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961338" comment="aspnetcore-runtime-9.0-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961339" comment="aspnetcore-runtime-dbg-9.0-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961340" comment="aspnetcore-targeting-pack-9.0-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961341" comment="dotnet-9.0.102-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961342" comment="dotnet-apphost-pack-9.0-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961343" comment="dotnet-host-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961344" comment="dotnet-hostfxr-9.0-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961345" comment="dotnet-runtime-9.0-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961346" comment="dotnet-runtime-dbg-9.0-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961347" comment="dotnet-sdk-9.0-9.0.102-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960790" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.102-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961348" comment="dotnet-sdk-aot-9.0-9.0.102-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961349" comment="dotnet-sdk-dbg-9.0-9.0.102-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961350" comment="dotnet-targeting-pack-9.0-9.0.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961351" comment="dotnet-templates-9.0-9.0.102-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961352" comment="netstandard-targeting-pack-2.1-9.0.102-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3140" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613/" source="CVE"/>
		<reference ref_id="CVE-2025-21614" ref_url="https://www.suse.com/security/cve/CVE-2025-21614/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0401.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0401.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21614/">CVE-2025-21614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21614">CVE-2025-21614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961353" comment="grafana-9.2.10-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961354" comment="grafana-selinux-9.2.10-21.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3141" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961355" comment="java-17-openjdk-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961356" comment="java-17-openjdk-demo-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961357" comment="java-17-openjdk-demo-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961358" comment="java-17-openjdk-demo-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961359" comment="java-17-openjdk-devel-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961360" comment="java-17-openjdk-devel-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961361" comment="java-17-openjdk-devel-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961362" comment="java-17-openjdk-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961363" comment="java-17-openjdk-headless-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961364" comment="java-17-openjdk-headless-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961365" comment="java-17-openjdk-headless-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961366" comment="java-17-openjdk-javadoc-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961367" comment="java-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961368" comment="java-17-openjdk-jmods-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961369" comment="java-17-openjdk-jmods-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961370" comment="java-17-openjdk-jmods-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961371" comment="java-17-openjdk-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961372" comment="java-17-openjdk-src-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961373" comment="java-17-openjdk-src-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961374" comment="java-17-openjdk-src-slowdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961375" comment="java-17-openjdk-static-libs-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961376" comment="java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961377" comment="java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3142" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0426.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0426.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961378" comment="java-21-openjdk-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961379" comment="java-21-openjdk-demo-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961380" comment="java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961381" comment="java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961382" comment="java-21-openjdk-devel-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961383" comment="java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961384" comment="java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961385" comment="java-21-openjdk-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961386" comment="java-21-openjdk-headless-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961387" comment="java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961388" comment="java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961389" comment="java-21-openjdk-javadoc-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961390" comment="java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961391" comment="java-21-openjdk-jmods-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961392" comment="java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961393" comment="java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961394" comment="java-21-openjdk-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961395" comment="java-21-openjdk-src-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961396" comment="java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961397" comment="java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961398" comment="java-21-openjdk-static-libs-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961399" comment="java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961400" comment="java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3143" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-24834" ref_url="https://www.suse.com/security/cve/CVE-2022-24834/" source="CVE"/>
		<reference ref_id="CVE-2022-35977" ref_url="https://www.suse.com/security/cve/CVE-2022-35977/" source="CVE"/>
		<reference ref_id="CVE-2022-36021" ref_url="https://www.suse.com/security/cve/CVE-2022-36021/" source="CVE"/>
		<reference ref_id="CVE-2023-22458" ref_url="https://www.suse.com/security/cve/CVE-2023-22458/" source="CVE"/>
		<reference ref_id="CVE-2023-25155" ref_url="https://www.suse.com/security/cve/CVE-2023-25155/" source="CVE"/>
		<reference ref_id="CVE-2023-28856" ref_url="https://www.suse.com/security/cve/CVE-2023-28856/" source="CVE"/>
		<reference ref_id="CVE-2023-45145" ref_url="https://www.suse.com/security/cve/CVE-2023-45145/" source="CVE"/>
		<reference ref_id="CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228/" source="CVE"/>
		<reference ref_id="CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449/" source="CVE"/>
		<reference ref_id="CVE-2024-46981" ref_url="https://www.suse.com/security/cve/CVE-2024-46981/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24834/">CVE-2022-24834 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35977/">CVE-2022-35977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35977">CVE-2022-35977 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36021/">CVE-2022-36021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36021">CVE-2022-36021 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22458/">CVE-2023-22458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22458">CVE-2023-22458 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-25155/">CVE-2023-25155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25155">CVE-2023-25155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28856/">CVE-2023-28856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28856">CVE-2023-28856 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45145/">CVE-2023-45145 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45145">CVE-2023-45145 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46981/">CVE-2024-46981 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46981">CVE-2024-46981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961401" comment="redis-6.2.17-1.module+el8.10.0+22680+748527fd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961402" comment="redis-devel-6.2.17-1.module+el8.10.0+22680+748527fd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961403" comment="redis-doc-6.2.17-1.module+el8.10.0+22680+748527fd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3144" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0711.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0711.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962039" comment="python3-jinja2-2.10.1-6.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3145" version="1" class="patch">
	<metadata>
		<title>security update for bzip2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0733.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0733.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961529" comment="bzip2-1.0.6-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961530" comment="bzip2-devel-1.0.6-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961531" comment="bzip2-libs-1.0.6-28.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3146" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-21096" ref_url="https://www.suse.com/security/cve/CVE-2024-21096/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0737.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0737.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-21096/">CVE-2024-21096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21096">CVE-2024-21096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962580" comment="Judy-1.0.5-18.module+el8.10.0+21221+7bee72c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962581" comment="galera-26.4.20-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962582" comment="mariadb-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962583" comment="mariadb-backup-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962584" comment="mariadb-common-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962585" comment="mariadb-devel-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962586" comment="mariadb-embedded-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962587" comment="mariadb-embedded-devel-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962588" comment="mariadb-errmsg-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962589" comment="mariadb-gssapi-server-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962590" comment="mariadb-oqgraph-engine-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962591" comment="mariadb-pam-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962592" comment="mariadb-server-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962593" comment="mariadb-server-galera-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962594" comment="mariadb-server-utils-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962595" comment="mariadb-test-10.11.10-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3147" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-22084" ref_url="https://www.suse.com/security/cve/CVE-2023-22084/" source="CVE"/>
		<reference ref_id="CVE-2024-21096" ref_url="https://www.suse.com/security/cve/CVE-2024-21096/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0739.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0739.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22084/">CVE-2023-22084 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22084">CVE-2023-22084 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-21096/">CVE-2024-21096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21096">CVE-2024-21096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020747" comment="Judy-1.0.5-18.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020748" comment="galera-26.4.20-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020749" comment="mariadb-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020750" comment="mariadb-backup-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020751" comment="mariadb-common-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020752" comment="mariadb-devel-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020753" comment="mariadb-embedded-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020754" comment="mariadb-embedded-devel-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020755" comment="mariadb-errmsg-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020756" comment="mariadb-gssapi-server-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020757" comment="mariadb-oqgraph-engine-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020758" comment="mariadb-pam-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020759" comment="mariadb-server-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020760" comment="mariadb-server-galera-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020761" comment="mariadb-server-utils-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020762" comment="mariadb-test-10.5.27-1.module+el8.10.0+22630+cacda3f1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3148" version="1" class="patch">
	<metadata>
		<title>security update for keepalived (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-41184" ref_url="https://www.suse.com/security/cve/CVE-2024-41184/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0743.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0743.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41184/">CVE-2024-41184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41184">CVE-2024-41184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961532" comment="keepalived-2.1.5-10.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3149" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-44442" ref_url="https://www.suse.com/security/cve/CVE-2023-44442/" source="CVE"/>
		<reference ref_id="CVE-2023-44443" ref_url="https://www.suse.com/security/cve/CVE-2023-44443/" source="CVE"/>
		<reference ref_id="CVE-2023-44444" ref_url="https://www.suse.com/security/cve/CVE-2023-44444/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0746.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0746.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44442/">CVE-2023-44442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44442">CVE-2023-44442 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44443/">CVE-2023-44443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44443">CVE-2023-44443 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-44444/">CVE-2023-44444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44444">CVE-2023-44444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962040" comment="gimp-2.8.22-26.module+el8.10.0+22678+3f0023d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962041" comment="gimp-devel-2.8.22-26.module+el8.10.0+22678+3f0023d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962042" comment="gimp-devel-tools-2.8.22-26.module+el8.10.0+22678+3f0023d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962043" comment="gimp-libs-2.8.22-26.module+el8.10.0+22678+3f0023d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962044" comment="pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962045" comment="pygobject2-codegen-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962046" comment="pygobject2-devel-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962047" comment="pygobject2-doc-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962048" comment="pygtk2-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962049" comment="pygtk2-codegen-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962050" comment="pygtk2-devel-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962051" comment="pygtk2-doc-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962052" comment="python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962053" comment="python2-cairo-devel-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3150" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-1488" ref_url="https://www.suse.com/security/cve/CVE-2024-1488/" source="CVE"/>
		<reference ref_id="CVE-2024-8508" ref_url="https://www.suse.com/security/cve/CVE-2024-8508/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1488/">CVE-2024-1488 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1488">CVE-2024-1488 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-8508/">CVE-2024-8508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8508">CVE-2024-8508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962054" comment="python3-unbound-1.16.2-5.8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962055" comment="unbound-1.16.2-5.8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962056" comment="unbound-devel-1.16.2-5.8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962057" comment="unbound-libs-1.16.2-5.8.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3151" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962058" comment="libsoup-2.62.3-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962059" comment="libsoup-devel-2.62.3-7.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3152" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-53263" ref_url="https://www.suse.com/security/cve/CVE-2024-53263/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0845.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0845.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53263/">CVE-2024-53263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53263">CVE-2024-53263 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962060" comment="git-lfs-3.4.1-4.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3153" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10026.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10026.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009997434" comment="python3.11-3.11.13-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997435" comment="python3.11-debug-3.11.13-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997436" comment="python3.11-devel-3.11.13-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997437" comment="python3.11-idle-3.11.13-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997438" comment="python3.11-libs-3.11.13-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997439" comment="python3.11-rpm-macros-3.11.13-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997440" comment="python3.11-test-3.11.13-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997441" comment="python3.11-tkinter-3.11.13-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3154" version="1" class="patch">
	<metadata>
		<title>security update for pam (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10027.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10027.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998036" comment="pam-1.3.1-37.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998037" comment="pam-devel-1.3.1-37.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3155" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10031.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10031.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998038" comment="python3.12-3.12.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998039" comment="python3.12-debug-3.12.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998040" comment="python3.12-devel-3.12.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998041" comment="python3.12-idle-3.12.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998042" comment="python3.12-libs-3.12.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998043" comment="python3.12-rpm-macros-3.12.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998044" comment="python3.12-test-3.12.11-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998045" comment="python3.12-tkinter-3.12.11-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3156" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10074.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10074.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998046" comment="firefox-128.12.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3157" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-32462" ref_url="https://www.suse.com/security/cve/CVE-2025-32462/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32462/">CVE-2025-32462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32462">CVE-2025-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998047" comment="sudo-1.9.5p2-1.el8_10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3158" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998048" comment="platform-python-3.6.8-70.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998049" comment="platform-python-debug-3.6.8-70.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998050" comment="platform-python-devel-3.6.8-70.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998051" comment="python3-idle-3.6.8-70.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998052" comment="python3-libs-3.6.8-70.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998053" comment="python3-test-3.6.8-70.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998054" comment="python3-tkinter-3.6.8-70.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3159" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-25186" ref_url="https://www.suse.com/security/cve/CVE-2025-25186/" source="CVE"/>
		<reference ref_id="CVE-2025-27219" ref_url="https://www.suse.com/security/cve/CVE-2025-27219/" source="CVE"/>
		<reference ref_id="CVE-2025-27221" ref_url="https://www.suse.com/security/cve/CVE-2025-27221/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10217.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10217.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25186/">CVE-2025-25186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25186">CVE-2025-25186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27219/">CVE-2025-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27219">CVE-2025-27219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27221/">CVE-2025-27221 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27221">CVE-2025-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998144" comment="ruby-3.3.8-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998145" comment="ruby-bundled-gems-3.3.8-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998146" comment="ruby-default-gems-3.3.8-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998147" comment="ruby-devel-3.3.8-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998148" comment="ruby-doc-3.3.8-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998149" comment="ruby-libs-3.3.8-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874625" comment="rubygem-abrt-0.4.0-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874626" comment="rubygem-abrt-doc-0.4.0-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998150" comment="rubygem-bigdecimal-3.1.5-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998151" comment="rubygem-bundler-2.5.22-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998152" comment="rubygem-io-console-0.7.1-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998153" comment="rubygem-irb-1.13.1-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998154" comment="rubygem-json-2.7.2-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998155" comment="rubygem-minitest-5.20.0-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874633" comment="rubygem-mysql2-0.5.5-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874634" comment="rubygem-mysql2-doc-0.5.5-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874635" comment="rubygem-pg-1.5.4-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874636" comment="rubygem-pg-doc-1.5.4-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998156" comment="rubygem-power_assert-2.0.3-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998157" comment="rubygem-psych-5.1.2-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998158" comment="rubygem-racc-1.7.3-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998159" comment="rubygem-rake-13.1.0-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998160" comment="rubygem-rbs-3.4.0-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998161" comment="rubygem-rdoc-6.6.3.1-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998162" comment="rubygem-rexml-3.3.9-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998163" comment="rubygem-rss-0.3.1-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998164" comment="rubygem-test-unit-3.6.1-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998165" comment="rubygem-typeprof-0.21.9-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998166" comment="rubygems-3.5.22-4.module+el8.10.0+23024+a87ba659 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998167" comment="rubygems-devel-3.5.22-4.module+el8.10.0+23024+a87ba659 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3160" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-5986" ref_url="https://www.suse.com/security/cve/CVE-2025-5986/" source="CVE"/>
		<reference ref_id="CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424/" source="CVE"/>
		<reference ref_id="CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425/" source="CVE"/>
		<reference ref_id="CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429/" source="CVE"/>
		<reference ref_id="CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10246.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10246.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-5986/">CVE-2025-5986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5986">CVE-2025-5986 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999181" comment="thunderbird-128.12.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3161" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10551.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10551.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999355" comment="aardvark-dns-1.10.1-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999356" comment="buildah-1.33.12-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999357" comment="buildah-tests-1.33.12-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999358" comment="cockpit-podman-84.1-1.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999359" comment="conmon-2.1.10-1.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999360" comment="container-selinux-2.229.0-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999361" comment="containernetworking-plugins-1.4.0-6.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999362" comment="containers-common-1-82.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999363" comment="crit-3.18-5.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999364" comment="criu-3.18-5.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999365" comment="criu-devel-3.18-5.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999366" comment="criu-libs-3.18-5.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999367" comment="crun-1.14.3-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999368" comment="fuse-overlayfs-1.13-1.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999369" comment="libslirp-4.4.0-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999370" comment="libslirp-devel-4.4.0-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999371" comment="netavark-1.10.3-1.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999372" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999373" comment="podman-4.9.4-22.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999374" comment="podman-catatonit-4.9.4-22.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999375" comment="podman-docker-4.9.4-22.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999376" comment="podman-gvproxy-4.9.4-22.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999377" comment="podman-plugins-4.9.4-22.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999378" comment="podman-remote-4.9.4-22.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999379" comment="podman-tests-4.9.4-22.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999380" comment="python3-criu-3.18-5.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999381" comment="python3-podman-4.9.0-3.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999382" comment="runc-1.1.12-6.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999383" comment="skopeo-1.14.5-4.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999384" comment="skopeo-tests-1.14.5-4.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999385" comment="slirp4netns-1.2.3-1.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999386" comment="toolbox-0.0.99.5-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999387" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+23320+f7205097 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999388" comment="udica-0.2.6-21.module+el8.10.0+23320+f7205097 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3162" version="1" class="patch">
	<metadata>
		<title>security update for jq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-23337" ref_url="https://www.suse.com/security/cve/CVE-2024-23337/" source="CVE"/>
		<reference ref_id="CVE-2025-48060" ref_url="https://www.suse.com/security/cve/CVE-2025-48060/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10618.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10618.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23337/">CVE-2024-23337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23337">CVE-2024-23337 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48060/">CVE-2025-48060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48060">CVE-2025-48060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999389" comment="jq-1.6-11.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999390" comment="jq-devel-1.6-11.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3163" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-49111" ref_url="https://www.suse.com/security/cve/CVE-2022-49111/" source="CVE"/>
		<reference ref_id="CVE-2022-49136" ref_url="https://www.suse.com/security/cve/CVE-2022-49136/" source="CVE"/>
		<reference ref_id="CVE-2022-49846" ref_url="https://www.suse.com/security/cve/CVE-2022-49846/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10669.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10669.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49111/">CVE-2022-49111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49111">CVE-2022-49111 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49136/">CVE-2022-49136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49136">CVE-2022-49136 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49846/">CVE-2022-49846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49846">CVE-2022-49846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999391" comment="bpftool-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999392" comment="kernel-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999393" comment="kernel-abi-stablelists-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999394" comment="kernel-core-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999395" comment="kernel-cross-headers-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999396" comment="kernel-debug-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999397" comment="kernel-debug-core-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999399" comment="kernel-debug-modules-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999400" comment="kernel-debug-modules-extra-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999402" comment="kernel-doc-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999403" comment="kernel-headers-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999404" comment="kernel-modules-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999405" comment="kernel-modules-extra-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999406" comment="kernel-tools-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999407" comment="kernel-tools-libs-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999409" comment="perf-4.18.0-553.60.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999410" comment="python3-perf-4.18.0-553.60.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3164" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4673" ref_url="https://www.suse.com/security/cve/CVE-2025-4673/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10672.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10672.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4673/">CVE-2025-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4673">CVE-2025-4673 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974974" comment="delve-1.24.1-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999411" comment="go-toolset-1.24.4-1.module+el8.10.0+23323+67916f33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999412" comment="golang-1.24.4-1.module+el8.10.0+23323+67916f33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999413" comment="golang-bin-1.24.4-1.module+el8.10.0+23323+67916f33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999414" comment="golang-docs-1.24.4-1.module+el8.10.0+23323+67916f33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999415" comment="golang-misc-1.24.4-1.module+el8.10.0+23323+67916f33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999416" comment="golang-src-1.24.4-1.module+el8.10.0+23323+67916f33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999417" comment="golang-tests-1.24.4-1.module+el8.10.0+23323+67916f33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3165" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-50275" ref_url="https://www.suse.com/security/cve/CVE-2024-50275/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1068.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1068.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50275/">CVE-2024-50275 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50275">CVE-2024-50275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962650" comment="bpftool-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962651" comment="kernel-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962652" comment="kernel-abi-stablelists-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962653" comment="kernel-core-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962654" comment="kernel-cross-headers-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962655" comment="kernel-debug-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962656" comment="kernel-debug-core-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962658" comment="kernel-debug-modules-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962659" comment="kernel-debug-modules-extra-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962661" comment="kernel-doc-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962662" comment="kernel-headers-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962663" comment="kernel-modules-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962664" comment="kernel-modules-extra-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962665" comment="kernel-tools-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962666" comment="kernel-tools-libs-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962668" comment="perf-4.18.0-553.37.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962669" comment="python3-perf-4.18.0-553.37.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3166" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-49794" ref_url="https://www.suse.com/security/cve/CVE-2025-49794/" source="CVE"/>
		<reference ref_id="CVE-2025-49796" ref_url="https://www.suse.com/security/cve/CVE-2025-49796/" source="CVE"/>
		<reference ref_id="CVE-2025-6021" ref_url="https://www.suse.com/security/cve/CVE-2025-6021/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10698.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10698.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49794/">CVE-2025-49794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49794">CVE-2025-49794 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-49796/">CVE-2025-49796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49796">CVE-2025-49796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6021/">CVE-2025-6021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6021">CVE-2025-6021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999580" comment="libxml2-2.9.7-21.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999581" comment="libxml2-devel-2.9.7-21.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999582" comment="python3-libxml2-2.9.7-21.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3167" version="1" class="patch">
	<metadata>
		<title>security update for gnome-remote-desktop (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-5024" ref_url="https://www.suse.com/security/cve/CVE-2025-5024/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10742.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10742.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-5024/">CVE-2025-5024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5024">CVE-2025-5024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999583" comment="gnome-remote-desktop-0.1.8-4.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3168" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10862.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10862.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008294" comment="java-1.8.0-openjdk-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008295" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008296" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.462.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008297" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.462.b08-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008298" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008299" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008300" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008301" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008302" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008303" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008304" comment="java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008305" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008306" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008307" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008308" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008309" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008310" comment="java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008311" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008312" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008313" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3169" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10865.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10865.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011414" comment="java-11-openjdk-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011415" comment="java-11-openjdk-demo-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011169" comment="java-11-openjdk-demo-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011170" comment="java-11-openjdk-demo-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011416" comment="java-11-openjdk-devel-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011173" comment="java-11-openjdk-devel-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011174" comment="java-11-openjdk-devel-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011175" comment="java-11-openjdk-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011417" comment="java-11-openjdk-headless-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011178" comment="java-11-openjdk-headless-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011179" comment="java-11-openjdk-headless-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011418" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011419" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011420" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011186" comment="java-11-openjdk-jmods-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011187" comment="java-11-openjdk-jmods-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011188" comment="java-11-openjdk-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011421" comment="java-11-openjdk-src-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011191" comment="java-11-openjdk-src-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011192" comment="java-11-openjdk-src-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011422" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011195" comment="java-11-openjdk-static-libs-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011196" comment="java-11-openjdk-static-libs-slowdebug-11.0.28.0.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3170" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10867.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10867.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007998" comment="java-17-openjdk-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007999" comment="java-17-openjdk-demo-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008000" comment="java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008001" comment="java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008002" comment="java-17-openjdk-devel-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008003" comment="java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008004" comment="java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008005" comment="java-17-openjdk-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008006" comment="java-17-openjdk-headless-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008007" comment="java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008008" comment="java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008009" comment="java-17-openjdk-javadoc-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008010" comment="java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008011" comment="java-17-openjdk-jmods-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008012" comment="java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008013" comment="java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008014" comment="java-17-openjdk-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008015" comment="java-17-openjdk-src-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008016" comment="java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008017" comment="java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008018" comment="java-17-openjdk-static-libs-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008019" comment="java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008020" comment="java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3171" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10873.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10873.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022816" comment="java-21-openjdk-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022817" comment="java-21-openjdk-demo-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022818" comment="java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022819" comment="java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022820" comment="java-21-openjdk-devel-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022821" comment="java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022822" comment="java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022823" comment="java-21-openjdk-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022824" comment="java-21-openjdk-headless-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022825" comment="java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022826" comment="java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022827" comment="java-21-openjdk-javadoc-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022828" comment="java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022829" comment="java-21-openjdk-jmods-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022830" comment="java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022831" comment="java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022832" comment="java-21-openjdk-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022833" comment="java-21-openjdk-src-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022834" comment="java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022835" comment="java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022836" comment="java-21-openjdk-static-libs-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022837" comment="java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022838" comment="java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3172" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420/" source="CVE"/>
		<reference ref_id="CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332/" source="CVE"/>
		<reference ref_id="CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012/" source="CVE"/>
		<reference ref_id="CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623/" source="CVE"/>
		<reference ref_id="CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10991.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10991.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006277" comment="microcode_ctl-20250512-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3173" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-53920" ref_url="https://www.suse.com/security/cve/CVE-2024-53920/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11030.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11030.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53920/">CVE-2024-53920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53920">CVE-2024-53920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006278" comment="emacs-26.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006279" comment="emacs-common-26.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006280" comment="emacs-filesystem-26.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006281" comment="emacs-lucid-26.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006282" comment="emacs-nox-26.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006283" comment="emacs-terminal-26.1-15.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3174" version="1" class="patch">
	<metadata>
		<title>security update for lz4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-17543" ref_url="https://www.suse.com/security/cve/CVE-2019-17543/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11035.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11035.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17543/">CVE-2019-17543 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17543">CVE-2019-17543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010150" comment="lz4-1.8.3-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010151" comment="lz4-devel-1.8.3-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010152" comment="lz4-libs-1.8.3-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3175" version="1" class="patch">
	<metadata>
		<title>security update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11036.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11036.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008021" comment="platform-python-setuptools-39.2.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008022" comment="python3-setuptools-39.2.0-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008023" comment="python3-setuptools-wheel-39.2.0-9.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3176" version="1" class="patch">
	<metadata>
		<title>security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-54661" ref_url="https://www.suse.com/security/cve/CVE-2024-54661/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11042.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11042.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54661/">CVE-2024-54661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006284" comment="socat-1.7.4.1-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3177" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11043.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11043.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006285" comment="python3.11-setuptools-65.5.1-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006286" comment="python3.11-setuptools-wheel-65.5.1-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3178" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11044.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11044.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006287" comment="python3.12-setuptools-68.2.2-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006288" comment="python3.12-setuptools-wheel-68.2.2-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3179" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-49761" ref_url="https://www.suse.com/security/cve/CVE-2024-49761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11047.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11047.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49761/">CVE-2024-49761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49761">CVE-2024-49761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020516" comment="pcs-0.10.18-2.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020517" comment="pcs-snmp-0.10.18-2.el8_10.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3180" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-49058" ref_url="https://www.suse.com/security/cve/CVE-2022-49058/" source="CVE"/>
		<reference ref_id="CVE-2022-49788" ref_url="https://www.suse.com/security/cve/CVE-2022-49788/" source="CVE"/>
		<reference ref_id="CVE-2024-57980" ref_url="https://www.suse.com/security/cve/CVE-2024-57980/" source="CVE"/>
		<reference ref_id="CVE-2024-58002" ref_url="https://www.suse.com/security/cve/CVE-2024-58002/" source="CVE"/>
		<reference ref_id="CVE-2025-21991" ref_url="https://www.suse.com/security/cve/CVE-2025-21991/" source="CVE"/>
		<reference ref_id="CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004/" source="CVE"/>
		<reference ref_id="CVE-2025-23150" ref_url="https://www.suse.com/security/cve/CVE-2025-23150/" source="CVE"/>
		<reference ref_id="CVE-2025-37738" ref_url="https://www.suse.com/security/cve/CVE-2025-37738/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11298.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11298.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49058/">CVE-2022-49058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49058">CVE-2022-49058 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49788/">CVE-2022-49788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49788">CVE-2022-49788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57980/">CVE-2024-57980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57980">CVE-2024-57980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58002/">CVE-2024-58002 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58002">CVE-2024-58002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21991/">CVE-2025-21991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23150/">CVE-2025-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23150">CVE-2025-23150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37738/">CVE-2025-37738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37738">CVE-2025-37738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007791" comment="bpftool-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007792" comment="kernel-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007793" comment="kernel-abi-stablelists-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007794" comment="kernel-core-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007795" comment="kernel-cross-headers-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007796" comment="kernel-debug-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007797" comment="kernel-debug-core-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007799" comment="kernel-debug-modules-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007800" comment="kernel-debug-modules-extra-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007802" comment="kernel-doc-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007803" comment="kernel-headers-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007804" comment="kernel-modules-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007805" comment="kernel-modules-extra-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007806" comment="kernel-tools-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007807" comment="kernel-tools-libs-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007809" comment="perf-4.18.0-553.62.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007810" comment="python3-perf-4.18.0-553.62.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3181" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-6174" ref_url="https://www.suse.com/security/cve/CVE-2024-6174/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11324.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11324.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6174/">CVE-2024-6174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6174">CVE-2024-6174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008024" comment="cloud-init-23.4-7.el8_10.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3182" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<reference ref_id="CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533/" source="CVE"/>
		<reference ref_id="CVE-2025-4373" ref_url="https://www.suse.com/security/cve/CVE-2025-4373/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4373/">CVE-2025-4373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4373">CVE-2025-4373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008025" comment="glib2-2.56.4-166.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008026" comment="glib2-devel-2.56.4-166.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008027" comment="glib2-doc-2.56.4-166.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008028" comment="glib2-fam-2.56.4-166.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008029" comment="glib2-static-2.56.4-166.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008030" comment="glib2-tests-2.56.4-166.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3183" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-56337" ref_url="https://www.suse.com/security/cve/CVE-2024-56337/" source="CVE"/>
		<reference ref_id="CVE-2025-31650" ref_url="https://www.suse.com/security/cve/CVE-2025-31650/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11333.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11333.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56337/">CVE-2024-56337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56337">CVE-2024-56337 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31650/">CVE-2025-31650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31650">CVE-2025-31650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008031" comment="tomcat-9.0.87-1.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008032" comment="tomcat-admin-webapps-9.0.87-1.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008033" comment="tomcat-docs-webapp-9.0.87-1.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008034" comment="tomcat-el-3.0-api-9.0.87-1.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008035" comment="tomcat-jsp-2.3-api-9.0.87-1.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008036" comment="tomcat-lib-9.0.87-1.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008037" comment="tomcat-servlet-4.0-api-9.0.87-1.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008038" comment="tomcat-webapps-9.0.87-1.el8_10.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3184" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2025-38086" ref_url="https://www.suse.com/security/cve/CVE-2025-38086/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11455.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11455.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38086/">CVE-2025-38086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38086">CVE-2025-38086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008972" comment="bpftool-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008973" comment="kernel-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008974" comment="kernel-abi-stablelists-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008975" comment="kernel-core-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008976" comment="kernel-cross-headers-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008977" comment="kernel-debug-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008978" comment="kernel-debug-core-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008980" comment="kernel-debug-modules-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008981" comment="kernel-debug-modules-extra-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008983" comment="kernel-doc-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008984" comment="kernel-headers-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008985" comment="kernel-modules-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008986" comment="kernel-modules-extra-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008987" comment="kernel-tools-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008988" comment="kernel-tools-libs-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008990" comment="perf-4.18.0-553.63.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008991" comment="python3-perf-4.18.0-553.63.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3185" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-50349" ref_url="https://www.suse.com/security/cve/CVE-2024-50349/" source="CVE"/>
		<reference ref_id="CVE-2024-52006" ref_url="https://www.suse.com/security/cve/CVE-2024-52006/" source="CVE"/>
		<reference ref_id="CVE-2025-27613" ref_url="https://www.suse.com/security/cve/CVE-2025-27613/" source="CVE"/>
		<reference ref_id="CVE-2025-27614" ref_url="https://www.suse.com/security/cve/CVE-2025-27614/" source="CVE"/>
		<reference ref_id="CVE-2025-46835" ref_url="https://www.suse.com/security/cve/CVE-2025-46835/" source="CVE"/>
		<reference ref_id="CVE-2025-48384" ref_url="https://www.suse.com/security/cve/CVE-2025-48384/" source="CVE"/>
		<reference ref_id="CVE-2025-48385" ref_url="https://www.suse.com/security/cve/CVE-2025-48385/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11534.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11534.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-50349/">CVE-2024-50349 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50349">CVE-2024-50349 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-52006/">CVE-2024-52006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52006">CVE-2024-52006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27613/">CVE-2025-27613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27613">CVE-2025-27613 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27614/">CVE-2025-27614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27614">CVE-2025-27614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46835/">CVE-2025-46835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46835">CVE-2025-46835 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48384/">CVE-2025-48384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48384">CVE-2025-48384 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48385/">CVE-2025-48385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48385">CVE-2025-48385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009454" comment="git-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009455" comment="git-all-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009456" comment="git-core-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009457" comment="git-core-doc-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009458" comment="git-credential-libsecret-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009459" comment="git-daemon-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009460" comment="git-email-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009461" comment="git-gui-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009462" comment="git-instaweb-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009463" comment="git-subtree-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009464" comment="git-svn-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009465" comment="gitk-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009466" comment="gitweb-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009467" comment="perl-Git-2.43.7-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009468" comment="perl-Git-SVN-2.43.7-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3186" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11747.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11747.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010153" comment="firefox-128.13.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3187" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11803.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11803.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011197" comment="nodejs-22.16.0-2.module+el8.10.0+23338+c5a38893 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011198" comment="nodejs-devel-22.16.0-2.module+el8.10.0+23338+c5a38893 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011199" comment="nodejs-docs-22.16.0-2.module+el8.10.0+23338+c5a38893 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011200" comment="nodejs-full-i18n-22.16.0-2.module+el8.10.0+23338+c5a38893 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011201" comment="nodejs-libs-22.16.0-2.module+el8.10.0+23338+c5a38893 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986162" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986163" comment="nodejs-packaging-2021.06-4.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986164" comment="nodejs-packaging-bundler-2021.06-4.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011202" comment="npm-10.9.2-1.22.16.0.2.module+el8.10.0+23338+c5a38893 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011203" comment="v8-12.4-devel-12.4.254.21-1.22.16.0.2.module+el8.10.0+23338+c5a38893 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3188" version="1" class="patch">
	<metadata>
		<title>security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40909" ref_url="https://www.suse.com/security/cve/CVE-2025-40909/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11805.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11805.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-40909/">CVE-2025-40909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40909">CVE-2025-40909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010509" comment="perl-5.26.3-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010510" comment="perl-Attribute-Handlers-0.99-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010511" comment="perl-Devel-Peek-1.26-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010512" comment="perl-Devel-SelfStubber-1.06-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010513" comment="perl-Errno-1.28-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010514" comment="perl-ExtUtils-Embed-1.34-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010515" comment="perl-ExtUtils-Miniperl-1.06-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010516" comment="perl-IO-1.38-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010517" comment="perl-IO-Zlib-1.10-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010518" comment="perl-Locale-Maketext-Simple-0.21-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010519" comment="perl-Math-Complex-1.59-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010520" comment="perl-Memoize-1.03-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010521" comment="perl-Module-Loaded-0.08-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010522" comment="perl-Net-Ping-2.55-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010523" comment="perl-Pod-Html-1.22.02-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010524" comment="perl-SelfLoader-1.23-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010525" comment="perl-Test-1.30-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010526" comment="perl-Time-Piece-1.31-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010527" comment="perl-devel-5.26.3-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010528" comment="perl-interpreter-5.26.3-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010529" comment="perl-libnetcfg-5.26.3-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010530" comment="perl-libs-5.26.3-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010531" comment="perl-macros-5.26.3-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010532" comment="perl-open-1.11-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010533" comment="perl-tests-5.26.3-423.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010534" comment="perl-utils-5.26.3-423.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3189" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-49977" ref_url="https://www.suse.com/security/cve/CVE-2022-49977/" source="CVE"/>
		<reference ref_id="CVE-2025-21905" ref_url="https://www.suse.com/security/cve/CVE-2025-21905/" source="CVE"/>
		<reference ref_id="CVE-2025-21919" ref_url="https://www.suse.com/security/cve/CVE-2025-21919/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11850.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11850.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49977/">CVE-2022-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49977">CVE-2022-49977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21905/">CVE-2025-21905 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21905">CVE-2025-21905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21919/">CVE-2025-21919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21919">CVE-2025-21919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011204" comment="bpftool-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011205" comment="kernel-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011206" comment="kernel-abi-stablelists-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011207" comment="kernel-core-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011208" comment="kernel-cross-headers-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011209" comment="kernel-debug-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011210" comment="kernel-debug-core-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011212" comment="kernel-debug-modules-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011213" comment="kernel-debug-modules-extra-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011215" comment="kernel-doc-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011216" comment="kernel-headers-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011217" comment="kernel-modules-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011218" comment="kernel-modules-extra-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011219" comment="kernel-tools-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011220" comment="kernel-tools-libs-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011222" comment="perf-4.18.0-553.64.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011223" comment="python3-perf-4.18.0-553.64.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3190" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-5994" ref_url="https://www.suse.com/security/cve/CVE-2025-5994/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11884.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11884.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-5994/">CVE-2025-5994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5994">CVE-2025-5994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010535" comment="python3-unbound-1.16.2-5.9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010536" comment="unbound-1.16.2-5.9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010537" comment="unbound-devel-1.16.2-5.9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010538" comment="unbound-libs-1.16.2-5.9.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3191" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-32023" ref_url="https://www.suse.com/security/cve/CVE-2025-32023/" source="CVE"/>
		<reference ref_id="CVE-2025-48367" ref_url="https://www.suse.com/security/cve/CVE-2025-48367/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12006.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12006.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32023/">CVE-2025-32023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32023">CVE-2025-32023 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48367/">CVE-2025-48367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48367">CVE-2025-48367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011224" comment="redis-6.2.19-1.module+el8.10.0+23330+19e91c41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011225" comment="redis-devel-6.2.19-1.module+el8.10.0+23330+19e91c41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011226" comment="redis-doc-6.2.19-1.module+el8.10.0+23330+19e91c41 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3192" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12010.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12010.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011227" comment="lemon-3.26.0-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011228" comment="sqlite-3.26.0-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011229" comment="sqlite-devel-3.26.0-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011230" comment="sqlite-doc-3.26.0-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011231" comment="sqlite-libs-3.26.0-20.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3193" version="1" class="patch">
	<metadata>
		<title>security update for tbb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1215.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1215.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964264" comment="python3-tbb-2018.2-10.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964265" comment="tbb-2018.2-10.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964266" comment="tbb-devel-2018.2-10.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964267" comment="tbb-doc-2018.2-10.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3194" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-7425" ref_url="https://www.suse.com/security/cve/CVE-2025-7425/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12450.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12450.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-7425/">CVE-2025-7425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7425">CVE-2025-7425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011643" comment="libxml2-2.9.7-21.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011644" comment="libxml2-devel-2.9.7-21.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011645" comment="python3-libxml2-2.9.7-21.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3195" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1266.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1266.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963664" comment="bpftool-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963665" comment="kernel-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963666" comment="kernel-abi-stablelists-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963667" comment="kernel-core-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963668" comment="kernel-cross-headers-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963669" comment="kernel-debug-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963670" comment="kernel-debug-core-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963672" comment="kernel-debug-modules-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963673" comment="kernel-debug-modules-extra-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963675" comment="kernel-doc-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963676" comment="kernel-headers-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963677" comment="kernel-modules-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963678" comment="kernel-modules-extra-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963679" comment="kernel-tools-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963680" comment="kernel-tools-libs-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963682" comment="perf-4.18.0-553.40.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963683" comment="python3-perf-4.18.0-553.40.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3196" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50020" ref_url="https://www.suse.com/security/cve/CVE-2022-50020/" source="CVE"/>
		<reference ref_id="CVE-2025-21928" ref_url="https://www.suse.com/security/cve/CVE-2025-21928/" source="CVE"/>
		<reference ref_id="CVE-2025-22020" ref_url="https://www.suse.com/security/cve/CVE-2025-22020/" source="CVE"/>
		<reference ref_id="CVE-2025-37890" ref_url="https://www.suse.com/security/cve/CVE-2025-37890/" source="CVE"/>
		<reference ref_id="CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052/" source="CVE"/>
		<reference ref_id="CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12752.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12752.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50020/">CVE-2022-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50020">CVE-2022-50020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21928/">CVE-2025-21928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21928">CVE-2025-21928 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22020/">CVE-2025-22020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37890/">CVE-2025-37890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013084" comment="bpftool-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013085" comment="kernel-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013086" comment="kernel-abi-stablelists-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013087" comment="kernel-core-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013088" comment="kernel-cross-headers-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013089" comment="kernel-debug-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013090" comment="kernel-debug-core-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013092" comment="kernel-debug-modules-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013093" comment="kernel-debug-modules-extra-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013095" comment="kernel-doc-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013096" comment="kernel-headers-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013097" comment="kernel-modules-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013098" comment="kernel-modules-extra-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013099" comment="kernel-tools-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013100" comment="kernel-tools-libs-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013102" comment="perf-4.18.0-553.66.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013103" comment="python3-perf-4.18.0-553.66.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3197" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1283.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1283.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963684" comment="firefox-128.7.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3198" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-0510" ref_url="https://www.suse.com/security/cve/CVE-2025-0510/" source="CVE"/>
		<reference ref_id="CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009/" source="CVE"/>
		<reference ref_id="CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010/" source="CVE"/>
		<reference ref_id="CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011/" source="CVE"/>
		<reference ref_id="CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012/" source="CVE"/>
		<reference ref_id="CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013/" source="CVE"/>
		<reference ref_id="CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014/" source="CVE"/>
		<reference ref_id="CVE-2025-1015" ref_url="https://www.suse.com/security/cve/CVE-2025-1015/" source="CVE"/>
		<reference ref_id="CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016/" source="CVE"/>
		<reference ref_id="CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1292.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1292.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-0510/">CVE-2025-0510 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0510">CVE-2025-0510 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1015/">CVE-2025-1015 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1015">CVE-2025-1015 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963685" comment="thunderbird-128.7.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3199" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-8058" ref_url="https://www.suse.com/security/cve/CVE-2025-8058/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12980.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12980.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H" href="https://www.suse.com/security/cve/CVE-2025-8058/">CVE-2025-8058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8058">CVE-2025-8058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012785" comment="compat-libpthread-nonshared-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012786" comment="glibc-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012787" comment="glibc-all-langpacks-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012788" comment="glibc-benchtests-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012789" comment="glibc-common-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012790" comment="glibc-devel-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012791" comment="glibc-doc-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012792" comment="glibc-gconv-extra-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012793" comment="glibc-headers-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012794" comment="glibc-langpack-aa-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012795" comment="glibc-langpack-af-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012796" comment="glibc-langpack-agr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012797" comment="glibc-langpack-ak-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012798" comment="glibc-langpack-am-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012799" comment="glibc-langpack-an-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012800" comment="glibc-langpack-anp-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012801" comment="glibc-langpack-ar-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012802" comment="glibc-langpack-as-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012803" comment="glibc-langpack-ast-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012804" comment="glibc-langpack-ayc-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012805" comment="glibc-langpack-az-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012806" comment="glibc-langpack-be-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012807" comment="glibc-langpack-bem-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012808" comment="glibc-langpack-ber-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012809" comment="glibc-langpack-bg-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012810" comment="glibc-langpack-bhb-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012811" comment="glibc-langpack-bho-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012812" comment="glibc-langpack-bi-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012813" comment="glibc-langpack-bn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012814" comment="glibc-langpack-bo-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012815" comment="glibc-langpack-br-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012816" comment="glibc-langpack-brx-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012817" comment="glibc-langpack-bs-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012818" comment="glibc-langpack-byn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012819" comment="glibc-langpack-ca-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012820" comment="glibc-langpack-ce-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012821" comment="glibc-langpack-chr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012822" comment="glibc-langpack-cmn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012823" comment="glibc-langpack-crh-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012824" comment="glibc-langpack-cs-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012825" comment="glibc-langpack-csb-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012826" comment="glibc-langpack-cv-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012827" comment="glibc-langpack-cy-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012828" comment="glibc-langpack-da-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012829" comment="glibc-langpack-de-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012830" comment="glibc-langpack-doi-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012831" comment="glibc-langpack-dsb-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012832" comment="glibc-langpack-dv-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012833" comment="glibc-langpack-dz-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012834" comment="glibc-langpack-el-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012835" comment="glibc-langpack-en-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012836" comment="glibc-langpack-eo-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012837" comment="glibc-langpack-es-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012838" comment="glibc-langpack-et-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012839" comment="glibc-langpack-eu-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012840" comment="glibc-langpack-fa-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012841" comment="glibc-langpack-ff-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012842" comment="glibc-langpack-fi-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012843" comment="glibc-langpack-fil-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012844" comment="glibc-langpack-fo-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012845" comment="glibc-langpack-fr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012846" comment="glibc-langpack-fur-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012847" comment="glibc-langpack-fy-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012848" comment="glibc-langpack-ga-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012849" comment="glibc-langpack-gd-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012850" comment="glibc-langpack-gez-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012851" comment="glibc-langpack-gl-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012852" comment="glibc-langpack-gu-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012853" comment="glibc-langpack-gv-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012854" comment="glibc-langpack-ha-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012855" comment="glibc-langpack-hak-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012856" comment="glibc-langpack-he-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012857" comment="glibc-langpack-hi-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012858" comment="glibc-langpack-hif-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012859" comment="glibc-langpack-hne-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012860" comment="glibc-langpack-hr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012861" comment="glibc-langpack-hsb-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012862" comment="glibc-langpack-ht-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012863" comment="glibc-langpack-hu-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012864" comment="glibc-langpack-hy-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012865" comment="glibc-langpack-ia-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012866" comment="glibc-langpack-id-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012867" comment="glibc-langpack-ig-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012868" comment="glibc-langpack-ik-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012869" comment="glibc-langpack-is-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012870" comment="glibc-langpack-it-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012871" comment="glibc-langpack-iu-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012872" comment="glibc-langpack-ja-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012873" comment="glibc-langpack-ka-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012874" comment="glibc-langpack-kab-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012875" comment="glibc-langpack-kk-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012876" comment="glibc-langpack-kl-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012877" comment="glibc-langpack-km-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012878" comment="glibc-langpack-kn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012879" comment="glibc-langpack-ko-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012880" comment="glibc-langpack-kok-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012881" comment="glibc-langpack-ks-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012882" comment="glibc-langpack-ku-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012883" comment="glibc-langpack-kw-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012884" comment="glibc-langpack-ky-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012885" comment="glibc-langpack-lb-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012886" comment="glibc-langpack-lg-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012887" comment="glibc-langpack-li-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012888" comment="glibc-langpack-lij-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012889" comment="glibc-langpack-ln-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012890" comment="glibc-langpack-lo-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012891" comment="glibc-langpack-lt-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012892" comment="glibc-langpack-lv-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012893" comment="glibc-langpack-lzh-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012894" comment="glibc-langpack-mag-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012895" comment="glibc-langpack-mai-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012896" comment="glibc-langpack-mfe-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012897" comment="glibc-langpack-mg-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012898" comment="glibc-langpack-mhr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012899" comment="glibc-langpack-mi-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012900" comment="glibc-langpack-miq-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012901" comment="glibc-langpack-mjw-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012902" comment="glibc-langpack-mk-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012903" comment="glibc-langpack-ml-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012904" comment="glibc-langpack-mn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012905" comment="glibc-langpack-mni-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012906" comment="glibc-langpack-mr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012907" comment="glibc-langpack-ms-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012908" comment="glibc-langpack-mt-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012909" comment="glibc-langpack-my-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012910" comment="glibc-langpack-nan-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012911" comment="glibc-langpack-nb-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012912" comment="glibc-langpack-nds-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012913" comment="glibc-langpack-ne-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012914" comment="glibc-langpack-nhn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012915" comment="glibc-langpack-niu-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012916" comment="glibc-langpack-nl-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012917" comment="glibc-langpack-nn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012918" comment="glibc-langpack-nr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012919" comment="glibc-langpack-nso-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012920" comment="glibc-langpack-oc-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012921" comment="glibc-langpack-om-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012922" comment="glibc-langpack-or-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012923" comment="glibc-langpack-os-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012924" comment="glibc-langpack-pa-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012925" comment="glibc-langpack-pap-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012926" comment="glibc-langpack-pl-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012927" comment="glibc-langpack-ps-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012928" comment="glibc-langpack-pt-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012929" comment="glibc-langpack-quz-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012930" comment="glibc-langpack-raj-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012931" comment="glibc-langpack-ro-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012932" comment="glibc-langpack-ru-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012933" comment="glibc-langpack-rw-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012934" comment="glibc-langpack-sa-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012935" comment="glibc-langpack-sah-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012936" comment="glibc-langpack-sat-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012937" comment="glibc-langpack-sc-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012938" comment="glibc-langpack-sd-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012939" comment="glibc-langpack-se-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012940" comment="glibc-langpack-sgs-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012941" comment="glibc-langpack-shn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012942" comment="glibc-langpack-shs-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012943" comment="glibc-langpack-si-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012944" comment="glibc-langpack-sid-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012945" comment="glibc-langpack-sk-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012946" comment="glibc-langpack-sl-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012947" comment="glibc-langpack-sm-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012948" comment="glibc-langpack-so-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012949" comment="glibc-langpack-sq-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012950" comment="glibc-langpack-sr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012951" comment="glibc-langpack-ss-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012952" comment="glibc-langpack-st-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012953" comment="glibc-langpack-sv-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012954" comment="glibc-langpack-sw-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012955" comment="glibc-langpack-szl-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012956" comment="glibc-langpack-ta-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012957" comment="glibc-langpack-tcy-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012958" comment="glibc-langpack-te-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012959" comment="glibc-langpack-tg-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012960" comment="glibc-langpack-th-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012961" comment="glibc-langpack-the-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012962" comment="glibc-langpack-ti-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012963" comment="glibc-langpack-tig-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012964" comment="glibc-langpack-tk-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012965" comment="glibc-langpack-tl-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012966" comment="glibc-langpack-tn-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012967" comment="glibc-langpack-to-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012968" comment="glibc-langpack-tpi-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012969" comment="glibc-langpack-tr-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012970" comment="glibc-langpack-ts-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012971" comment="glibc-langpack-tt-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012972" comment="glibc-langpack-ug-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012973" comment="glibc-langpack-uk-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012974" comment="glibc-langpack-unm-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012975" comment="glibc-langpack-ur-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012976" comment="glibc-langpack-uz-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012977" comment="glibc-langpack-ve-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012978" comment="glibc-langpack-vi-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012979" comment="glibc-langpack-wa-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012980" comment="glibc-langpack-wae-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012981" comment="glibc-langpack-wal-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012982" comment="glibc-langpack-wo-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012983" comment="glibc-langpack-xh-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012984" comment="glibc-langpack-yi-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012985" comment="glibc-langpack-yo-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012986" comment="glibc-langpack-yue-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012987" comment="glibc-langpack-yuw-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012988" comment="glibc-langpack-zh-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012989" comment="glibc-langpack-zu-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012990" comment="glibc-locale-source-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012991" comment="glibc-minimal-langpack-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012992" comment="glibc-nss-devel-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012993" comment="glibc-static-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012994" comment="glibc-utils-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012995" comment="libnsl-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012996" comment="nscd-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012997" comment="nss_db-2.28-251.el8_10.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012998" comment="nss_hesiod-2.28-251.el8_10.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3200" version="1" class="patch">
	<metadata>
		<title>security update for gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1301.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1301.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963686" comment="cpp-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963687" comment="gcc-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963688" comment="gcc-c++-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963689" comment="gcc-gdb-plugin-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963690" comment="gcc-gfortran-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963691" comment="gcc-offload-nvptx-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963692" comment="gcc-plugin-annobin-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963693" comment="gcc-plugin-devel-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963694" comment="libasan-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963695" comment="libatomic-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963696" comment="libatomic-static-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963697" comment="libgcc-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963698" comment="libgfortran-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963699" comment="libgfortran-static-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963700" comment="libgomp-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963701" comment="libgomp-offload-nvptx-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963702" comment="libitm-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963703" comment="libitm-devel-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963704" comment="liblsan-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963705" comment="libquadmath-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963706" comment="libquadmath-devel-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963707" comment="libquadmath-static-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963708" comment="libstdc++-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963709" comment="libstdc++-devel-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963710" comment="libstdc++-docs-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963711" comment="libstdc++-static-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963712" comment="libtsan-8.5.0-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963713" comment="libubsan-8.5.0-23.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3201" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-13-gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1306.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1306.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963714" comment="gcc-toolset-13-gcc-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963715" comment="gcc-toolset-13-gcc-c++-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963716" comment="gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963717" comment="gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963718" comment="gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963719" comment="gcc-toolset-13-libasan-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963720" comment="gcc-toolset-13-libatomic-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963721" comment="gcc-toolset-13-libgccjit-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963722" comment="gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963723" comment="gcc-toolset-13-libitm-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963724" comment="gcc-toolset-13-liblsan-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963725" comment="gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963726" comment="gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963727" comment="gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963728" comment="gcc-toolset-13-libtsan-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963729" comment="gcc-toolset-13-libubsan-devel-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963730" comment="gcc-toolset-13-offload-nvptx-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963731" comment="libasan8-13.3.1-2.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963732" comment="libtsan2-13.3.1-2.2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3202" version="1" class="patch">
	<metadata>
		<title>security update for doxygen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1314.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1314.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964268" comment="doxygen-1.8.14-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964269" comment="doxygen-doxywizard-1.8.14-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964270" comment="doxygen-latex-1.8.14-13.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3203" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-32415" ref_url="https://www.suse.com/security/cve/CVE-2025-32415/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13203.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13203.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-32415/">CVE-2025-32415 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013104" comment="libxml2-2.9.7-21.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013105" comment="libxml2-devel-2.9.7-21.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013106" comment="python3-libxml2-2.9.7-21.el8_10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3204" version="1" class="patch">
	<metadata>
		<title>security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13234.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13234.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013107" comment="python3-requests-2.20.0-6.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3205" version="1" class="patch">
	<metadata>
		<title>security update for gdk-pixbuf2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-7345" ref_url="https://www.suse.com/security/cve/CVE-2025-7345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13315.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13315.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7345/">CVE-2025-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7345">CVE-2025-7345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013108" comment="gdk-pixbuf2-2.36.12-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013109" comment="gdk-pixbuf2-devel-2.36.12-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013110" comment="gdk-pixbuf2-modules-2.36.12-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013111" comment="gdk-pixbuf2-xlib-2.36.12-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013112" comment="gdk-pixbuf2-xlib-devel-2.36.12-7.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3206" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-14-gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964271" comment="gcc-toolset-14-gcc-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964272" comment="gcc-toolset-14-gcc-c++-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964273" comment="gcc-toolset-14-gcc-gfortran-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964274" comment="gcc-toolset-14-gcc-plugin-annobin-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964275" comment="gcc-toolset-14-gcc-plugin-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964276" comment="gcc-toolset-14-libasan-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964277" comment="gcc-toolset-14-libatomic-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964278" comment="gcc-toolset-14-libgccjit-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964279" comment="gcc-toolset-14-libgccjit-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964280" comment="gcc-toolset-14-libitm-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964281" comment="gcc-toolset-14-liblsan-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964282" comment="gcc-toolset-14-libquadmath-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964283" comment="gcc-toolset-14-libstdc++-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964284" comment="gcc-toolset-14-libstdc++-docs-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964285" comment="gcc-toolset-14-libtsan-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964286" comment="gcc-toolset-14-libubsan-devel-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964287" comment="gcc-toolset-14-offload-nvptx-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964288" comment="libasan8-14.2.1-7.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964289" comment="libtsan2-14.2.1-7.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3207" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23083" ref_url="https://www.suse.com/security/cve/CVE-2025-23083/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1351.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1351.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23083/">CVE-2025-23083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23083">CVE-2025-23083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965827" comment="nodejs-20.18.2-1.module+el8.10.0+22767+a3309b10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965828" comment="nodejs-devel-20.18.2-1.module+el8.10.0+22767+a3309b10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965829" comment="nodejs-docs-20.18.2-1.module+el8.10.0+22767+a3309b10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965830" comment="nodejs-full-i18n-20.18.2-1.module+el8.10.0+22767+a3309b10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965831" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+22767+a3309b10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965832" comment="nodejs-packaging-2021.06-4.module+el8.10.0+22767+a3309b10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965833" comment="nodejs-packaging-bundler-2021.06-4.module+el8.10.0+22767+a3309b10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965834" comment="npm-10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3208" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2021-47670" ref_url="https://www.suse.com/security/cve/CVE-2021-47670/" source="CVE"/>
		<reference ref_id="CVE-2024-56644" ref_url="https://www.suse.com/security/cve/CVE-2024-56644/" source="CVE"/>
		<reference ref_id="CVE-2025-21727" ref_url="https://www.suse.com/security/cve/CVE-2025-21727/" source="CVE"/>
		<reference ref_id="CVE-2025-21759" ref_url="https://www.suse.com/security/cve/CVE-2025-21759/" source="CVE"/>
		<reference ref_id="CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085/" source="CVE"/>
		<reference ref_id="CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13589.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13589.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47670/">CVE-2021-47670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47670">CVE-2021-47670 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56644/">CVE-2024-56644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21727/">CVE-2025-21727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21727">CVE-2025-21727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21759/">CVE-2025-21759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013361" comment="bpftool-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013362" comment="kernel-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013363" comment="kernel-abi-stablelists-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013364" comment="kernel-core-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013365" comment="kernel-cross-headers-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013366" comment="kernel-debug-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013367" comment="kernel-debug-core-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013369" comment="kernel-debug-modules-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013370" comment="kernel-debug-modules-extra-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013372" comment="kernel-doc-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013373" comment="kernel-headers-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013374" comment="kernel-modules-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013375" comment="kernel-modules-extra-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013376" comment="kernel-tools-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013377" comment="kernel-tools-libs-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013379" comment="perf-4.18.0-553.69.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013380" comment="python3-perf-4.18.0-553.69.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3209" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027/" source="CVE"/>
		<reference ref_id="CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028/" source="CVE"/>
		<reference ref_id="CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029/" source="CVE"/>
		<reference ref_id="CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030/" source="CVE"/>
		<reference ref_id="CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031/" source="CVE"/>
		<reference ref_id="CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032/" source="CVE"/>
		<reference ref_id="CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033/" source="CVE"/>
		<reference ref_id="CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034/" source="CVE"/>
		<reference ref_id="CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13676.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13676.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013381" comment="thunderbird-128.13.0-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3210" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1372.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1372.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954978" comment="aardvark-dns-1.10.1-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965835" comment="buildah-1.33.12-1.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965836" comment="buildah-tests-1.33.12-1.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954981" comment="cockpit-podman-84.1-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954982" comment="conmon-2.1.10-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954983" comment="container-selinux-2.229.0-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954984" comment="containernetworking-plugins-1.4.0-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954985" comment="containers-common-1-82.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954986" comment="crit-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954987" comment="criu-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954988" comment="criu-devel-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954989" comment="criu-libs-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954990" comment="crun-1.14.3-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954991" comment="fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954992" comment="libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954993" comment="libslirp-devel-4.4.0-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954994" comment="netavark-1.10.3-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954995" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965837" comment="podman-4.9.4-19.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965838" comment="podman-catatonit-4.9.4-19.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965839" comment="podman-docker-4.9.4-19.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965840" comment="podman-gvproxy-4.9.4-19.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965841" comment="podman-plugins-4.9.4-19.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965842" comment="podman-remote-4.9.4-19.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965843" comment="podman-tests-4.9.4-19.module+el8.10.0+22744+7794713b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955003" comment="python3-criu-3.18-5.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955004" comment="python3-podman-4.9.0-3.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965844" comment="runc-1.1.12-6.module+el8.10.0+22722+0028f543 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955006" comment="skopeo-1.14.5-3.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955007" comment="skopeo-tests-1.14.5-3.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955008" comment="slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955009" comment="toolbox-0.0.99.5-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955010" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+22417+2fb00970 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955011" comment="udica-0.2.6-21.module+el8.10.0+22417+2fb00970 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3211" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-31273" ref_url="https://www.suse.com/security/cve/CVE-2025-31273/" source="CVE"/>
		<reference ref_id="CVE-2025-31278" ref_url="https://www.suse.com/security/cve/CVE-2025-31278/" source="CVE"/>
		<reference ref_id="CVE-2025-43211" ref_url="https://www.suse.com/security/cve/CVE-2025-43211/" source="CVE"/>
		<reference ref_id="CVE-2025-43212" ref_url="https://www.suse.com/security/cve/CVE-2025-43212/" source="CVE"/>
		<reference ref_id="CVE-2025-43216" ref_url="https://www.suse.com/security/cve/CVE-2025-43216/" source="CVE"/>
		<reference ref_id="CVE-2025-43227" ref_url="https://www.suse.com/security/cve/CVE-2025-43227/" source="CVE"/>
		<reference ref_id="CVE-2025-43240" ref_url="https://www.suse.com/security/cve/CVE-2025-43240/" source="CVE"/>
		<reference ref_id="CVE-2025-43265" ref_url="https://www.suse.com/security/cve/CVE-2025-43265/" source="CVE"/>
		<reference ref_id="CVE-2025-6558" ref_url="https://www.suse.com/security/cve/CVE-2025-6558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13780.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13780.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31273/">CVE-2025-31273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31273">CVE-2025-31273 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31278/">CVE-2025-31278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31278">CVE-2025-31278 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43211/">CVE-2025-43211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43211">CVE-2025-43211 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43212/">CVE-2025-43212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43212">CVE-2025-43212 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43216/">CVE-2025-43216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43216">CVE-2025-43216 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43227/">CVE-2025-43227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43227">CVE-2025-43227 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43240/">CVE-2025-43240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43240">CVE-2025-43240 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43265/">CVE-2025-43265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43265">CVE-2025-43265 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-6558/">CVE-2025-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6558">CVE-2025-6558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010013934" comment="webkit2gtk3-2.48.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013935" comment="webkit2gtk3-devel-2.48.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013936" comment="webkit2gtk3-jsc-2.48.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013937" comment="webkit2gtk3-jsc-devel-2.48.5-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3212" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13940.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13940.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974974" comment="delve-1.24.1-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015495" comment="go-toolset-1.24.6-1.module+el8.10.0+23407+428597c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015496" comment="golang-1.24.6-1.module+el8.10.0+23407+428597c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015497" comment="golang-bin-1.24.6-1.module+el8.10.0+23407+428597c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015498" comment="golang-docs-1.24.6-1.module+el8.10.0+23407+428597c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015499" comment="golang-misc-1.24.6-1.module+el8.10.0+23407+428597c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015500" comment="golang-src-1.24.6-1.module+el8.10.0+23407+428597c7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015501" comment="golang-tests-1.24.6-1.module+el8.10.0+23407+428597c7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3213" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50269" ref_url="https://www.suse.com/security/cve/CVE-2022-50269/" source="CVE"/>
		<reference ref_id="CVE-2022-50369" ref_url="https://www.suse.com/security/cve/CVE-2022-50369/" source="CVE"/>
		<reference ref_id="CVE-2025-22097" ref_url="https://www.suse.com/security/cve/CVE-2025-22097/" source="CVE"/>
		<reference ref_id="CVE-2025-37914" ref_url="https://www.suse.com/security/cve/CVE-2025-37914/" source="CVE"/>
		<reference ref_id="CVE-2025-38250" ref_url="https://www.suse.com/security/cve/CVE-2025-38250/" source="CVE"/>
		<reference ref_id="CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13960.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13960.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50269/">CVE-2022-50269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50269">CVE-2022-50269 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50369/">CVE-2022-50369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50369">CVE-2022-50369 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22097/">CVE-2025-22097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37914/">CVE-2025-37914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38250/">CVE-2025-38250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38250">CVE-2025-38250 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015502" comment="bpftool-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015503" comment="kernel-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015504" comment="kernel-abi-stablelists-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015505" comment="kernel-core-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015506" comment="kernel-cross-headers-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015507" comment="kernel-debug-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015508" comment="kernel-debug-core-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015510" comment="kernel-debug-modules-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015511" comment="kernel-debug-modules-extra-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015513" comment="kernel-doc-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015514" comment="kernel-headers-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015515" comment="kernel-modules-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015516" comment="kernel-modules-extra-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015517" comment="kernel-tools-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015518" comment="kernel-tools-libs-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015520" comment="perf-4.18.0-553.70.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015521" comment="python3-perf-4.18.0-553.70.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3214" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-collections (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-52999" ref_url="https://www.suse.com/security/cve/CVE-2025-52999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14126.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14126.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52999/">CVE-2025-52999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52999">CVE-2025-52999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022027" comment="apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022028" comment="apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022029" comment="apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022030" comment="bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022031" comment="fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022032" comment="glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022033" comment="glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022034" comment="glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022035" comment="glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022036" comment="glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022037" comment="jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022038" comment="jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022039" comment="jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022040" comment="jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022041" comment="jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022042" comment="jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022043" comment="jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022044" comment="jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022045" comment="jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022046" comment="jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022047" comment="javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022048" comment="javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022049" comment="pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022050" comment="relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022051" comment="slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022052" comment="slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022053" comment="stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022054" comment="velocity-1.7-24.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022055" comment="xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022056" comment="xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022057" comment="xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022058" comment="xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022059" comment="xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022060" comment="xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3215" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-5914" ref_url="https://www.suse.com/security/cve/CVE-2025-5914/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5914/">CVE-2025-5914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5914">CVE-2025-5914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015522" comment="bsdtar-3.3.3-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015523" comment="libarchive-3.3.3-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015524" comment="libarchive-devel-3.3.3-6.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3216" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-48976" ref_url="https://www.suse.com/security/cve/CVE-2025-48976/" source="CVE"/>
		<reference ref_id="CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988/" source="CVE"/>
		<reference ref_id="CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989/" source="CVE"/>
		<reference ref_id="CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125/" source="CVE"/>
		<reference ref_id="CVE-2025-52434" ref_url="https://www.suse.com/security/cve/CVE-2025-52434/" source="CVE"/>
		<reference ref_id="CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520/" source="CVE"/>
		<reference ref_id="CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14177.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14177.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48976/">CVE-2025-48976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48976">CVE-2025-48976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52434/">CVE-2025-52434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52434">CVE-2025-52434 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015525" comment="tomcat-9.0.87-1.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015526" comment="tomcat-admin-webapps-9.0.87-1.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015527" comment="tomcat-docs-webapp-9.0.87-1.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015528" comment="tomcat-el-3.0-api-9.0.87-1.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015529" comment="tomcat-jsp-2.3-api-9.0.87-1.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015530" comment="tomcat-lib-9.0.87-1.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015531" comment="tomcat-servlet-4.0-api-9.0.87-1.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015532" comment="tomcat-webapps-9.0.87-1.el8_10.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3217" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22058" ref_url="https://www.suse.com/security/cve/CVE-2025-22058/" source="CVE"/>
		<reference ref_id="CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14438.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14438.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22058/">CVE-2025-22058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010015632" comment="bpftool-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015633" comment="kernel-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015634" comment="kernel-abi-stablelists-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015635" comment="kernel-core-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015636" comment="kernel-cross-headers-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015637" comment="kernel-debug-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015638" comment="kernel-debug-core-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015640" comment="kernel-debug-modules-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015641" comment="kernel-debug-modules-extra-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015643" comment="kernel-doc-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015644" comment="kernel-headers-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015645" comment="kernel-modules-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015646" comment="kernel-modules-extra-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015647" comment="kernel-tools-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015648" comment="kernel-tools-libs-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015650" comment="perf-4.18.0-553.71.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015651" comment="python3-perf-4.18.0-553.71.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3218" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14442.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14442.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015652" comment="firefox-128.14.0-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3219" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14546.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14546.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019775" comment="python3.12-3.12.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019776" comment="python3.12-debug-3.12.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019777" comment="python3.12-devel-3.12.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019778" comment="python3.12-idle-3.12.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019779" comment="python3.12-libs-3.12.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019780" comment="python3.12-rpm-macros-3.12.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019781" comment="python3.12-test-3.12.11-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019782" comment="python3.12-tkinter-3.12.11-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3220" version="1" class="patch">
	<metadata>
		<title>security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14553.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14553.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015533" comment="python3-cryptography-3.2.1-8.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3221" version="1" class="patch">
	<metadata>
		<title>security update for pam (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020/" source="CVE"/>
		<reference ref_id="CVE-2025-8941" ref_url="https://www.suse.com/security/cve/CVE-2025-8941/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14557.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14557.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8941/">CVE-2025-8941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8941">CVE-2025-8941 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017420" comment="pam-1.3.1-38.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017421" comment="pam-devel-1.3.1-38.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3222" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14560.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14560.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016089" comment="platform-python-3.6.8-71.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016090" comment="platform-python-debug-3.6.8-71.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016091" comment="platform-python-devel-3.6.8-71.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016092" comment="python3-idle-3.6.8-71.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016093" comment="python3-libs-3.6.8-71.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016094" comment="python3-test-3.6.8-71.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016095" comment="python3-tkinter-3.6.8-71.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3223" version="1" class="patch">
	<metadata>
		<title>security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-54389" ref_url="https://www.suse.com/security/cve/CVE-2025-54389/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14573.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14573.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54389/">CVE-2025-54389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54389">CVE-2025-54389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010015653" comment="aide-0.16-15.el8_10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3224" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179/" source="CVE"/>
		<reference ref_id="CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180/" source="CVE"/>
		<reference ref_id="CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181/" source="CVE"/>
		<reference ref_id="CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182/" source="CVE"/>
		<reference ref_id="CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14743.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14743.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016096" comment="thunderbird-128.14.0-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3225" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14750.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14750.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016233" comment="fence-agents-aliyun-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016234" comment="fence-agents-all-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016235" comment="fence-agents-amt-ws-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016236" comment="fence-agents-apc-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016237" comment="fence-agents-apc-snmp-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016238" comment="fence-agents-aws-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016239" comment="fence-agents-azure-arm-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016240" comment="fence-agents-bladecenter-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016241" comment="fence-agents-brocade-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016242" comment="fence-agents-cisco-mds-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016243" comment="fence-agents-cisco-ucs-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016244" comment="fence-agents-common-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016245" comment="fence-agents-compute-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016246" comment="fence-agents-drac5-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016247" comment="fence-agents-eaton-snmp-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016248" comment="fence-agents-emerson-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016249" comment="fence-agents-eps-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016250" comment="fence-agents-gce-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016251" comment="fence-agents-heuristics-ping-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016252" comment="fence-agents-hpblade-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016253" comment="fence-agents-ibm-powervs-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016254" comment="fence-agents-ibm-vpc-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016255" comment="fence-agents-ibmblade-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016256" comment="fence-agents-ifmib-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016257" comment="fence-agents-ilo-moonshot-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016258" comment="fence-agents-ilo-mp-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016259" comment="fence-agents-ilo-ssh-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016260" comment="fence-agents-ilo2-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016261" comment="fence-agents-intelmodular-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016262" comment="fence-agents-ipdu-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016263" comment="fence-agents-ipmilan-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016264" comment="fence-agents-kdump-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016265" comment="fence-agents-kubevirt-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016266" comment="fence-agents-lpar-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016267" comment="fence-agents-mpath-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016268" comment="fence-agents-openstack-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016269" comment="fence-agents-redfish-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016270" comment="fence-agents-rhevm-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016271" comment="fence-agents-rsa-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016272" comment="fence-agents-rsb-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016273" comment="fence-agents-sbd-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016274" comment="fence-agents-scsi-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016275" comment="fence-agents-virsh-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016276" comment="fence-agents-vmware-rest-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016277" comment="fence-agents-vmware-soap-4.2.1-129.el8_10.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016278" comment="fence-agents-wti-4.2.1-129.el8_10.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3226" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14841.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14841.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016279" comment="python3.11-3.11.13-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016280" comment="python3.11-debug-3.11.13-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016281" comment="python3.11-devel-3.11.13-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016282" comment="python3.11-idle-3.11.13-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016283" comment="python3.11-libs-3.11.13-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016284" comment="python3.11-rpm-macros-3.11.13-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016285" comment="python3.11-test-3.11.13-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016286" comment="python3.11-tkinter-3.11.13-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3227" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14899.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14899.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956875" comment="pg_repack-1.5.1-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881424" comment="pgaudit-16.0-1.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881425" comment="postgres-decoderbufs-2.4.0-1.Final.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016287" comment="postgresql-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016288" comment="postgresql-contrib-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016289" comment="postgresql-docs-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016290" comment="postgresql-plperl-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016291" comment="postgresql-plpython3-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016292" comment="postgresql-pltcl-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016293" comment="postgresql-private-devel-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016294" comment="postgresql-private-libs-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016295" comment="postgresql-server-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016296" comment="postgresql-server-devel-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016297" comment="postgresql-static-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016298" comment="postgresql-test-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016299" comment="postgresql-test-rpm-macros-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016300" comment="postgresql-upgrade-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016301" comment="postgresql-upgrade-devel-16.10-1.module+el8.10.0+23424+e26efc6c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3228" version="1" class="patch">
	<metadata>
		<title>security update for PyYAML (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<reference ref_id="CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14900.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14900.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016302" comment="python39-3.9.20-2.module+el8.10.0+23441+1124c1da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016303" comment="python39-Cython-0.29.21-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831536" comment="python39-PyMySQL-0.10.1-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016304" comment="python39-attrs-20.3.0-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831537" comment="python39-cffi-1.14.3-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831538" comment="python39-chardet-3.0.4-19.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874217" comment="python39-cryptography-3.3.1-3.module+el8.10.0+21271+eccd1d86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016305" comment="python39-debug-3.9.20-2.module+el8.10.0+23441+1124c1da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016306" comment="python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016307" comment="python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016308" comment="python39-iniconfig-1.1.1-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016309" comment="python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831544" comment="python39-lxml-4.6.5-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016310" comment="python39-mod_wsgi-4.7.1-7.module+el8.10.0+23075+0aa18782.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016311" comment="python39-more-itertools-8.5.0-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831546" comment="python39-numpy-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831547" comment="python39-numpy-doc-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831548" comment="python39-numpy-f2py-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016312" comment="python39-packaging-20.4-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874221" comment="python39-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874222" comment="python39-pip-wheel-20.2.4-9.module+el8.10.0+21329+8d76b841 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016313" comment="python39-pluggy-0.13.1-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831551" comment="python39-ply-3.11-10.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831552" comment="python39-psutil-5.8.0-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874223" comment="python39-psycopg2-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874224" comment="python39-psycopg2-doc-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874225" comment="python39-psycopg2-tests-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016314" comment="python39-py-1.10.0-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016315" comment="python39-pybind11-2.7.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016316" comment="python39-pybind11-devel-2.7.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831556" comment="python39-pycparser-2.20-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016317" comment="python39-pyparsing-2.4.7-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831557" comment="python39-pysocks-1.7.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016318" comment="python39-pytest-6.0.2-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831558" comment="python39-pyyaml-5.4.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831559" comment="python39-requests-2.25.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016319" comment="python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831561" comment="python39-scipy-1.5.4-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016320" comment="python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016321" comment="python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831564" comment="python39-six-1.15.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016322" comment="python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016323" comment="python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831567" comment="python39-toml-0.10.1-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874231" comment="python39-urllib3-1.25.10-5.module+el8.10.0+20443+f0a692fe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016324" comment="python39-wcwidth-0.2.5-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831569" comment="python39-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831570" comment="python39-wheel-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3229" version="1" class="patch">
	<metadata>
		<title>security update for resource-agents (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14999.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14999.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017209" comment="resource-agents-4.9.0-54.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017210" comment="resource-agents-aliyun-4.9.0-54.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017211" comment="resource-agents-gcp-4.9.0-54.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017212" comment="resource-agents-paf-4.9.0-54.el8_10.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3230" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-38211" ref_url="https://www.suse.com/security/cve/CVE-2025-38211/" source="CVE"/>
		<reference ref_id="CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332/" source="CVE"/>
		<reference ref_id="CVE-2025-38464" ref_url="https://www.suse.com/security/cve/CVE-2025-38464/" source="CVE"/>
		<reference ref_id="CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38211/">CVE-2025-38211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38464/">CVE-2025-38464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016973" comment="bpftool-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016974" comment="kernel-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016975" comment="kernel-abi-stablelists-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016976" comment="kernel-core-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016977" comment="kernel-cross-headers-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016978" comment="kernel-debug-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016979" comment="kernel-debug-core-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016981" comment="kernel-debug-modules-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016982" comment="kernel-debug-modules-extra-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016984" comment="kernel-doc-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016985" comment="kernel-headers-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016986" comment="kernel-modules-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016987" comment="kernel-modules-extra-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016988" comment="kernel-tools-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016989" comment="kernel-tools-libs-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016991" comment="perf-4.18.0-553.72.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016992" comment="python3-perf-4.18.0-553.72.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3231" version="1" class="patch">
	<metadata>
		<title>security update for udisks2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-8067" ref_url="https://www.suse.com/security/cve/CVE-2025-8067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15017.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15017.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-8067/">CVE-2025-8067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016900" comment="libudisks2-2.9.0-16.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016901" comment="libudisks2-devel-2.9.0-16.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016902" comment="udisks2-2.9.0-16.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016903" comment="udisks2-iscsi-2.9.0-16.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016904" comment="udisks2-lsm-2.9.0-16.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016905" comment="udisks2-lvm2-2.9.0-16.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3232" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15021.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15021.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020518" comment="pg_repack-1.4.6-3.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020519" comment="pgaudit-1.5.0-1.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020520" comment="postgres-decoderbufs-0.10.0-2.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020521" comment="postgresql-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020522" comment="postgresql-contrib-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020523" comment="postgresql-docs-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020524" comment="postgresql-plperl-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020525" comment="postgresql-plpython3-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020526" comment="postgresql-pltcl-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020527" comment="postgresql-server-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020528" comment="postgresql-server-devel-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020529" comment="postgresql-static-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020530" comment="postgresql-test-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020531" comment="postgresql-test-rpm-macros-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020532" comment="postgresql-upgrade-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020533" comment="postgresql-upgrade-devel-13.22-1.module+el8.10.0+23422+b659575f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3233" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207/" source="CVE"/>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<reference ref_id="CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15022.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15022.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850258" comment="pg_repack-1.4.8-1.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850259" comment="pgaudit-1.7.0-1.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850260" comment="postgres-decoderbufs-1.9.7-1.Final.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020763" comment="postgresql-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020764" comment="postgresql-contrib-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020765" comment="postgresql-docs-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020766" comment="postgresql-plperl-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020767" comment="postgresql-plpython3-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020768" comment="postgresql-pltcl-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020769" comment="postgresql-private-devel-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020770" comment="postgresql-private-libs-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020771" comment="postgresql-server-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020772" comment="postgresql-server-devel-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020773" comment="postgresql-static-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020774" comment="postgresql-test-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020775" comment="postgresql-test-rpm-macros-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020776" comment="postgresql-upgrade-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020777" comment="postgresql-upgrade-devel-15.14-1.module+el8.10.0+23423+5a199198 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3234" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-47252" ref_url="https://www.suse.com/security/cve/CVE-2024-47252/" source="CVE"/>
		<reference ref_id="CVE-2025-23048" ref_url="https://www.suse.com/security/cve/CVE-2025-23048/" source="CVE"/>
		<reference ref_id="CVE-2025-49630" ref_url="https://www.suse.com/security/cve/CVE-2025-49630/" source="CVE"/>
		<reference ref_id="CVE-2025-49812" ref_url="https://www.suse.com/security/cve/CVE-2025-49812/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15123.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15123.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47252/">CVE-2024-47252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47252">CVE-2024-47252 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23048/">CVE-2025-23048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23048">CVE-2025-23048 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49630/">CVE-2025-49630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49630">CVE-2025-49630 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49812/">CVE-2025-49812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49812">CVE-2025-49812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016993" comment="httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016994" comment="httpd-devel-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016995" comment="httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016996" comment="httpd-manual-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016997" comment="httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016998" comment="mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016999" comment="mod_ldap-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854384" comment="mod_md-2.0.8-8.module+el8.9.0+19080+567b90f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017000" comment="mod_proxy_html-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017001" comment="mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017002" comment="mod_ssl-2.4.37-65.module+el8.10.0+23369+11a81384.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3235" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-49043" ref_url="https://www.suse.com/security/cve/CVE-2022-49043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1517.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1517.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49043/">CVE-2022-49043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49043">CVE-2022-49043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965015" comment="libxml2-2.9.7-18.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965016" comment="libxml2-devel-2.9.7-18.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965017" comment="python3-libxml2-2.9.7-18.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3236" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-49985" ref_url="https://www.suse.com/security/cve/CVE-2022-49985/" source="CVE"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15471.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15471.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49985/">CVE-2022-49985 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49985">CVE-2022-49985 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017680" comment="bpftool-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017681" comment="kernel-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017682" comment="kernel-abi-stablelists-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017683" comment="kernel-core-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017684" comment="kernel-cross-headers-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017685" comment="kernel-debug-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017686" comment="kernel-debug-core-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017688" comment="kernel-debug-modules-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017689" comment="kernel-debug-modules-extra-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017691" comment="kernel-doc-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017692" comment="kernel-headers-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017693" comment="kernel-modules-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017694" comment="kernel-modules-extra-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017695" comment="kernel-tools-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017696" comment="kernel-tools-libs-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017698" comment="perf-4.18.0-553.74.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017699" comment="python3-perf-4.18.0-553.74.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3237" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217/" source="CVE"/>
		<reference ref_id="CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219/" source="CVE"/>
		<reference ref_id="CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734/" source="CVE"/>
		<reference ref_id="CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736/" source="CVE"/>
		<reference ref_id="CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15687.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15687.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957327" comment="apcu-panel-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957328" comment="libzip-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957329" comment="libzip-devel-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957330" comment="libzip-tools-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018032" comment="php-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018033" comment="php-bcmath-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018034" comment="php-cli-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018035" comment="php-common-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018036" comment="php-dba-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018037" comment="php-dbg-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018038" comment="php-devel-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018039" comment="php-embedded-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018040" comment="php-enchant-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018041" comment="php-ffi-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018042" comment="php-fpm-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018043" comment="php-gd-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018044" comment="php-gmp-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018045" comment="php-intl-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018046" comment="php-ldap-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018047" comment="php-mbstring-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018048" comment="php-mysqlnd-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018049" comment="php-odbc-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018050" comment="php-opcache-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018051" comment="php-pdo-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957351" comment="php-pear-1.10.14-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957352" comment="php-pecl-apcu-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957353" comment="php-pecl-apcu-devel-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957354" comment="php-pecl-rrd-2.0.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957355" comment="php-pecl-xdebug3-3.2.2-2.module+el8.10.0+20798+00eaeb41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957356" comment="php-pecl-zip-1.22.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018052" comment="php-pgsql-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018053" comment="php-process-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018054" comment="php-snmp-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018055" comment="php-soap-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018056" comment="php-xml-8.2.28-1.module+el8.10.0+23472+dcd7a400 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3238" version="1" class="patch">
	<metadata>
		<title>security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017868" comment="cups-2.2.6-63.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017869" comment="cups-client-2.2.6-63.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017870" comment="cups-devel-2.2.6-63.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017871" comment="cups-filesystem-2.2.6-63.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017872" comment="cups-ipptool-2.2.6-63.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017873" comment="cups-libs-2.2.6-63.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017874" comment="cups-lpd-2.2.6-63.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3239" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-53125" ref_url="https://www.suse.com/security/cve/CVE-2023-53125/" source="CVE"/>
		<reference ref_id="CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350/" source="CVE"/>
		<reference ref_id="CVE-2025-38392" ref_url="https://www.suse.com/security/cve/CVE-2025-38392/" source="CVE"/>
		<reference ref_id="CVE-2025-38449" ref_url="https://www.suse.com/security/cve/CVE-2025-38449/" source="CVE"/>
		<reference ref_id="CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15785.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15785.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53125/">CVE-2023-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53125">CVE-2023-53125 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38392/">CVE-2025-38392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38449/">CVE-2025-38449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018186" comment="bpftool-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018187" comment="kernel-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018188" comment="kernel-abi-stablelists-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018189" comment="kernel-core-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018190" comment="kernel-cross-headers-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018191" comment="kernel-debug-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018192" comment="kernel-debug-core-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018194" comment="kernel-debug-modules-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018195" comment="kernel-debug-modules-extra-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018197" comment="kernel-doc-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018198" comment="kernel-headers-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018199" comment="kernel-modules-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018200" comment="kernel-modules-extra-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018201" comment="kernel-tools-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018202" comment="kernel-tools-libs-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018204" comment="perf-4.18.0-553.75.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018205" comment="python3-perf-4.18.0-553.75.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3240" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965845" comment="nodejs-18.20.6-1.module+el8.10.0+22776+24cd6c55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965846" comment="nodejs-devel-18.20.6-1.module+el8.10.0+22776+24cd6c55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965847" comment="nodejs-docs-18.20.6-1.module+el8.10.0+22776+24cd6c55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965848" comment="nodejs-full-i18n-18.20.6-1.module+el8.10.0+22776+24cd6c55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940506" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+21159+f5a7145d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940507" comment="nodejs-packaging-2021.06-4.module+el8.9.0+19439+7b18b275 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940508" comment="nodejs-packaging-bundler-2021.06-4.module+el8.9.0+19439+7b18b275 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965849" comment="npm-10.8.2-1.18.20.6.1.module+el8.10.0+22776+24cd6c55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3241" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4953" ref_url="https://www.suse.com/security/cve/CVE-2025-4953/" source="CVE"/>
		<reference ref_id="CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15904.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15904.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4953/">CVE-2025-4953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4953">CVE-2025-4953 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018206" comment="aardvark-dns-1.10.1-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018207" comment="buildah-1.33.12-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018208" comment="buildah-tests-1.33.12-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018209" comment="cockpit-podman-84.1-1.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018210" comment="conmon-2.1.10-1.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018211" comment="container-selinux-2.229.0-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018212" comment="containernetworking-plugins-1.4.0-6.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018213" comment="containers-common-1-82.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018214" comment="crit-3.18-5.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018215" comment="criu-3.18-5.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018216" comment="criu-devel-3.18-5.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018217" comment="criu-libs-3.18-5.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018218" comment="crun-1.14.3-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018219" comment="fuse-overlayfs-1.13-1.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018220" comment="libslirp-4.4.0-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018221" comment="libslirp-devel-4.4.0-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018222" comment="netavark-1.10.3-1.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018223" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018224" comment="podman-4.9.4-23.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018225" comment="podman-catatonit-4.9.4-23.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018226" comment="podman-docker-4.9.4-23.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018227" comment="podman-gvproxy-4.9.4-23.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018228" comment="podman-plugins-4.9.4-23.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018229" comment="podman-remote-4.9.4-23.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018230" comment="podman-tests-4.9.4-23.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018231" comment="python3-criu-3.18-5.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018232" comment="python3-podman-4.9.0-3.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018233" comment="runc-1.1.12-6.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018234" comment="skopeo-1.14.5-4.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018235" comment="skopeo-tests-1.14.5-4.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018236" comment="slirp4netns-1.2.3-1.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018237" comment="toolbox-0.0.99.5-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018238" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+23498+f7d19d48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018239" comment="udica-0.2.6-21.module+el8.10.0+23498+f7d19d48 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3242" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150/" source="CVE"/>
		<reference ref_id="CVE-2025-23083" ref_url="https://www.suse.com/security/cve/CVE-2025-23083/" source="CVE"/>
		<reference ref_id="CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1611.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1611.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23083/">CVE-2025-23083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23083">CVE-2025-23083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965850" comment="nodejs-22.13.1-1.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965851" comment="nodejs-devel-22.13.1-1.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965852" comment="nodejs-docs-22.13.1-1.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965853" comment="nodejs-full-i18n-22.13.1-1.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965854" comment="nodejs-libs-22.13.1-1.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965855" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965856" comment="nodejs-packaging-2021.06-4.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965857" comment="nodejs-packaging-bundler-2021.06-4.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965858" comment="npm-10.9.2-1.22.13.1.1.module+el8.10.0+22759+46b58560 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965859" comment="v8-12.4-devel-12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3243" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527/" source="CVE"/>
		<reference ref_id="CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528/" source="CVE"/>
		<reference ref_id="CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529/" source="CVE"/>
		<reference ref_id="CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532/" source="CVE"/>
		<reference ref_id="CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533/" source="CVE"/>
		<reference ref_id="CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536/" source="CVE"/>
		<reference ref_id="CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16260.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16260.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018763" comment="firefox-140.3.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3244" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-38461" ref_url="https://www.suse.com/security/cve/CVE-2025-38461/" source="CVE"/>
		<reference ref_id="CVE-2025-38498" ref_url="https://www.suse.com/security/cve/CVE-2025-38498/" source="CVE"/>
		<reference ref_id="CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16372.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16372.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38461/">CVE-2025-38461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38498/">CVE-2025-38498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019468" comment="bpftool-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019469" comment="kernel-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019470" comment="kernel-abi-stablelists-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019471" comment="kernel-core-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019472" comment="kernel-cross-headers-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019473" comment="kernel-debug-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019474" comment="kernel-debug-core-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019476" comment="kernel-debug-modules-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019477" comment="kernel-debug-modules-extra-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019479" comment="kernel-doc-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019480" comment="kernel-headers-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019481" comment="kernel-modules-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019482" comment="kernel-modules-extra-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019483" comment="kernel-tools-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019484" comment="kernel-tools-libs-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019486" comment="perf-4.18.0-553.76.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019487" comment="python3-perf-4.18.0-553.76.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3245" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527/" source="CVE"/>
		<reference ref_id="CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528/" source="CVE"/>
		<reference ref_id="CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529/" source="CVE"/>
		<reference ref_id="CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532/" source="CVE"/>
		<reference ref_id="CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533/" source="CVE"/>
		<reference ref_id="CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536/" source="CVE"/>
		<reference ref_id="CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16589.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16589.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019412" comment="thunderbird-140.3.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3246" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11053" ref_url="https://www.suse.com/security/cve/CVE-2024-11053/" source="CVE"/>
		<reference ref_id="CVE-2024-21193" ref_url="https://www.suse.com/security/cve/CVE-2024-21193/" source="CVE"/>
		<reference ref_id="CVE-2024-21194" ref_url="https://www.suse.com/security/cve/CVE-2024-21194/" source="CVE"/>
		<reference ref_id="CVE-2024-21196" ref_url="https://www.suse.com/security/cve/CVE-2024-21196/" source="CVE"/>
		<reference ref_id="CVE-2024-21197" ref_url="https://www.suse.com/security/cve/CVE-2024-21197/" source="CVE"/>
		<reference ref_id="CVE-2024-21198" ref_url="https://www.suse.com/security/cve/CVE-2024-21198/" source="CVE"/>
		<reference ref_id="CVE-2024-21199" ref_url="https://www.suse.com/security/cve/CVE-2024-21199/" source="CVE"/>
		<reference ref_id="CVE-2024-21201" ref_url="https://www.suse.com/security/cve/CVE-2024-21201/" source="CVE"/>
		<reference ref_id="CVE-2024-21203" ref_url="https://www.suse.com/security/cve/CVE-2024-21203/" source="CVE"/>
		<reference ref_id="CVE-2024-21212" ref_url="https://www.suse.com/security/cve/CVE-2024-21212/" source="CVE"/>
		<reference ref_id="CVE-2024-21213" ref_url="https://www.suse.com/security/cve/CVE-2024-21213/" source="CVE"/>
		<reference ref_id="CVE-2024-21218" ref_url="https://www.suse.com/security/cve/CVE-2024-21218/" source="CVE"/>
		<reference ref_id="CVE-2024-21219" ref_url="https://www.suse.com/security/cve/CVE-2024-21219/" source="CVE"/>
		<reference ref_id="CVE-2024-21230" ref_url="https://www.suse.com/security/cve/CVE-2024-21230/" source="CVE"/>
		<reference ref_id="CVE-2024-21231" ref_url="https://www.suse.com/security/cve/CVE-2024-21231/" source="CVE"/>
		<reference ref_id="CVE-2024-21236" ref_url="https://www.suse.com/security/cve/CVE-2024-21236/" source="CVE"/>
		<reference ref_id="CVE-2024-21237" ref_url="https://www.suse.com/security/cve/CVE-2024-21237/" source="CVE"/>
		<reference ref_id="CVE-2024-21238" ref_url="https://www.suse.com/security/cve/CVE-2024-21238/" source="CVE"/>
		<reference ref_id="CVE-2024-21239" ref_url="https://www.suse.com/security/cve/CVE-2024-21239/" source="CVE"/>
		<reference ref_id="CVE-2024-21241" ref_url="https://www.suse.com/security/cve/CVE-2024-21241/" source="CVE"/>
		<reference ref_id="CVE-2024-21247" ref_url="https://www.suse.com/security/cve/CVE-2024-21247/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="CVE-2024-7264" ref_url="https://www.suse.com/security/cve/CVE-2024-7264/" source="CVE"/>
		<reference ref_id="CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490/" source="CVE"/>
		<reference ref_id="CVE-2025-21491" ref_url="https://www.suse.com/security/cve/CVE-2025-21491/" source="CVE"/>
		<reference ref_id="CVE-2025-21494" ref_url="https://www.suse.com/security/cve/CVE-2025-21494/" source="CVE"/>
		<reference ref_id="CVE-2025-21497" ref_url="https://www.suse.com/security/cve/CVE-2025-21497/" source="CVE"/>
		<reference ref_id="CVE-2025-21500" ref_url="https://www.suse.com/security/cve/CVE-2025-21500/" source="CVE"/>
		<reference ref_id="CVE-2025-21501" ref_url="https://www.suse.com/security/cve/CVE-2025-21501/" source="CVE"/>
		<reference ref_id="CVE-2025-21503" ref_url="https://www.suse.com/security/cve/CVE-2025-21503/" source="CVE"/>
		<reference ref_id="CVE-2025-21504" ref_url="https://www.suse.com/security/cve/CVE-2025-21504/" source="CVE"/>
		<reference ref_id="CVE-2025-21505" ref_url="https://www.suse.com/security/cve/CVE-2025-21505/" source="CVE"/>
		<reference ref_id="CVE-2025-21518" ref_url="https://www.suse.com/security/cve/CVE-2025-21518/" source="CVE"/>
		<reference ref_id="CVE-2025-21519" ref_url="https://www.suse.com/security/cve/CVE-2025-21519/" source="CVE"/>
		<reference ref_id="CVE-2025-21520" ref_url="https://www.suse.com/security/cve/CVE-2025-21520/" source="CVE"/>
		<reference ref_id="CVE-2025-21521" ref_url="https://www.suse.com/security/cve/CVE-2025-21521/" source="CVE"/>
		<reference ref_id="CVE-2025-21522" ref_url="https://www.suse.com/security/cve/CVE-2025-21522/" source="CVE"/>
		<reference ref_id="CVE-2025-21523" ref_url="https://www.suse.com/security/cve/CVE-2025-21523/" source="CVE"/>
		<reference ref_id="CVE-2025-21525" ref_url="https://www.suse.com/security/cve/CVE-2025-21525/" source="CVE"/>
		<reference ref_id="CVE-2025-21529" ref_url="https://www.suse.com/security/cve/CVE-2025-21529/" source="CVE"/>
		<reference ref_id="CVE-2025-21531" ref_url="https://www.suse.com/security/cve/CVE-2025-21531/" source="CVE"/>
		<reference ref_id="CVE-2025-21534" ref_url="https://www.suse.com/security/cve/CVE-2025-21534/" source="CVE"/>
		<reference ref_id="CVE-2025-21536" ref_url="https://www.suse.com/security/cve/CVE-2025-21536/" source="CVE"/>
		<reference ref_id="CVE-2025-21540" ref_url="https://www.suse.com/security/cve/CVE-2025-21540/" source="CVE"/>
		<reference ref_id="CVE-2025-21543" ref_url="https://www.suse.com/security/cve/CVE-2025-21543/" source="CVE"/>
		<reference ref_id="CVE-2025-21546" ref_url="https://www.suse.com/security/cve/CVE-2025-21546/" source="CVE"/>
		<reference ref_id="CVE-2025-21555" ref_url="https://www.suse.com/security/cve/CVE-2025-21555/" source="CVE"/>
		<reference ref_id="CVE-2025-21559" ref_url="https://www.suse.com/security/cve/CVE-2025-21559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1673.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1673.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11053/">CVE-2024-11053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21193/">CVE-2024-21193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21193">CVE-2024-21193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21194/">CVE-2024-21194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21194">CVE-2024-21194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21196/">CVE-2024-21196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21196">CVE-2024-21196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21197/">CVE-2024-21197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21197">CVE-2024-21197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21198/">CVE-2024-21198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21198">CVE-2024-21198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21199/">CVE-2024-21199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21199">CVE-2024-21199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21201/">CVE-2024-21201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21201">CVE-2024-21201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21203/">CVE-2024-21203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21203">CVE-2024-21203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21212/">CVE-2024-21212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21212">CVE-2024-21212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21213/">CVE-2024-21213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21213">CVE-2024-21213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21218/">CVE-2024-21218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21218">CVE-2024-21218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21219/">CVE-2024-21219 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21219">CVE-2024-21219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21230/">CVE-2024-21230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21230">CVE-2024-21230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21231/">CVE-2024-21231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21231">CVE-2024-21231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21236/">CVE-2024-21236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21236">CVE-2024-21236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21237/">CVE-2024-21237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21237">CVE-2024-21237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21238/">CVE-2024-21238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21238">CVE-2024-21238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21239/">CVE-2024-21239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21239">CVE-2024-21239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21241/">CVE-2024-21241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21241">CVE-2024-21241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21247/">CVE-2024-21247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21247">CVE-2024-21247 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7264/">CVE-2024-7264 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21491/">CVE-2025-21491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21491">CVE-2025-21491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21494/">CVE-2025-21494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21494">CVE-2025-21494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21497/">CVE-2025-21497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21497">CVE-2025-21497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21500/">CVE-2025-21500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21500">CVE-2025-21500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21501/">CVE-2025-21501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21501">CVE-2025-21501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21503/">CVE-2025-21503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21503">CVE-2025-21503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21504/">CVE-2025-21504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21504">CVE-2025-21504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21505/">CVE-2025-21505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21505">CVE-2025-21505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21518/">CVE-2025-21518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21518">CVE-2025-21518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21519/">CVE-2025-21519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21519">CVE-2025-21519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21520/">CVE-2025-21520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21520">CVE-2025-21520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21521/">CVE-2025-21521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21521">CVE-2025-21521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21522/">CVE-2025-21522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21522">CVE-2025-21522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21523/">CVE-2025-21523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21523">CVE-2025-21523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21525/">CVE-2025-21525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21525">CVE-2025-21525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21529/">CVE-2025-21529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21529">CVE-2025-21529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21531/">CVE-2025-21531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21531">CVE-2025-21531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21534/">CVE-2025-21534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21534">CVE-2025-21534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21536/">CVE-2025-21536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21536">CVE-2025-21536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21540/">CVE-2025-21540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21540">CVE-2025-21540 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21543/">CVE-2025-21543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21543">CVE-2025-21543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21546/">CVE-2025-21546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21546">CVE-2025-21546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21555/">CVE-2025-21555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21555">CVE-2025-21555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21559/">CVE-2025-21559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21559">CVE-2025-21559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966641" comment="mecab-0.996-2.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966642" comment="mecab-devel-0.996-2.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966643" comment="mecab-ipadic-2.7.0.20070801-17.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966644" comment="mecab-ipadic-EUCJP-2.7.0.20070801-17.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966645" comment="mysql-8.0.41-1.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966646" comment="mysql-common-8.0.41-1.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966647" comment="mysql-devel-8.0.41-1.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966648" comment="mysql-errmsg-8.0.41-1.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966649" comment="mysql-libs-8.0.41-1.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966650" comment="mysql-server-8.0.41-1.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966651" comment="mysql-test-8.0.41-1.module+el8.10.0+22857+7f331edd is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3247" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11187" ref_url="https://www.suse.com/security/cve/CVE-2024-11187/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1675.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1675.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11187/">CVE-2024-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11187">CVE-2024-11187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966058" comment="bind-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966059" comment="bind-chroot-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966060" comment="bind-devel-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966061" comment="bind-export-devel-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966062" comment="bind-export-libs-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966063" comment="bind-libs-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966064" comment="bind-libs-lite-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966065" comment="bind-license-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966066" comment="bind-lite-devel-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966067" comment="bind-pkcs11-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966068" comment="bind-pkcs11-devel-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966069" comment="bind-pkcs11-libs-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966070" comment="bind-pkcs11-utils-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966071" comment="bind-sdb-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966072" comment="bind-sdb-chroot-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966073" comment="bind-utils-9.11.36-16.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966074" comment="python3-bind-9.11.36-16.el8_10.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3248" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11187" ref_url="https://www.suse.com/security/cve/CVE-2024-11187/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1676.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1676.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11187/">CVE-2024-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11187">CVE-2024-11187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966075" comment="bind9.16-9.16.23-0.22.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966076" comment="bind9.16-chroot-9.16.23-0.22.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966077" comment="bind9.16-devel-9.16.23-0.22.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966078" comment="bind9.16-dnssec-utils-9.16.23-0.22.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966079" comment="bind9.16-doc-9.16.23-0.22.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966080" comment="bind9.16-libs-9.16.23-0.22.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966081" comment="bind9.16-license-9.16.23-0.22.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966082" comment="bind9.16-utils-9.16.23-0.22.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966083" comment="python3-bind9.16-9.16.23-0.22.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3249" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-26465" ref_url="https://www.suse.com/security/cve/CVE-2025-26465/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16823.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16823.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-26465/">CVE-2025-26465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010019783" comment="openssh-8.0p1-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019784" comment="openssh-askpass-8.0p1-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019785" comment="openssh-cavs-8.0p1-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019786" comment="openssh-clients-8.0p1-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019787" comment="openssh-keycat-8.0p1-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019788" comment="openssh-ldap-8.0p1-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019789" comment="openssh-server-8.0p1-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019790" comment="pam_ssh_agent_auth-0.10.3-7.26.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3250" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21574" ref_url="https://www.suse.com/security/cve/CVE-2025-21574/" source="CVE"/>
		<reference ref_id="CVE-2025-21575" ref_url="https://www.suse.com/security/cve/CVE-2025-21575/" source="CVE"/>
		<reference ref_id="CVE-2025-21577" ref_url="https://www.suse.com/security/cve/CVE-2025-21577/" source="CVE"/>
		<reference ref_id="CVE-2025-21579" ref_url="https://www.suse.com/security/cve/CVE-2025-21579/" source="CVE"/>
		<reference ref_id="CVE-2025-21580" ref_url="https://www.suse.com/security/cve/CVE-2025-21580/" source="CVE"/>
		<reference ref_id="CVE-2025-21581" ref_url="https://www.suse.com/security/cve/CVE-2025-21581/" source="CVE"/>
		<reference ref_id="CVE-2025-21584" ref_url="https://www.suse.com/security/cve/CVE-2025-21584/" source="CVE"/>
		<reference ref_id="CVE-2025-21585" ref_url="https://www.suse.com/security/cve/CVE-2025-21585/" source="CVE"/>
		<reference ref_id="CVE-2025-30681" ref_url="https://www.suse.com/security/cve/CVE-2025-30681/" source="CVE"/>
		<reference ref_id="CVE-2025-30682" ref_url="https://www.suse.com/security/cve/CVE-2025-30682/" source="CVE"/>
		<reference ref_id="CVE-2025-30683" ref_url="https://www.suse.com/security/cve/CVE-2025-30683/" source="CVE"/>
		<reference ref_id="CVE-2025-30684" ref_url="https://www.suse.com/security/cve/CVE-2025-30684/" source="CVE"/>
		<reference ref_id="CVE-2025-30685" ref_url="https://www.suse.com/security/cve/CVE-2025-30685/" source="CVE"/>
		<reference ref_id="CVE-2025-30687" ref_url="https://www.suse.com/security/cve/CVE-2025-30687/" source="CVE"/>
		<reference ref_id="CVE-2025-30688" ref_url="https://www.suse.com/security/cve/CVE-2025-30688/" source="CVE"/>
		<reference ref_id="CVE-2025-30689" ref_url="https://www.suse.com/security/cve/CVE-2025-30689/" source="CVE"/>
		<reference ref_id="CVE-2025-30693" ref_url="https://www.suse.com/security/cve/CVE-2025-30693/" source="CVE"/>
		<reference ref_id="CVE-2025-30695" ref_url="https://www.suse.com/security/cve/CVE-2025-30695/" source="CVE"/>
		<reference ref_id="CVE-2025-30696" ref_url="https://www.suse.com/security/cve/CVE-2025-30696/" source="CVE"/>
		<reference ref_id="CVE-2025-30699" ref_url="https://www.suse.com/security/cve/CVE-2025-30699/" source="CVE"/>
		<reference ref_id="CVE-2025-30703" ref_url="https://www.suse.com/security/cve/CVE-2025-30703/" source="CVE"/>
		<reference ref_id="CVE-2025-30704" ref_url="https://www.suse.com/security/cve/CVE-2025-30704/" source="CVE"/>
		<reference ref_id="CVE-2025-30705" ref_url="https://www.suse.com/security/cve/CVE-2025-30705/" source="CVE"/>
		<reference ref_id="CVE-2025-30715" ref_url="https://www.suse.com/security/cve/CVE-2025-30715/" source="CVE"/>
		<reference ref_id="CVE-2025-30721" ref_url="https://www.suse.com/security/cve/CVE-2025-30721/" source="CVE"/>
		<reference ref_id="CVE-2025-30722" ref_url="https://www.suse.com/security/cve/CVE-2025-30722/" source="CVE"/>
		<reference ref_id="CVE-2025-50077" ref_url="https://www.suse.com/security/cve/CVE-2025-50077/" source="CVE"/>
		<reference ref_id="CVE-2025-50078" ref_url="https://www.suse.com/security/cve/CVE-2025-50078/" source="CVE"/>
		<reference ref_id="CVE-2025-50079" ref_url="https://www.suse.com/security/cve/CVE-2025-50079/" source="CVE"/>
		<reference ref_id="CVE-2025-50080" ref_url="https://www.suse.com/security/cve/CVE-2025-50080/" source="CVE"/>
		<reference ref_id="CVE-2025-50081" ref_url="https://www.suse.com/security/cve/CVE-2025-50081/" source="CVE"/>
		<reference ref_id="CVE-2025-50082" ref_url="https://www.suse.com/security/cve/CVE-2025-50082/" source="CVE"/>
		<reference ref_id="CVE-2025-50083" ref_url="https://www.suse.com/security/cve/CVE-2025-50083/" source="CVE"/>
		<reference ref_id="CVE-2025-50084" ref_url="https://www.suse.com/security/cve/CVE-2025-50084/" source="CVE"/>
		<reference ref_id="CVE-2025-50085" ref_url="https://www.suse.com/security/cve/CVE-2025-50085/" source="CVE"/>
		<reference ref_id="CVE-2025-50086" ref_url="https://www.suse.com/security/cve/CVE-2025-50086/" source="CVE"/>
		<reference ref_id="CVE-2025-50087" ref_url="https://www.suse.com/security/cve/CVE-2025-50087/" source="CVE"/>
		<reference ref_id="CVE-2025-50088" ref_url="https://www.suse.com/security/cve/CVE-2025-50088/" source="CVE"/>
		<reference ref_id="CVE-2025-50091" ref_url="https://www.suse.com/security/cve/CVE-2025-50091/" source="CVE"/>
		<reference ref_id="CVE-2025-50092" ref_url="https://www.suse.com/security/cve/CVE-2025-50092/" source="CVE"/>
		<reference ref_id="CVE-2025-50093" ref_url="https://www.suse.com/security/cve/CVE-2025-50093/" source="CVE"/>
		<reference ref_id="CVE-2025-50094" ref_url="https://www.suse.com/security/cve/CVE-2025-50094/" source="CVE"/>
		<reference ref_id="CVE-2025-50096" ref_url="https://www.suse.com/security/cve/CVE-2025-50096/" source="CVE"/>
		<reference ref_id="CVE-2025-50097" ref_url="https://www.suse.com/security/cve/CVE-2025-50097/" source="CVE"/>
		<reference ref_id="CVE-2025-50098" ref_url="https://www.suse.com/security/cve/CVE-2025-50098/" source="CVE"/>
		<reference ref_id="CVE-2025-50099" ref_url="https://www.suse.com/security/cve/CVE-2025-50099/" source="CVE"/>
		<reference ref_id="CVE-2025-50100" ref_url="https://www.suse.com/security/cve/CVE-2025-50100/" source="CVE"/>
		<reference ref_id="CVE-2025-50101" ref_url="https://www.suse.com/security/cve/CVE-2025-50101/" source="CVE"/>
		<reference ref_id="CVE-2025-50102" ref_url="https://www.suse.com/security/cve/CVE-2025-50102/" source="CVE"/>
		<reference ref_id="CVE-2025-50104" ref_url="https://www.suse.com/security/cve/CVE-2025-50104/" source="CVE"/>
		<reference ref_id="CVE-2025-53023" ref_url="https://www.suse.com/security/cve/CVE-2025-53023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16861.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16861.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21574/">CVE-2025-21574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21574">CVE-2025-21574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21575/">CVE-2025-21575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21575">CVE-2025-21575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21577/">CVE-2025-21577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21577">CVE-2025-21577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21579/">CVE-2025-21579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21579">CVE-2025-21579 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21580/">CVE-2025-21580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21580">CVE-2025-21580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21581/">CVE-2025-21581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21581">CVE-2025-21581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21584/">CVE-2025-21584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21584">CVE-2025-21584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21585/">CVE-2025-21585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21585">CVE-2025-21585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30681/">CVE-2025-30681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30681">CVE-2025-30681 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30682/">CVE-2025-30682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30682">CVE-2025-30682 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30683/">CVE-2025-30683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30683">CVE-2025-30683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30684/">CVE-2025-30684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30684">CVE-2025-30684 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30685/">CVE-2025-30685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30685">CVE-2025-30685 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30687/">CVE-2025-30687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30687">CVE-2025-30687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30688/">CVE-2025-30688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30688">CVE-2025-30688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30689/">CVE-2025-30689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30689">CVE-2025-30689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-30693/">CVE-2025-30693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30693">CVE-2025-30693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30695/">CVE-2025-30695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30695">CVE-2025-30695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30696/">CVE-2025-30696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30696">CVE-2025-30696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30699/">CVE-2025-30699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30699">CVE-2025-30699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30703/">CVE-2025-30703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30703">CVE-2025-30703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30704/">CVE-2025-30704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30704">CVE-2025-30704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30705/">CVE-2025-30705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30705">CVE-2025-30705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30715/">CVE-2025-30715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30715">CVE-2025-30715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30721/">CVE-2025-30721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30721">CVE-2025-30721 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30722/">CVE-2025-30722 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30722">CVE-2025-30722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50077/">CVE-2025-50077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50077">CVE-2025-50077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50078/">CVE-2025-50078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50078">CVE-2025-50078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50079/">CVE-2025-50079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50079">CVE-2025-50079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50080/">CVE-2025-50080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50080">CVE-2025-50080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50081/">CVE-2025-50081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50081">CVE-2025-50081 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50082/">CVE-2025-50082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50082">CVE-2025-50082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50083/">CVE-2025-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50083">CVE-2025-50083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50084/">CVE-2025-50084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50084">CVE-2025-50084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50085/">CVE-2025-50085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50085">CVE-2025-50085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50086/">CVE-2025-50086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50086">CVE-2025-50086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50087/">CVE-2025-50087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50087">CVE-2025-50087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50088/">CVE-2025-50088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50088">CVE-2025-50088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50091/">CVE-2025-50091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50091">CVE-2025-50091 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50092/">CVE-2025-50092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50092">CVE-2025-50092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50093/">CVE-2025-50093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50093">CVE-2025-50093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50094/">CVE-2025-50094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50094">CVE-2025-50094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50096/">CVE-2025-50096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50096">CVE-2025-50096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50097/">CVE-2025-50097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50097">CVE-2025-50097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50098/">CVE-2025-50098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50098">CVE-2025-50098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50099/">CVE-2025-50099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50099">CVE-2025-50099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50100/">CVE-2025-50100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50100">CVE-2025-50100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50101/">CVE-2025-50101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50101">CVE-2025-50101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50102/">CVE-2025-50102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50102">CVE-2025-50102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50104/">CVE-2025-50104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50104">CVE-2025-50104 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53023/">CVE-2025-53023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53023">CVE-2025-53023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966641" comment="mecab-0.996-2.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966642" comment="mecab-devel-0.996-2.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966643" comment="mecab-ipadic-2.7.0.20070801-17.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966644" comment="mecab-ipadic-EUCJP-2.7.0.20070801-17.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019791" comment="mysql-8.0.43-1.module+el8.10.0+23526+fabc920a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019792" comment="mysql-common-8.0.43-1.module+el8.10.0+23526+fabc920a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019793" comment="mysql-devel-8.0.43-1.module+el8.10.0+23526+fabc920a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019794" comment="mysql-errmsg-8.0.43-1.module+el8.10.0+23526+fabc920a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019795" comment="mysql-libs-8.0.43-1.module+el8.10.0+23526+fabc920a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019796" comment="mysql-server-8.0.43-1.module+el8.10.0+23526+fabc920a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010019797" comment="mysql-test-8.0.43-1.module+el8.10.0+23526+fabc920a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3251" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50087" ref_url="https://www.suse.com/security/cve/CVE-2022-50087/" source="CVE"/>
		<reference ref_id="CVE-2025-22026" ref_url="https://www.suse.com/security/cve/CVE-2025-22026/" source="CVE"/>
		<reference ref_id="CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797/" source="CVE"/>
		<reference ref_id="CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823/" source="CVE"/>
		<reference ref_id="CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16919.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16919.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50087/">CVE-2022-50087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50087">CVE-2022-50087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22026/">CVE-2025-22026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22026">CVE-2025-22026 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020030" comment="bpftool-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020031" comment="kernel-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020032" comment="kernel-abi-stablelists-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020033" comment="kernel-core-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020034" comment="kernel-cross-headers-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020035" comment="kernel-debug-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020036" comment="kernel-debug-core-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020038" comment="kernel-debug-modules-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020039" comment="kernel-debug-modules-extra-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020041" comment="kernel-doc-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020042" comment="kernel-headers-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020043" comment="kernel-modules-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020044" comment="kernel-modules-extra-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020045" comment="kernel-tools-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020046" comment="kernel-tools-libs-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020048" comment="perf-4.18.0-553.77.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020049" comment="python3-perf-4.18.0-553.77.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3252" version="1" class="patch">
	<metadata>
		<title>security update for perl-JSON-XS (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40928" ref_url="https://www.suse.com/security/cve/CVE-2025-40928/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40928/">CVE-2025-40928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40928">CVE-2025-40928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020778" comment="perl-JSON-XS-3.04-4.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3253" version="1" class="patch">
	<metadata>
		<title>security update for libpq (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1737.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1737.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965292" comment="libpq-13.20-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965293" comment="libpq-devel-13.20-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3254" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-38527" ref_url="https://www.suse.com/security/cve/CVE-2025-38527/" source="CVE"/>
		<reference ref_id="CVE-2025-39730" ref_url="https://www.suse.com/security/cve/CVE-2025-39730/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17397.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17397.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38527/">CVE-2025-38527 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39730/">CVE-2025-39730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020534" comment="bpftool-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020535" comment="kernel-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020536" comment="kernel-abi-stablelists-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020537" comment="kernel-core-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020538" comment="kernel-cross-headers-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020539" comment="kernel-debug-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020540" comment="kernel-debug-core-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020542" comment="kernel-debug-modules-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020543" comment="kernel-debug-modules-extra-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020545" comment="kernel-doc-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020546" comment="kernel-headers-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020547" comment="kernel-modules-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020548" comment="kernel-modules-extra-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020549" comment="kernel-tools-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020550" comment="kernel-tools-libs-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020552" comment="perf-4.18.0-553.78.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020553" comment="python3-perf-4.18.0-553.78.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3255" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1740.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1740.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956875" comment="pg_repack-1.5.1-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881424" comment="pgaudit-16.0-1.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881425" comment="postgres-decoderbufs-2.4.0-1.Final.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966392" comment="postgresql-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966393" comment="postgresql-contrib-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966394" comment="postgresql-docs-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966395" comment="postgresql-plperl-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966396" comment="postgresql-plpython3-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966397" comment="postgresql-pltcl-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966398" comment="postgresql-private-devel-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966399" comment="postgresql-private-libs-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966400" comment="postgresql-server-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966401" comment="postgresql-server-devel-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966402" comment="postgresql-static-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966403" comment="postgresql-test-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966404" comment="postgresql-test-rpm-macros-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966405" comment="postgresql-upgrade-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966406" comment="postgresql-upgrade-devel-16.8-1.module+el8.10.0+22867+e4e13b1c is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3256" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-32988" ref_url="https://www.suse.com/security/cve/CVE-2025-32988/" source="CVE"/>
		<reference ref_id="CVE-2025-32990" ref_url="https://www.suse.com/security/cve/CVE-2025-32990/" source="CVE"/>
		<reference ref_id="CVE-2025-6395" ref_url="https://www.suse.com/security/cve/CVE-2025-6395/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17415.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17415.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32988/">CVE-2025-32988 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32990/">CVE-2025-32990 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6395/">CVE-2025-6395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6395">CVE-2025-6395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020379" comment="gnutls-3.6.16-8.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020380" comment="gnutls-c++-3.6.16-8.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020381" comment="gnutls-dane-3.6.16-8.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020382" comment="gnutls-devel-3.6.16-8.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020383" comment="gnutls-utils-3.6.16-8.el8_10.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3257" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-41244" ref_url="https://www.suse.com/security/cve/CVE-2025-41244/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17509.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17509.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-41244/">CVE-2025-41244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41244">CVE-2025-41244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020384" comment="open-vm-tools-12.3.5-2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020385" comment="open-vm-tools-desktop-12.3.5-2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020386" comment="open-vm-tools-salt-minion-12.3.5-2.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020387" comment="open-vm-tools-sdmp-12.3.5-2.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3258" version="1" class="patch">
	<metadata>
		<title>security update for compat-libtiff3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17675.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17675.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020554" comment="compat-libtiff3-3.9.4-14.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3259" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-53905" ref_url="https://www.suse.com/security/cve/CVE-2025-53905/" source="CVE"/>
		<reference ref_id="CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17715.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17715.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53905/">CVE-2025-53905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53905">CVE-2025-53905 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020555" comment="vim-X11-8.0.1763-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020556" comment="vim-common-8.0.1763-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020557" comment="vim-enhanced-8.0.1763-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020558" comment="vim-filesystem-8.0.1763-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020559" comment="vim-minimal-8.0.1763-21.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3260" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50228" ref_url="https://www.suse.com/security/cve/CVE-2022-50228/" source="CVE"/>
		<reference ref_id="CVE-2023-53305" ref_url="https://www.suse.com/security/cve/CVE-2023-53305/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17797.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17797.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50228/">CVE-2022-50228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50228">CVE-2022-50228 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53305/">CVE-2023-53305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53305">CVE-2023-53305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020858" comment="bpftool-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020859" comment="kernel-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020860" comment="kernel-abi-stablelists-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020861" comment="kernel-core-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020862" comment="kernel-cross-headers-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020863" comment="kernel-debug-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020864" comment="kernel-debug-core-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020866" comment="kernel-debug-modules-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020867" comment="kernel-debug-modules-extra-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020869" comment="kernel-doc-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020870" comment="kernel-headers-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020871" comment="kernel-modules-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020872" comment="kernel-modules-extra-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020873" comment="kernel-tools-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020874" comment="kernel-tools-libs-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020876" comment="perf-4.18.0-553.79.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020877" comment="python3-perf-4.18.0-553.79.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3261" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-31223" ref_url="https://www.suse.com/security/cve/CVE-2025-31223/" source="CVE"/>
		<reference ref_id="CVE-2025-31277" ref_url="https://www.suse.com/security/cve/CVE-2025-31277/" source="CVE"/>
		<reference ref_id="CVE-2025-43272" ref_url="https://www.suse.com/security/cve/CVE-2025-43272/" source="CVE"/>
		<reference ref_id="CVE-2025-43342" ref_url="https://www.suse.com/security/cve/CVE-2025-43342/" source="CVE"/>
		<reference ref_id="CVE-2025-43356" ref_url="https://www.suse.com/security/cve/CVE-2025-43356/" source="CVE"/>
		<reference ref_id="CVE-2025-43368" ref_url="https://www.suse.com/security/cve/CVE-2025-43368/" source="CVE"/>
		<reference ref_id="CVE-2025-43419" ref_url="https://www.suse.com/security/cve/CVE-2025-43419/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17802.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17802.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31223/">CVE-2025-31223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31223">CVE-2025-31223 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31277/">CVE-2025-31277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31277">CVE-2025-31277 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43272/">CVE-2025-43272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43272">CVE-2025-43272 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-43342/">CVE-2025-43342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43342">CVE-2025-43342 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43356/">CVE-2025-43356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43356">CVE-2025-43356 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-43368/">CVE-2025-43368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43368">CVE-2025-43368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43419/">CVE-2025-43419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43419">CVE-2025-43419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020878" comment="webkit2gtk3-2.50.0-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020879" comment="webkit2gtk3-devel-2.50.0-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020880" comment="webkit2gtk3-jsc-2.50.0-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020881" comment="webkit2gtk3-jsc-devel-2.50.0-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3262" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-43343" ref_url="https://www.suse.com/security/cve/CVE-2025-43343/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18070.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18070.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43343/">CVE-2025-43343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43343">CVE-2025-43343 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021771" comment="webkit2gtk3-2.50.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021772" comment="webkit2gtk3-devel-2.50.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021773" comment="webkit2gtk3-jsc-2.50.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021774" comment="webkit2gtk3-jsc-devel-2.50.1-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3263" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-55247" ref_url="https://www.suse.com/security/cve/CVE-2025-55247/" source="CVE"/>
		<reference ref_id="CVE-2025-55248" ref_url="https://www.suse.com/security/cve/CVE-2025-55248/" source="CVE"/>
		<reference ref_id="CVE-2025-55315" ref_url="https://www.suse.com/security/cve/CVE-2025-55315/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18148.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18148.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55247/">CVE-2025-55247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55247">CVE-2025-55247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55248/">CVE-2025-55248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55248">CVE-2025-55248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55315/">CVE-2025-55315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55315">CVE-2025-55315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021775" comment="aspnetcore-runtime-8.0-8.0.21-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021776" comment="aspnetcore-runtime-dbg-8.0-8.0.21-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021777" comment="aspnetcore-targeting-pack-8.0-8.0.21-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021778" comment="dotnet-apphost-pack-8.0-8.0.21-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021779" comment="dotnet-hostfxr-8.0-8.0.21-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021780" comment="dotnet-runtime-8.0-8.0.21-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021781" comment="dotnet-runtime-dbg-8.0-8.0.21-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021782" comment="dotnet-sdk-8.0-8.0.121-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021783" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021784" comment="dotnet-sdk-dbg-8.0-8.0.121-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021785" comment="dotnet-targeting-pack-8.0-8.0.21-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021786" comment="dotnet-templates-8.0-8.0.121-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3264" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-55247" ref_url="https://www.suse.com/security/cve/CVE-2025-55247/" source="CVE"/>
		<reference ref_id="CVE-2025-55248" ref_url="https://www.suse.com/security/cve/CVE-2025-55248/" source="CVE"/>
		<reference ref_id="CVE-2025-55315" ref_url="https://www.suse.com/security/cve/CVE-2025-55315/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18150.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18150.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55247/">CVE-2025-55247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55247">CVE-2025-55247 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55248/">CVE-2025-55248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55248">CVE-2025-55248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55315/">CVE-2025-55315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55315">CVE-2025-55315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010021787" comment="aspnetcore-runtime-9.0-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021788" comment="aspnetcore-runtime-dbg-9.0-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021789" comment="aspnetcore-targeting-pack-9.0-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021790" comment="dotnet-9.0.111-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021791" comment="dotnet-apphost-pack-9.0-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021792" comment="dotnet-host-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021793" comment="dotnet-hostfxr-9.0-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021794" comment="dotnet-runtime-9.0-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021795" comment="dotnet-runtime-dbg-9.0-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021796" comment="dotnet-sdk-9.0-9.0.111-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021797" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021798" comment="dotnet-sdk-aot-9.0-9.0.111-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021799" comment="dotnet-sdk-dbg-9.0-9.0.111-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021800" comment="dotnet-targeting-pack-9.0-9.0.10-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021801" comment="dotnet-templates-9.0-9.0.111-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021802" comment="netstandard-targeting-pack-2.1-9.0.111-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3265" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708/" source="CVE"/>
		<reference ref_id="CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709/" source="CVE"/>
		<reference ref_id="CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710/" source="CVE"/>
		<reference ref_id="CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711/" source="CVE"/>
		<reference ref_id="CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712/" source="CVE"/>
		<reference ref_id="CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714/" source="CVE"/>
		<reference ref_id="CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18285.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18285.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022617" comment="firefox-140.4.0-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3266" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-5318" ref_url="https://www.suse.com/security/cve/CVE-2025-5318/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18286.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18286.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5318/">CVE-2025-5318 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5318">CVE-2025-5318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022337" comment="libssh-0.9.6-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022338" comment="libssh-config-0.9.6-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022339" comment="libssh-devel-0.9.6-15.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3267" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-53373" ref_url="https://www.suse.com/security/cve/CVE-2023-53373/" source="CVE"/>
		<reference ref_id="CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751/" source="CVE"/>
		<reference ref_id="CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18297.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18297.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53373/">CVE-2023-53373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53373">CVE-2023-53373 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023042" comment="bpftool-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023043" comment="kernel-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023044" comment="kernel-abi-stablelists-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023045" comment="kernel-core-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023046" comment="kernel-cross-headers-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023047" comment="kernel-debug-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023048" comment="kernel-debug-core-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023050" comment="kernel-debug-modules-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023051" comment="kernel-debug-modules-extra-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023053" comment="kernel-doc-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023054" comment="kernel-headers-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023055" comment="kernel-modules-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023056" comment="kernel-modules-extra-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023057" comment="kernel-tools-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023058" comment="kernel-tools-libs-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023060" comment="perf-4.18.0-553.80.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023061" comment="python3-perf-4.18.0-553.80.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3268" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18815.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18815.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023351" comment="java-1.8.0-openjdk-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023352" comment="java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023353" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.472.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023354" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.472.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023355" comment="java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023356" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023357" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023358" comment="java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023359" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023360" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023361" comment="java-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023362" comment="java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023363" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023364" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023365" comment="java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023366" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023367" comment="java-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023368" comment="java-1.8.0-openjdk-src-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023369" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023370" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3269" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18818.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18818.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025669" comment="java-11-openjdk-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025494" comment="java-11-openjdk-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025670" comment="java-11-openjdk-demo-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025496" comment="java-11-openjdk-demo-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025497" comment="java-11-openjdk-demo-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025498" comment="java-11-openjdk-demo-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025671" comment="java-11-openjdk-devel-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025500" comment="java-11-openjdk-devel-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025501" comment="java-11-openjdk-devel-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025502" comment="java-11-openjdk-devel-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025503" comment="java-11-openjdk-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025672" comment="java-11-openjdk-headless-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025505" comment="java-11-openjdk-headless-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025506" comment="java-11-openjdk-headless-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025507" comment="java-11-openjdk-headless-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025673" comment="java-11-openjdk-javadoc-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025509" comment="java-11-openjdk-javadoc-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025674" comment="java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025511" comment="java-11-openjdk-javadoc-zip-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025675" comment="java-11-openjdk-jmods-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025513" comment="java-11-openjdk-jmods-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025514" comment="java-11-openjdk-jmods-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025515" comment="java-11-openjdk-jmods-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025516" comment="java-11-openjdk-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025676" comment="java-11-openjdk-src-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025518" comment="java-11-openjdk-src-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025519" comment="java-11-openjdk-src-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025520" comment="java-11-openjdk-src-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025677" comment="java-11-openjdk-static-libs-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025522" comment="java-11-openjdk-static-libs-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025523" comment="java-11-openjdk-static-libs-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025524" comment="java-11-openjdk-static-libs-slowdebug-11.0.29.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3270" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18821.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18821.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023371" comment="java-17-openjdk-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023372" comment="java-17-openjdk-demo-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023373" comment="java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023374" comment="java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023375" comment="java-17-openjdk-devel-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023376" comment="java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023377" comment="java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023378" comment="java-17-openjdk-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023379" comment="java-17-openjdk-headless-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023380" comment="java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023381" comment="java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023382" comment="java-17-openjdk-javadoc-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023383" comment="java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023384" comment="java-17-openjdk-jmods-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023385" comment="java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023386" comment="java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023387" comment="java-17-openjdk-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023388" comment="java-17-openjdk-src-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023389" comment="java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023390" comment="java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023391" comment="java-17-openjdk-static-libs-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023392" comment="java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023393" comment="java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3271" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<reference ref_id="CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18824.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18824.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010023394" comment="java-21-openjdk-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023395" comment="java-21-openjdk-demo-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023396" comment="java-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023397" comment="java-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023398" comment="java-21-openjdk-devel-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023399" comment="java-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023400" comment="java-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023401" comment="java-21-openjdk-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023402" comment="java-21-openjdk-headless-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023403" comment="java-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023404" comment="java-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023405" comment="java-21-openjdk-javadoc-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023406" comment="java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023407" comment="java-21-openjdk-jmods-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023408" comment="java-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023409" comment="java-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023410" comment="java-21-openjdk-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023411" comment="java-21-openjdk-src-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023412" comment="java-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023413" comment="java-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023414" comment="java-21-openjdk-static-libs-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023415" comment="java-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023416" comment="java-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3272" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708/" source="CVE"/>
		<reference ref_id="CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709/" source="CVE"/>
		<reference ref_id="CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710/" source="CVE"/>
		<reference ref_id="CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711/" source="CVE"/>
		<reference ref_id="CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712/" source="CVE"/>
		<reference ref_id="CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714/" source="CVE"/>
		<reference ref_id="CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024237" comment="thunderbird-140.4.0-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3273" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50386" ref_url="https://www.suse.com/security/cve/CVE-2022-50386/" source="CVE"/>
		<reference ref_id="CVE-2023-53297" ref_url="https://www.suse.com/security/cve/CVE-2023-53297/" source="CVE"/>
		<reference ref_id="CVE-2023-53386" ref_url="https://www.suse.com/security/cve/CVE-2023-53386/" source="CVE"/>
		<reference ref_id="CVE-2025-22045" ref_url="https://www.suse.com/security/cve/CVE-2025-22045/" source="CVE"/>
		<reference ref_id="CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817/" source="CVE"/>
		<reference ref_id="CVE-2025-39841" ref_url="https://www.suse.com/security/cve/CVE-2025-39841/" source="CVE"/>
		<reference ref_id="CVE-2025-39849" ref_url="https://www.suse.com/security/cve/CVE-2025-39849/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19102.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19102.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50386/">CVE-2022-50386 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50386">CVE-2022-50386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53297/">CVE-2023-53297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53297">CVE-2023-53297 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53386/">CVE-2023-53386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53386">CVE-2023-53386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22045/">CVE-2025-22045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22045">CVE-2025-22045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39841/">CVE-2025-39841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39841">CVE-2025-39841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39849/">CVE-2025-39849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39849">CVE-2025-39849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024238" comment="bpftool-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024239" comment="kernel-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024240" comment="kernel-abi-stablelists-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024241" comment="kernel-core-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024242" comment="kernel-cross-headers-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024243" comment="kernel-debug-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024244" comment="kernel-debug-core-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024246" comment="kernel-debug-modules-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024247" comment="kernel-debug-modules-extra-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024249" comment="kernel-doc-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024250" comment="kernel-headers-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024251" comment="kernel-modules-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024252" comment="kernel-modules-extra-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024253" comment="kernel-tools-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024254" comment="kernel-tools-libs-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024256" comment="perf-4.18.0-553.81.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024257" comment="python3-perf-4.18.0-553.81.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3274" version="1" class="patch">
	<metadata>
		<title>security update for libecap (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-62168" ref_url="https://www.suse.com/security/cve/CVE-2025-62168/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19107.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19107.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62168/">CVE-2025-62168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62168">CVE-2025-62168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850254" comment="libecap-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850255" comment="libecap-devel-1.0.1-2.module+el8.9.0+19703+a1da7223 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010023928" comment="squid-4.15-10.module+el8.10.0+23592+d564ec65.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3275" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-1244" ref_url="https://www.suse.com/security/cve/CVE-2025-1244/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1917.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1917.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1244/">CVE-2025-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1244">CVE-2025-1244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967148" comment="emacs-26.1-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967149" comment="emacs-common-26.1-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967150" comment="emacs-filesystem-26.1-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967151" comment="emacs-lucid-26.1-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967152" comment="emacs-nox-26.1-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967153" comment="emacs-terminal-26.1-13.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3276" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817/" source="CVE"/>
		<reference ref_id="CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818/" source="CVE"/>
		<reference ref_id="CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819/" source="CVE"/>
		<reference ref_id="CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19238.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19238.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024449" comment="redis-6.2.20-1.module+el8.10.0+23551+d4cd15d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024450" comment="redis-devel-6.2.20-1.module+el8.10.0+23551+d4cd15d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024451" comment="redis-doc-6.2.20-1.module+el8.10.0+23551+d4cd15d7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3277" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19276.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19276.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024452" comment="libtiff-4.0.9-35.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024453" comment="libtiff-devel-4.0.9-35.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024454" comment="libtiff-tools-4.0.9-35.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3278" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server-Xwayland (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19432.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19432.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024677" comment="xorg-x11-server-Xwayland-21.1.3-19.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3279" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19434.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19434.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024678" comment="xorg-x11-server-Xdmx-1.20.11-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024679" comment="xorg-x11-server-Xephyr-1.20.11-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024680" comment="xorg-x11-server-Xnest-1.20.11-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024681" comment="xorg-x11-server-Xorg-1.20.11-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024682" comment="xorg-x11-server-Xvfb-1.20.11-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024683" comment="xorg-x11-server-common-1.20.11-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024684" comment="xorg-x11-server-devel-1.20.11-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024685" comment="xorg-x11-server-source-1.20.11-27.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3280" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-53226" ref_url="https://www.suse.com/security/cve/CVE-2023-53226/" source="CVE"/>
		<reference ref_id="CVE-2023-53257" ref_url="https://www.suse.com/security/cve/CVE-2023-53257/" source="CVE"/>
		<reference ref_id="CVE-2025-39864" ref_url="https://www.suse.com/security/cve/CVE-2025-39864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19447.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19447.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53226/">CVE-2023-53226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53226">CVE-2023-53226 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53257/">CVE-2023-53257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53257">CVE-2023-53257 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39864/">CVE-2025-39864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39864">CVE-2025-39864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024686" comment="bpftool-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024687" comment="kernel-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024688" comment="kernel-abi-stablelists-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024689" comment="kernel-core-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024690" comment="kernel-cross-headers-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024691" comment="kernel-debug-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024692" comment="kernel-debug-core-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024694" comment="kernel-debug-modules-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024695" comment="kernel-debug-modules-extra-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024697" comment="kernel-doc-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024698" comment="kernel-headers-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024699" comment="kernel-modules-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024700" comment="kernel-modules-extra-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024701" comment="kernel-tools-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024702" comment="kernel-tools-libs-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024704" comment="perf-4.18.0-553.82.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024705" comment="python3-perf-4.18.0-553.82.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3281" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-52969" ref_url="https://www.suse.com/security/cve/CVE-2023-52969/" source="CVE"/>
		<reference ref_id="CVE-2023-52970" ref_url="https://www.suse.com/security/cve/CVE-2023-52970/" source="CVE"/>
		<reference ref_id="CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490/" source="CVE"/>
		<reference ref_id="CVE-2025-30693" ref_url="https://www.suse.com/security/cve/CVE-2025-30693/" source="CVE"/>
		<reference ref_id="CVE-2025-30722" ref_url="https://www.suse.com/security/cve/CVE-2025-30722/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19572.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19572.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52969/">CVE-2023-52969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52969">CVE-2023-52969 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52970/">CVE-2023-52970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52970">CVE-2023-52970 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-30693/">CVE-2025-30693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30693">CVE-2025-30693 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30722/">CVE-2025-30722 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30722">CVE-2025-30722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020747" comment="Judy-1.0.5-18.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025539" comment="galera-26.4.22-1.module+el8.10.0+23546+c942e1d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025540" comment="mariadb-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025541" comment="mariadb-backup-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025542" comment="mariadb-common-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025543" comment="mariadb-devel-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025544" comment="mariadb-embedded-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025545" comment="mariadb-embedded-devel-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025546" comment="mariadb-errmsg-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025547" comment="mariadb-gssapi-server-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025548" comment="mariadb-oqgraph-engine-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025549" comment="mariadb-pam-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025550" comment="mariadb-server-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025551" comment="mariadb-server-galera-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025552" comment="mariadb-server-utils-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025553" comment="mariadb-test-10.5.29-2.module+el8.10.0+23547+977c7465 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3282" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19610.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19610.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024706" comment="libipa_hbac-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024707" comment="libsss_autofs-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024708" comment="libsss_certmap-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024709" comment="libsss_idmap-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024710" comment="libsss_nss_idmap-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024711" comment="libsss_nss_idmap-devel-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024712" comment="libsss_simpleifp-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024713" comment="libsss_sudo-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024714" comment="python3-libipa_hbac-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024715" comment="python3-libsss_nss_idmap-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024716" comment="python3-sss-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024717" comment="python3-sss-murmur-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024718" comment="python3-sssdconfig-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024719" comment="sssd-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024720" comment="sssd-ad-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024721" comment="sssd-client-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024722" comment="sssd-common-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024723" comment="sssd-common-pac-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024724" comment="sssd-dbus-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024725" comment="sssd-idp-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024726" comment="sssd-ipa-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024727" comment="sssd-kcm-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024728" comment="sssd-krb5-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024729" comment="sssd-krb5-common-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024730" comment="sssd-ldap-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024731" comment="sssd-nfs-idmap-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024732" comment="sssd-polkit-rules-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024733" comment="sssd-proxy-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024734" comment="sssd-tools-2.9.4-5.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024735" comment="sssd-winbind-idmap-2.9.4-5.el8_10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3283" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-11021" ref_url="https://www.suse.com/security/cve/CVE-2025-11021/" source="CVE"/>
		<reference ref_id="CVE-2025-4945" ref_url="https://www.suse.com/security/cve/CVE-2025-4945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19714.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19714.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11021/">CVE-2025-11021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11021">CVE-2025-11021 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4945/">CVE-2025-4945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4945">CVE-2025-4945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025554" comment="libsoup-2.62.3-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025555" comment="libsoup-devel-2.62.3-10.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3284" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-59830" ref_url="https://www.suse.com/security/cve/CVE-2025-59830/" source="CVE"/>
		<reference ref_id="CVE-2025-61770" ref_url="https://www.suse.com/security/cve/CVE-2025-61770/" source="CVE"/>
		<reference ref_id="CVE-2025-61771" ref_url="https://www.suse.com/security/cve/CVE-2025-61771/" source="CVE"/>
		<reference ref_id="CVE-2025-61772" ref_url="https://www.suse.com/security/cve/CVE-2025-61772/" source="CVE"/>
		<reference ref_id="CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19719.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19719.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-59830/">CVE-2025-59830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59830">CVE-2025-59830 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61770/">CVE-2025-61770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61770">CVE-2025-61770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61771/">CVE-2025-61771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61771">CVE-2025-61771 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61772/">CVE-2025-61772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61772">CVE-2025-61772 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024736" comment="pcs-0.10.18-2.el8_10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024737" comment="pcs-snmp-0.10.18-2.el8_10.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3285" version="1" class="patch">
	<metadata>
		<title>security update for bind9.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<reference ref_id="CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19793.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19793.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024738" comment="bind9.16-9.16.23-0.22.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024739" comment="bind9.16-chroot-9.16.23-0.22.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024740" comment="bind9.16-devel-9.16.23-0.22.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024741" comment="bind9.16-dnssec-utils-9.16.23-0.22.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024742" comment="bind9.16-doc-9.16.23-0.22.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024743" comment="bind9.16-libs-9.16.23-0.22.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024744" comment="bind9.16-license-9.16.23-0.22.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024745" comment="bind9.16-utils-9.16.23-0.22.el8_10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024746" comment="python3-bind9.16-9.16.23-0.22.el8_10.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3286" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19835.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19835.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024747" comment="bind-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024748" comment="bind-chroot-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024749" comment="bind-devel-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024750" comment="bind-export-devel-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024751" comment="bind-export-libs-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024752" comment="bind-libs-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024753" comment="bind-libs-lite-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024754" comment="bind-license-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024755" comment="bind-lite-devel-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024756" comment="bind-pkcs11-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024757" comment="bind-pkcs11-devel-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024758" comment="bind-pkcs11-libs-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024759" comment="bind-pkcs11-utils-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024760" comment="bind-sdb-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024761" comment="bind-sdb-chroot-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024762" comment="bind-utils-9.11.36-16.el8_10.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024763" comment="python3-bind-9.11.36-16.el8_10.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3287" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19909.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19909.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025114" comment="tigervnc-1.15.0-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025115" comment="tigervnc-icons-1.15.0-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025116" comment="tigervnc-license-1.15.0-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025117" comment="tigervnc-selinux-1.15.0-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025118" comment="tigervnc-server-1.15.0-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025119" comment="tigervnc-server-minimal-1.15.0-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025120" comment="tigervnc-server-module-1.15.0-8.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3288" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50367" ref_url="https://www.suse.com/security/cve/CVE-2022-50367/" source="CVE"/>
		<reference ref_id="CVE-2023-53178" ref_url="https://www.suse.com/security/cve/CVE-2023-53178/" source="CVE"/>
		<reference ref_id="CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19931.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19931.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50367/">CVE-2022-50367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50367">CVE-2022-50367 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53178/">CVE-2023-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53178">CVE-2023-53178 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025556" comment="bpftool-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025557" comment="kernel-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025558" comment="kernel-abi-stablelists-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025559" comment="kernel-core-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025560" comment="kernel-cross-headers-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025561" comment="kernel-debug-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025562" comment="kernel-debug-core-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025564" comment="kernel-debug-modules-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025565" comment="kernel-debug-modules-extra-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025567" comment="kernel-doc-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025568" comment="kernel-headers-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025569" comment="kernel-modules-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025570" comment="kernel-modules-extra-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025571" comment="kernel-tools-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025572" comment="kernel-tools-libs-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025574" comment="perf-4.18.0-553.83.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025575" comment="python3-perf-4.18.0-553.83.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3289" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:20034.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:20034.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025576" comment="libtiff-4.0.9-36.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025577" comment="libtiff-devel-4.0.9-36.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025578" comment="libtiff-tools-4.0.9-36.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3290" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-54543" ref_url="https://www.suse.com/security/cve/CVE-2024-54543/" source="CVE"/>
		<reference ref_id="CVE-2025-24143" ref_url="https://www.suse.com/security/cve/CVE-2025-24143/" source="CVE"/>
		<reference ref_id="CVE-2025-24150" ref_url="https://www.suse.com/security/cve/CVE-2025-24150/" source="CVE"/>
		<reference ref_id="CVE-2025-24158" ref_url="https://www.suse.com/security/cve/CVE-2025-24158/" source="CVE"/>
		<reference ref_id="CVE-2025-24162" ref_url="https://www.suse.com/security/cve/CVE-2025-24162/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2034.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2034.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54543/">CVE-2024-54543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54543">CVE-2024-54543 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24143/">CVE-2025-24143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24143">CVE-2025-24143 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24150/">CVE-2025-24150 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24150">CVE-2025-24150 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24158/">CVE-2025-24158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24158">CVE-2025-24158 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24162/">CVE-2025-24162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24162">CVE-2025-24162 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967212" comment="webkit2gtk3-2.46.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967213" comment="webkit2gtk3-devel-2.46.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967214" comment="webkit2gtk3-jsc-2.46.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967215" comment="webkit2gtk3-jsc-devel-2.46.6-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3291" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133/" source="CVE"/>
		<reference ref_id="CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565/" source="CVE"/>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21232.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21232.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025905" comment="aardvark-dns-1.10.1-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025906" comment="buildah-1.33.12-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025907" comment="buildah-tests-1.33.12-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025908" comment="cockpit-podman-84.1-1.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025909" comment="conmon-2.1.10-1.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025910" comment="container-selinux-2.229.0-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025911" comment="containernetworking-plugins-1.4.0-6.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025912" comment="containers-common-1-82.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025913" comment="crit-3.18-5.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025914" comment="criu-3.18-5.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025915" comment="criu-devel-3.18-5.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025916" comment="criu-libs-3.18-5.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025917" comment="crun-1.14.3-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025918" comment="fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025919" comment="libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025920" comment="libslirp-devel-4.4.0-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025921" comment="netavark-1.10.3-1.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025922" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025923" comment="podman-4.9.4-23.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025924" comment="podman-catatonit-4.9.4-23.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025925" comment="podman-docker-4.9.4-23.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025926" comment="podman-gvproxy-4.9.4-23.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025927" comment="podman-plugins-4.9.4-23.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025928" comment="podman-remote-4.9.4-23.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025929" comment="podman-tests-4.9.4-23.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025930" comment="python3-criu-3.18-5.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025931" comment="python3-podman-4.9.0-3.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025932" comment="runc-1.2.5-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025933" comment="skopeo-1.14.5-4.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025934" comment="skopeo-tests-1.14.5-4.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025935" comment="slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025936" comment="toolbox-0.0.99.5-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025937" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+23647+cfd78660 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025938" comment="udica-0.2.6-21.module+el8.10.0+23647+cfd78660 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3292" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-39718" ref_url="https://www.suse.com/security/cve/CVE-2025-39718/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21398.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21398.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39718/">CVE-2025-39718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029794" comment="bpftool-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029795" comment="kernel-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029796" comment="kernel-abi-stablelists-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029797" comment="kernel-core-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029798" comment="kernel-cross-headers-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029799" comment="kernel-debug-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029800" comment="kernel-debug-core-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029802" comment="kernel-debug-modules-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029803" comment="kernel-debug-modules-extra-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029805" comment="kernel-doc-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029806" comment="kernel-headers-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029807" comment="kernel-modules-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029808" comment="kernel-modules-extra-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029809" comment="kernel-tools-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029810" comment="kernel-tools-libs-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029812" comment="perf-4.18.0-553.84.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029813" comment="python3-perf-4.18.0-553.84.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3293" version="1" class="patch">
	<metadata>
		<title>security update for lasso (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47151" ref_url="https://www.suse.com/security/cve/CVE-2025-47151/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21628.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21628.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47151/">CVE-2025-47151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47151">CVE-2025-47151 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010029814" comment="lasso-2.6.0-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029815" comment="lasso-devel-2.6.0-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010029816" comment="python3-lasso-2.6.0-14.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3294" version="1" class="patch">
	<metadata>
		<title>security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2013-0340" ref_url="https://www.suse.com/security/cve/CVE-2013-0340/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757/" source="CVE"/>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21776.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21776.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0340/">CVE-2013-0340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030165" comment="expat-2.5.0-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030166" comment="expat-devel-2.5.0-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3295" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012/" source="CVE"/>
		<reference ref_id="CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013/" source="CVE"/>
		<reference ref_id="CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014/" source="CVE"/>
		<reference ref_id="CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015/" source="CVE"/>
		<reference ref_id="CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016/" source="CVE"/>
		<reference ref_id="CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017/" source="CVE"/>
		<reference ref_id="CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018/" source="CVE"/>
		<reference ref_id="CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019/" source="CVE"/>
		<reference ref_id="CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21881.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21881.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030692" comment="thunderbird-140.5.0-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3296" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-39697" ref_url="https://www.suse.com/security/cve/CVE-2025-39697/" source="CVE"/>
		<reference ref_id="CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971/" source="CVE"/>
		<reference ref_id="CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21917.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21917.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39697/">CVE-2025-39697 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031213" comment="bpftool-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031214" comment="kernel-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031215" comment="kernel-abi-stablelists-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031216" comment="kernel-core-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031217" comment="kernel-cross-headers-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031218" comment="kernel-debug-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031219" comment="kernel-debug-core-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031221" comment="kernel-debug-modules-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031222" comment="kernel-debug-modules-extra-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031224" comment="kernel-doc-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031225" comment="kernel-headers-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031226" comment="kernel-modules-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031227" comment="kernel-modules-extra-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031228" comment="kernel-tools-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031229" comment="kernel-tools-libs-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031231" comment="perf-4.18.0-553.85.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031232" comment="python3-perf-4.18.0-553.85.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3297" version="1" class="patch">
	<metadata>
		<title>security update for mingw-expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21974.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21974.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033808" comment="mingw32-expat-2.5.0-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033809" comment="mingw64-expat-2.5.0-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3298" version="1" class="patch">
	<metadata>
		<title>security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-5372" ref_url="https://www.suse.com/security/cve/CVE-2025-5372/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21977.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21977.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5372/">CVE-2025-5372 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5372">CVE-2025-5372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031233" comment="libssh-0.9.6-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031234" comment="libssh-config-0.9.6-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031235" comment="libssh-devel-0.9.6-16.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3299" version="1" class="patch">
	<metadata>
		<title>security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-58364" ref_url="https://www.suse.com/security/cve/CVE-2025-58364/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58364/">CVE-2025-58364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58364">CVE-2025-58364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031236" comment="cups-2.2.6-64.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031237" comment="cups-client-2.2.6-64.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031238" comment="cups-devel-2.2.6-64.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031239" comment="cups-filesystem-2.2.6-64.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031240" comment="cups-ipptool-2.2.6-64.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031241" comment="cups-libs-2.2.6-64.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031242" comment="cups-lpd-2.2.6-64.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3300" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012/" source="CVE"/>
		<reference ref_id="CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013/" source="CVE"/>
		<reference ref_id="CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014/" source="CVE"/>
		<reference ref_id="CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015/" source="CVE"/>
		<reference ref_id="CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016/" source="CVE"/>
		<reference ref_id="CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017/" source="CVE"/>
		<reference ref_id="CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018/" source="CVE"/>
		<reference ref_id="CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019/" source="CVE"/>
		<reference ref_id="CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22363.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22363.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032241" comment="firefox-140.5.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3301" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-53513" ref_url="https://www.suse.com/security/cve/CVE-2023-53513/" source="CVE"/>
		<reference ref_id="CVE-2025-38724" ref_url="https://www.suse.com/security/cve/CVE-2025-38724/" source="CVE"/>
		<reference ref_id="CVE-2025-39825" ref_url="https://www.suse.com/security/cve/CVE-2025-39825/" source="CVE"/>
		<reference ref_id="CVE-2025-39883" ref_url="https://www.suse.com/security/cve/CVE-2025-39883/" source="CVE"/>
		<reference ref_id="CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898/" source="CVE"/>
		<reference ref_id="CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955/" source="CVE"/>
		<reference ref_id="CVE-2025-40186" ref_url="https://www.suse.com/security/cve/CVE-2025-40186/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22388.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22388.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53513/">CVE-2023-53513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53513">CVE-2023-53513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38724/">CVE-2025-38724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39825/">CVE-2025-39825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39825">CVE-2025-39825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39883/">CVE-2025-39883 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39883">CVE-2025-39883 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40186/">CVE-2025-40186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40186">CVE-2025-40186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032242" comment="bpftool-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032243" comment="kernel-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032244" comment="kernel-abi-stablelists-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032245" comment="kernel-core-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032246" comment="kernel-cross-headers-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032247" comment="kernel-debug-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032248" comment="kernel-debug-core-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032250" comment="kernel-debug-modules-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032251" comment="kernel-debug-modules-extra-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032253" comment="kernel-doc-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032254" comment="kernel-headers-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032255" comment="kernel-modules-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032256" comment="kernel-modules-extra-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032257" comment="kernel-tools-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032258" comment="kernel-tools-libs-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032260" comment="perf-4.18.0-553.87.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032261" comment="python3-perf-4.18.0-553.87.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3302" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-10920" ref_url="https://www.suse.com/security/cve/CVE-2025-10920/" source="CVE"/>
		<reference ref_id="CVE-2025-10921" ref_url="https://www.suse.com/security/cve/CVE-2025-10921/" source="CVE"/>
		<reference ref_id="CVE-2025-10922" ref_url="https://www.suse.com/security/cve/CVE-2025-10922/" source="CVE"/>
		<reference ref_id="CVE-2025-10923" ref_url="https://www.suse.com/security/cve/CVE-2025-10923/" source="CVE"/>
		<reference ref_id="CVE-2025-10924" ref_url="https://www.suse.com/security/cve/CVE-2025-10924/" source="CVE"/>
		<reference ref_id="CVE-2025-10925" ref_url="https://www.suse.com/security/cve/CVE-2025-10925/" source="CVE"/>
		<reference ref_id="CVE-2025-10934" ref_url="https://www.suse.com/security/cve/CVE-2025-10934/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22417.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22417.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10920/">CVE-2025-10920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10920">CVE-2025-10920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10921/">CVE-2025-10921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10921">CVE-2025-10921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10922/">CVE-2025-10922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10922">CVE-2025-10922 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10923/">CVE-2025-10923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10923">CVE-2025-10923 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10924/">CVE-2025-10924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10924">CVE-2025-10924 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10925/">CVE-2025-10925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10925">CVE-2025-10925 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10934/">CVE-2025-10934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10934">CVE-2025-10934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032397" comment="gimp-2.8.22-26.module+el8.10.0+23719+f0b80de8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032398" comment="gimp-devel-2.8.22-26.module+el8.10.0+23719+f0b80de8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032399" comment="gimp-devel-tools-2.8.22-26.module+el8.10.0+23719+f0b80de8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032400" comment="gimp-libs-2.8.22-26.module+el8.10.0+23719+f0b80de8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962044" comment="pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962045" comment="pygobject2-codegen-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962046" comment="pygobject2-devel-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962047" comment="pygobject2-doc-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962048" comment="pygtk2-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962049" comment="pygtk2-codegen-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962050" comment="pygtk2-devel-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962051" comment="pygtk2-doc-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962052" comment="python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962053" comment="python2-cairo-devel-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3303" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906/" source="CVE"/>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22668.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22668.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032452" comment="delve-1.25.2-1.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032453" comment="go-toolset-1.25.3-2.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032454" comment="golang-1.25.3-2.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032455" comment="golang-bin-1.25.3-2.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032456" comment="golang-docs-1.25.3-2.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032457" comment="golang-misc-1.25.3-2.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032458" comment="golang-race-1.25.3-2.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032459" comment="golang-src-1.25.3-2.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032460" comment="golang-tests-1.25.3-2.module+el8.10.0+23746+9db33b5e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3304" version="1" class="patch">
	<metadata>
		<title>security update for abrt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12744" ref_url="https://www.suse.com/security/cve/CVE-2025-12744/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22760.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22760.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12744/">CVE-2025-12744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12744">CVE-2025-12744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032540" comment="abrt-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032541" comment="abrt-addon-ccpp-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032542" comment="abrt-addon-coredump-helper-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032543" comment="abrt-addon-kerneloops-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032544" comment="abrt-addon-pstoreoops-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032545" comment="abrt-addon-vmcore-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032546" comment="abrt-addon-xorg-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032547" comment="abrt-cli-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032548" comment="abrt-cli-ng-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032549" comment="abrt-console-notification-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032550" comment="abrt-dbus-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032551" comment="abrt-desktop-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032552" comment="abrt-gui-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032553" comment="abrt-gui-libs-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032554" comment="abrt-libs-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032555" comment="abrt-plugin-machine-id-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032556" comment="abrt-plugin-sosreport-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032557" comment="abrt-tui-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032558" comment="python3-abrt-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032559" comment="python3-abrt-addon-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032560" comment="python3-abrt-container-addon-2.10.9-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032561" comment="python3-abrt-doc-2.10.9-25.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3305" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-13502" ref_url="https://www.suse.com/security/cve/CVE-2025-13502/" source="CVE"/>
		<reference ref_id="CVE-2025-13947" ref_url="https://www.suse.com/security/cve/CVE-2025-13947/" source="CVE"/>
		<reference ref_id="CVE-2025-43392" ref_url="https://www.suse.com/security/cve/CVE-2025-43392/" source="CVE"/>
		<reference ref_id="CVE-2025-43421" ref_url="https://www.suse.com/security/cve/CVE-2025-43421/" source="CVE"/>
		<reference ref_id="CVE-2025-43425" ref_url="https://www.suse.com/security/cve/CVE-2025-43425/" source="CVE"/>
		<reference ref_id="CVE-2025-43427" ref_url="https://www.suse.com/security/cve/CVE-2025-43427/" source="CVE"/>
		<reference ref_id="CVE-2025-43429" ref_url="https://www.suse.com/security/cve/CVE-2025-43429/" source="CVE"/>
		<reference ref_id="CVE-2025-43430" ref_url="https://www.suse.com/security/cve/CVE-2025-43430/" source="CVE"/>
		<reference ref_id="CVE-2025-43431" ref_url="https://www.suse.com/security/cve/CVE-2025-43431/" source="CVE"/>
		<reference ref_id="CVE-2025-43432" ref_url="https://www.suse.com/security/cve/CVE-2025-43432/" source="CVE"/>
		<reference ref_id="CVE-2025-43433" ref_url="https://www.suse.com/security/cve/CVE-2025-43433/" source="CVE"/>
		<reference ref_id="CVE-2025-43434" ref_url="https://www.suse.com/security/cve/CVE-2025-43434/" source="CVE"/>
		<reference ref_id="CVE-2025-43438" ref_url="https://www.suse.com/security/cve/CVE-2025-43438/" source="CVE"/>
		<reference ref_id="CVE-2025-43440" ref_url="https://www.suse.com/security/cve/CVE-2025-43440/" source="CVE"/>
		<reference ref_id="CVE-2025-43441" ref_url="https://www.suse.com/security/cve/CVE-2025-43441/" source="CVE"/>
		<reference ref_id="CVE-2025-43443" ref_url="https://www.suse.com/security/cve/CVE-2025-43443/" source="CVE"/>
		<reference ref_id="CVE-2025-43458" ref_url="https://www.suse.com/security/cve/CVE-2025-43458/" source="CVE"/>
		<reference ref_id="CVE-2025-66287" ref_url="https://www.suse.com/security/cve/CVE-2025-66287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22789.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22789.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13502/">CVE-2025-13502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13502">CVE-2025-13502 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13947/">CVE-2025-13947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13947">CVE-2025-13947 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43392/">CVE-2025-43392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43392">CVE-2025-43392 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43421/">CVE-2025-43421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43421">CVE-2025-43421 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43425/">CVE-2025-43425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43425">CVE-2025-43425 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43427/">CVE-2025-43427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43427">CVE-2025-43427 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43429/">CVE-2025-43429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43429">CVE-2025-43429 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43430/">CVE-2025-43430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43430">CVE-2025-43430 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-43431/">CVE-2025-43431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43431">CVE-2025-43431 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43432/">CVE-2025-43432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43432">CVE-2025-43432 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43433/">CVE-2025-43433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43433">CVE-2025-43433 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43434/">CVE-2025-43434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43434">CVE-2025-43434 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43438/">CVE-2025-43438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43438">CVE-2025-43438 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43440/">CVE-2025-43440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43440">CVE-2025-43440 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43441/">CVE-2025-43441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43441">CVE-2025-43441 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43443/">CVE-2025-43443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43443">CVE-2025-43443 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43458/">CVE-2025-43458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43458">CVE-2025-43458 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66287/">CVE-2025-66287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66287">CVE-2025-66287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032580" comment="webkit2gtk3-2.50.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032581" comment="webkit2gtk3-devel-2.50.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032582" comment="webkit2gtk3-jsc-2.50.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032583" comment="webkit2gtk3-jsc-devel-2.50.3-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3306" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50543" ref_url="https://www.suse.com/security/cve/CVE-2022-50543/" source="CVE"/>
		<reference ref_id="CVE-2023-53401" ref_url="https://www.suse.com/security/cve/CVE-2023-53401/" source="CVE"/>
		<reference ref_id="CVE-2023-53539" ref_url="https://www.suse.com/security/cve/CVE-2023-53539/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22801.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22801.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50543/">CVE-2022-50543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50543">CVE-2022-50543 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53401/">CVE-2023-53401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53401">CVE-2023-53401 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53539/">CVE-2023-53539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53539">CVE-2023-53539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032642" comment="bpftool-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032643" comment="kernel-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032644" comment="kernel-abi-stablelists-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032645" comment="kernel-core-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032646" comment="kernel-cross-headers-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032647" comment="kernel-debug-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032648" comment="kernel-debug-core-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032650" comment="kernel-debug-modules-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032651" comment="kernel-debug-modules-extra-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032653" comment="kernel-doc-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032654" comment="kernel-headers-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032655" comment="kernel-modules-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032656" comment="kernel-modules-extra-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032657" comment="kernel-tools-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032658" comment="kernel-tools-libs-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032660" comment="perf-4.18.0-553.89.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032661" comment="python3-perf-4.18.0-553.89.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3307" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-31651" ref_url="https://www.suse.com/security/cve/CVE-2025-31651/" source="CVE"/>
		<reference ref_id="CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23048.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23048.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31651/">CVE-2025-31651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31651">CVE-2025-31651 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032939" comment="tomcat-9.0.87-1.el8_10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032940" comment="tomcat-admin-webapps-9.0.87-1.el8_10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032941" comment="tomcat-docs-webapp-9.0.87-1.el8_10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032942" comment="tomcat-el-3.0-api-9.0.87-1.el8_10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032943" comment="tomcat-jsp-2.3-api-9.0.87-1.el8_10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032944" comment="tomcat-lib-9.0.87-1.el8_10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032945" comment="tomcat-servlet-4.0-api-9.0.87-1.el8_10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032946" comment="tomcat-webapps-9.0.87-1.el8_10.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3308" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-24294" ref_url="https://www.suse.com/security/cve/CVE-2025-24294/" source="CVE"/>
		<reference ref_id="CVE-2025-58767" ref_url="https://www.suse.com/security/cve/CVE-2025-58767/" source="CVE"/>
		<reference ref_id="CVE-2025-61594" ref_url="https://www.suse.com/security/cve/CVE-2025-61594/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23062.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23062.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24294/">CVE-2025-24294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24294">CVE-2025-24294 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58767/">CVE-2025-58767 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58767">CVE-2025-58767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61594/">CVE-2025-61594 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61594">CVE-2025-61594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032947" comment="ruby-3.3.10-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032948" comment="ruby-bundled-gems-3.3.10-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032949" comment="ruby-default-gems-3.3.10-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032950" comment="ruby-devel-3.3.10-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032951" comment="ruby-doc-3.3.10-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032952" comment="ruby-libs-3.3.10-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874625" comment="rubygem-abrt-0.4.0-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874626" comment="rubygem-abrt-doc-0.4.0-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032953" comment="rubygem-bigdecimal-3.1.5-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032954" comment="rubygem-bundler-2.5.22-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032955" comment="rubygem-io-console-0.7.1-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032956" comment="rubygem-irb-1.13.1-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032957" comment="rubygem-json-2.7.2-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032958" comment="rubygem-minitest-5.20.0-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874633" comment="rubygem-mysql2-0.5.5-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874634" comment="rubygem-mysql2-doc-0.5.5-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874635" comment="rubygem-pg-1.5.4-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874636" comment="rubygem-pg-doc-1.5.4-1.module+el8.10.0+21226+b78a28c4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032959" comment="rubygem-power_assert-2.0.3-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032960" comment="rubygem-psych-5.1.2-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032961" comment="rubygem-racc-1.7.3-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032962" comment="rubygem-rake-13.1.0-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032963" comment="rubygem-rbs-3.4.0-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032964" comment="rubygem-rdoc-6.6.3.1-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032965" comment="rubygem-rexml-3.4.4-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032966" comment="rubygem-rss-0.3.1-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032967" comment="rubygem-test-unit-3.6.1-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032968" comment="rubygem-typeprof-0.21.9-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032969" comment="rubygems-3.5.22-5.module+el8.10.0+23696+c42b0f57 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032970" comment="rubygems-devel-3.5.22-5.module+el8.10.0+23696+c42b0f57 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3309" version="1" class="patch">
	<metadata>
		<title>security update for luksmeta (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-11568" ref_url="https://www.suse.com/security/cve/CVE-2025-11568/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23086.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23086.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11568/">CVE-2025-11568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11568">CVE-2025-11568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032971" comment="libluksmeta-9-4.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032972" comment="libluksmeta-devel-9-4.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032973" comment="luksmeta-9-4.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3310" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321/" source="CVE"/>
		<reference ref_id="CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322/" source="CVE"/>
		<reference ref_id="CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323/" source="CVE"/>
		<reference ref_id="CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324/" source="CVE"/>
		<reference ref_id="CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325/" source="CVE"/>
		<reference ref_id="CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328/" source="CVE"/>
		<reference ref_id="CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329/" source="CVE"/>
		<reference ref_id="CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330/" source="CVE"/>
		<reference ref_id="CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331/" source="CVE"/>
		<reference ref_id="CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033208" comment="firefox-140.6.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3311" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-53040" ref_url="https://www.suse.com/security/cve/CVE-2025-53040/" source="CVE"/>
		<reference ref_id="CVE-2025-53042" ref_url="https://www.suse.com/security/cve/CVE-2025-53042/" source="CVE"/>
		<reference ref_id="CVE-2025-53044" ref_url="https://www.suse.com/security/cve/CVE-2025-53044/" source="CVE"/>
		<reference ref_id="CVE-2025-53045" ref_url="https://www.suse.com/security/cve/CVE-2025-53045/" source="CVE"/>
		<reference ref_id="CVE-2025-53053" ref_url="https://www.suse.com/security/cve/CVE-2025-53053/" source="CVE"/>
		<reference ref_id="CVE-2025-53054" ref_url="https://www.suse.com/security/cve/CVE-2025-53054/" source="CVE"/>
		<reference ref_id="CVE-2025-53062" ref_url="https://www.suse.com/security/cve/CVE-2025-53062/" source="CVE"/>
		<reference ref_id="CVE-2025-53069" ref_url="https://www.suse.com/security/cve/CVE-2025-53069/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23134.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23134.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53040/">CVE-2025-53040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53040">CVE-2025-53040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53042/">CVE-2025-53042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53042">CVE-2025-53042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53044/">CVE-2025-53044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53044">CVE-2025-53044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53045/">CVE-2025-53045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53045">CVE-2025-53045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53053/">CVE-2025-53053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53053">CVE-2025-53053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53054/">CVE-2025-53054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53054">CVE-2025-53054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53062/">CVE-2025-53062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53062">CVE-2025-53062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53069/">CVE-2025-53069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53069">CVE-2025-53069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966641" comment="mecab-0.996-2.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966642" comment="mecab-devel-0.996-2.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966643" comment="mecab-ipadic-2.7.0.20070801-17.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966644" comment="mecab-ipadic-EUCJP-2.7.0.20070801-17.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037827" comment="mysql-8.0.44-1.module+el8.10.0+23701+71f6a1f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037828" comment="mysql-common-8.0.44-1.module+el8.10.0+23701+71f6a1f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037829" comment="mysql-devel-8.0.44-1.module+el8.10.0+23701+71f6a1f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037830" comment="mysql-errmsg-8.0.44-1.module+el8.10.0+23701+71f6a1f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037831" comment="mysql-libs-8.0.44-1.module+el8.10.0+23701+71f6a1f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037832" comment="mysql-server-8.0.44-1.module+el8.10.0+23701+71f6a1f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037833" comment="mysql-test-8.0.44-1.module+el8.10.0+23701+71f6a1f1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3312" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-53040" ref_url="https://www.suse.com/security/cve/CVE-2025-53040/" source="CVE"/>
		<reference ref_id="CVE-2025-53042" ref_url="https://www.suse.com/security/cve/CVE-2025-53042/" source="CVE"/>
		<reference ref_id="CVE-2025-53044" ref_url="https://www.suse.com/security/cve/CVE-2025-53044/" source="CVE"/>
		<reference ref_id="CVE-2025-53045" ref_url="https://www.suse.com/security/cve/CVE-2025-53045/" source="CVE"/>
		<reference ref_id="CVE-2025-53053" ref_url="https://www.suse.com/security/cve/CVE-2025-53053/" source="CVE"/>
		<reference ref_id="CVE-2025-53054" ref_url="https://www.suse.com/security/cve/CVE-2025-53054/" source="CVE"/>
		<reference ref_id="CVE-2025-53062" ref_url="https://www.suse.com/security/cve/CVE-2025-53062/" source="CVE"/>
		<reference ref_id="CVE-2025-53069" ref_url="https://www.suse.com/security/cve/CVE-2025-53069/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23137.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23137.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53040/">CVE-2025-53040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53040">CVE-2025-53040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53042/">CVE-2025-53042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53042">CVE-2025-53042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53044/">CVE-2025-53044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53044">CVE-2025-53044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53045/">CVE-2025-53045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53045">CVE-2025-53045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53053/">CVE-2025-53053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53053">CVE-2025-53053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53054/">CVE-2025-53054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53054">CVE-2025-53054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53062/">CVE-2025-53062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53062">CVE-2025-53062 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53069/">CVE-2025-53069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53069">CVE-2025-53069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033209" comment="mecab-0.996-2.module+el8.10.0+23550+bd321b9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033210" comment="mecab-devel-0.996-2.module+el8.10.0+23550+bd321b9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033211" comment="mecab-ipadic-2.7.0.20070801-17.module+el8.10.0+23550+bd321b9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033212" comment="mecab-ipadic-EUCJP-2.7.0.20070801-17.module+el8.10.0+23550+bd321b9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033213" comment="mysql-8.4.7-1.module+el8.10.0+23690+f5ccb7d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033214" comment="mysql-common-8.4.7-1.module+el8.10.0+23690+f5ccb7d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033215" comment="mysql-devel-8.4.7-1.module+el8.10.0+23690+f5ccb7d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033216" comment="mysql-errmsg-8.4.7-1.module+el8.10.0+23690+f5ccb7d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033217" comment="mysql-libs-8.4.7-1.module+el8.10.0+23690+f5ccb7d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033218" comment="mysql-server-8.4.7-1.module+el8.10.0+23690+f5ccb7d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033219" comment="mysql-test-8.4.7-1.module+el8.10.0+23690+f5ccb7d2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033220" comment="mysql-test-data-8.4.7-1.module+el8.10.0+23690+f5ccb7d2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3313" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23382.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23382.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034743" comment="binutils-2.30-128.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034744" comment="binutils-devel-2.30-128.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3314" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23383.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23383.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034745" comment="curl-7.61.1-34.el8_10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034746" comment="libcurl-7.61.1-34.el8_10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034747" comment="libcurl-devel-7.61.1-34.el8_10.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034748" comment="libcurl-minimal-7.61.1-34.el8_10.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3315" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61984" ref_url="https://www.suse.com/security/cve/CVE-2025-61984/" source="CVE"/>
		<reference ref_id="CVE-2025-61985" ref_url="https://www.suse.com/security/cve/CVE-2025-61985/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23481.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23481.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61984/">CVE-2025-61984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984">CVE-2025-61984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61985/">CVE-2025-61985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985">CVE-2025-61985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034203" comment="openssh-8.0p1-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034204" comment="openssh-askpass-8.0p1-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034205" comment="openssh-cavs-8.0p1-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034206" comment="openssh-clients-8.0p1-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034207" comment="openssh-keycat-8.0p1-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034208" comment="openssh-ldap-8.0p1-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034209" comment="openssh-server-8.0p1-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034210" comment="pam_ssh_agent_auth-0.10.3-7.27.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3316" version="1" class="patch">
	<metadata>
		<title>security update for PyYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642/" source="CVE"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<reference ref_id="CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138/" source="CVE"/>
		<reference ref_id="CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330/" source="CVE"/>
		<reference ref_id="CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435/" source="CVE"/>
		<reference ref_id="CVE-2025-4516" ref_url="https://www.suse.com/security/cve/CVE-2025-4516/" source="CVE"/>
		<reference ref_id="CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517/" source="CVE"/>
		<reference ref_id="CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069/" source="CVE"/>
		<reference ref_id="CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23530.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23530.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-4516/">CVE-2025-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4516">CVE-2025-4516 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034211" comment="python39-3.9.25-2.module+el8.10.0+23718+1842ae33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016303" comment="python39-Cython-0.29.21-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831536" comment="python39-PyMySQL-0.10.1-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016304" comment="python39-attrs-20.3.0-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831537" comment="python39-cffi-1.14.3-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831538" comment="python39-chardet-3.0.4-19.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874217" comment="python39-cryptography-3.3.1-3.module+el8.10.0+21271+eccd1d86 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034212" comment="python39-debug-3.9.25-2.module+el8.10.0+23718+1842ae33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034213" comment="python39-devel-3.9.25-2.module+el8.10.0+23718+1842ae33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034214" comment="python39-idle-3.9.25-2.module+el8.10.0+23718+1842ae33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940495" comment="python39-idna-2.10-4.module+el8.10.0+21815+bb024982 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016308" comment="python39-iniconfig-1.1.1-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034215" comment="python39-libs-3.9.25-2.module+el8.10.0+23718+1842ae33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831544" comment="python39-lxml-4.6.5-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016310" comment="python39-mod_wsgi-4.7.1-7.module+el8.10.0+23075+0aa18782.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016311" comment="python39-more-itertools-8.5.0-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831546" comment="python39-numpy-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831547" comment="python39-numpy-doc-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831548" comment="python39-numpy-f2py-1.19.4-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016312" comment="python39-packaging-20.4-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874221" comment="python39-pip-20.2.4-9.module+el8.10.0+21329+8d76b841 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874222" comment="python39-pip-wheel-20.2.4-9.module+el8.10.0+21329+8d76b841 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016313" comment="python39-pluggy-0.13.1-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831551" comment="python39-ply-3.11-10.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831552" comment="python39-psutil-5.8.0-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874223" comment="python39-psycopg2-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874224" comment="python39-psycopg2-doc-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874225" comment="python39-psycopg2-tests-2.8.6-3.module+el8.10.0+21142+453d2b75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016314" comment="python39-py-1.10.0-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016315" comment="python39-pybind11-2.7.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016316" comment="python39-pybind11-devel-2.7.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831556" comment="python39-pycparser-2.20-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016317" comment="python39-pyparsing-2.4.7-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831557" comment="python39-pysocks-1.7.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016318" comment="python39-pytest-6.0.2-2.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831558" comment="python39-pyyaml-5.4.1-1.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831559" comment="python39-requests-2.25.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034216" comment="python39-rpm-macros-3.9.25-2.module+el8.10.0+23718+1842ae33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831561" comment="python39-scipy-1.5.4-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016320" comment="python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016321" comment="python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831564" comment="python39-six-1.15.0-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034217" comment="python39-test-3.9.25-2.module+el8.10.0+23718+1842ae33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034218" comment="python39-tkinter-3.9.25-2.module+el8.10.0+23718+1842ae33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831567" comment="python39-toml-0.10.1-5.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874231" comment="python39-urllib3-1.25.10-5.module+el8.10.0+20443+f0a692fe is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016324" comment="python39-wcwidth-0.2.5-3.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831569" comment="python39-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009831570" comment="python39-wheel-wheel-0.35.1-4.module+el8.9.0+19644+d68f775d is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3317" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23543.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23543.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034935" comment="aardvark-dns-1.10.1-2.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034936" comment="buildah-1.33.13-1.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034937" comment="buildah-tests-1.33.13-1.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034938" comment="cockpit-podman-84.1-1.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034939" comment="conmon-2.1.10-1.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034940" comment="container-selinux-2.229.0-2.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034941" comment="containernetworking-plugins-1.4.0-6.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034942" comment="containers-common-1-82.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034943" comment="crit-3.18-5.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034944" comment="criu-3.18-5.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034945" comment="criu-devel-3.18-5.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034946" comment="criu-libs-3.18-5.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034947" comment="crun-1.14.3-2.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034948" comment="fuse-overlayfs-1.13-1.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034949" comment="libslirp-4.4.0-2.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034950" comment="libslirp-devel-4.4.0-2.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034951" comment="netavark-1.10.3-1.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034952" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034953" comment="podman-4.9.4-25.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034954" comment="podman-catatonit-4.9.4-25.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034955" comment="podman-docker-4.9.4-25.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034956" comment="podman-gvproxy-4.9.4-25.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034957" comment="podman-plugins-4.9.4-25.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034958" comment="podman-remote-4.9.4-25.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034959" comment="podman-tests-4.9.4-25.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034960" comment="python3-criu-3.18-5.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034961" comment="python3-podman-4.9.0-3.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034962" comment="runc-1.2.9-2.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034963" comment="skopeo-1.14.5-5.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034964" comment="skopeo-tests-1.14.5-5.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034965" comment="slirp4netns-1.2.3-1.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034966" comment="toolbox-0.0.99.5-2.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034967" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+23820+ae6deecc is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034968" comment="udica-0.2.6-21.module+el8.10.0+23820+ae6deecc is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3318" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14174" ref_url="https://www.suse.com/security/cve/CVE-2025-14174/" source="CVE"/>
		<reference ref_id="CVE-2025-43501" ref_url="https://www.suse.com/security/cve/CVE-2025-43501/" source="CVE"/>
		<reference ref_id="CVE-2025-43529" ref_url="https://www.suse.com/security/cve/CVE-2025-43529/" source="CVE"/>
		<reference ref_id="CVE-2025-43531" ref_url="https://www.suse.com/security/cve/CVE-2025-43531/" source="CVE"/>
		<reference ref_id="CVE-2025-43535" ref_url="https://www.suse.com/security/cve/CVE-2025-43535/" source="CVE"/>
		<reference ref_id="CVE-2025-43536" ref_url="https://www.suse.com/security/cve/CVE-2025-43536/" source="CVE"/>
		<reference ref_id="CVE-2025-43541" ref_url="https://www.suse.com/security/cve/CVE-2025-43541/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23663.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23663.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14174/">CVE-2025-14174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14174">CVE-2025-14174 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43501/">CVE-2025-43501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43501">CVE-2025-43501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43529/">CVE-2025-43529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529">CVE-2025-43529 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43531/">CVE-2025-43531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43531">CVE-2025-43531 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43535/">CVE-2025-43535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43535">CVE-2025-43535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43536/">CVE-2025-43536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43536">CVE-2025-43536 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43541/">CVE-2025-43541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43541">CVE-2025-43541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034575" comment="webkit2gtk3-2.50.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034576" comment="webkit2gtk3-devel-2.50.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034577" comment="webkit2gtk3-jsc-2.50.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034578" comment="webkit2gtk3-jsc-devel-2.50.4-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3319" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-55753" ref_url="https://www.suse.com/security/cve/CVE-2025-55753/" source="CVE"/>
		<reference ref_id="CVE-2025-58098" ref_url="https://www.suse.com/security/cve/CVE-2025-58098/" source="CVE"/>
		<reference ref_id="CVE-2025-65082" ref_url="https://www.suse.com/security/cve/CVE-2025-65082/" source="CVE"/>
		<reference ref_id="CVE-2025-66200" ref_url="https://www.suse.com/security/cve/CVE-2025-66200/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23732.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23732.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55753/">CVE-2025-55753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55753">CVE-2025-55753 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58098/">CVE-2025-58098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098">CVE-2025-58098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65082/">CVE-2025-65082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65082">CVE-2025-65082 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66200/">CVE-2025-66200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66200">CVE-2025-66200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010034749" comment="httpd-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034750" comment="httpd-devel-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034751" comment="httpd-filesystem-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034752" comment="httpd-manual-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034753" comment="httpd-tools-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016998" comment="mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034754" comment="mod_ldap-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034755" comment="mod_md-2.0.8-8.module+el8.10.0+23815+1b5e1c66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034756" comment="mod_proxy_html-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034757" comment="mod_session-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034758" comment="mod_ssl-2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3320" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-26625" ref_url="https://www.suse.com/security/cve/CVE-2025-26625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23745.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23745.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26625/">CVE-2025-26625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26625">CVE-2025-26625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034969" comment="git-lfs-3.4.1-6.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3321" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23948.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23948.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010035160" comment="grafana-9.2.10-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035161" comment="grafana-selinux-9.2.10-26.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3322" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-1930" ref_url="https://www.suse.com/security/cve/CVE-2025-1930/" source="CVE"/>
		<reference ref_id="CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931/" source="CVE"/>
		<reference ref_id="CVE-2025-1932" ref_url="https://www.suse.com/security/cve/CVE-2025-1932/" source="CVE"/>
		<reference ref_id="CVE-2025-1933" ref_url="https://www.suse.com/security/cve/CVE-2025-1933/" source="CVE"/>
		<reference ref_id="CVE-2025-1934" ref_url="https://www.suse.com/security/cve/CVE-2025-1934/" source="CVE"/>
		<reference ref_id="CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935/" source="CVE"/>
		<reference ref_id="CVE-2025-1936" ref_url="https://www.suse.com/security/cve/CVE-2025-1936/" source="CVE"/>
		<reference ref_id="CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937/" source="CVE"/>
		<reference ref_id="CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2452.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2452.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1930/">CVE-2025-1930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1930">CVE-2025-1930 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1932/">CVE-2025-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1932">CVE-2025-1932 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1933/">CVE-2025-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1933">CVE-2025-1933 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1934/">CVE-2025-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1934">CVE-2025-1934 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1936/">CVE-2025-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1936">CVE-2025-1936 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967472" comment="firefox-128.8.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3323" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302/" source="CVE"/>
		<reference ref_id="CVE-2024-53197" ref_url="https://www.suse.com/security/cve/CVE-2024-53197/" source="CVE"/>
		<reference ref_id="CVE-2024-57807" ref_url="https://www.suse.com/security/cve/CVE-2024-57807/" source="CVE"/>
		<reference ref_id="CVE-2024-57979" ref_url="https://www.suse.com/security/cve/CVE-2024-57979/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53197/">CVE-2024-53197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57807/">CVE-2024-57807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57979/">CVE-2024-57979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57979">CVE-2024-57979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967513" comment="bpftool-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967514" comment="kernel-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967515" comment="kernel-abi-stablelists-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967516" comment="kernel-core-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967517" comment="kernel-cross-headers-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967518" comment="kernel-debug-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967519" comment="kernel-debug-core-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967521" comment="kernel-debug-modules-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967522" comment="kernel-debug-modules-extra-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967524" comment="kernel-doc-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967525" comment="kernel-headers-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967526" comment="kernel-modules-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967527" comment="kernel-modules-extra-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967528" comment="kernel-tools-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967529" comment="kernel-tools-libs-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967531" comment="perf-4.18.0-553.44.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967532" comment="python3-perf-4.18.0-553.44.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3324" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2502.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2502.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967857" comment="tigervnc-1.13.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967858" comment="tigervnc-icons-1.13.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967859" comment="tigervnc-license-1.13.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967860" comment="tigervnc-selinux-1.13.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967861" comment="tigervnc-server-1.13.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967862" comment="tigervnc-server-minimal-1.13.1-15.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967863" comment="tigervnc-server-module-1.13.1-15.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3325" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-12087" ref_url="https://www.suse.com/security/cve/CVE-2024-12087/" source="CVE"/>
		<reference ref_id="CVE-2024-12088" ref_url="https://www.suse.com/security/cve/CVE-2024-12088/" source="CVE"/>
		<reference ref_id="CVE-2024-12747" ref_url="https://www.suse.com/security/cve/CVE-2024-12747/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12087/">CVE-2024-12087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12088/">CVE-2024-12088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12088">CVE-2024-12088 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12747/">CVE-2024-12747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12747">CVE-2024-12747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967864" comment="rsync-3.1.3-21.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967865" comment="rsync-daemon-3.1.3-21.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3326" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-24070" ref_url="https://www.suse.com/security/cve/CVE-2025-24070/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24070/">CVE-2025-24070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24070">CVE-2025-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968306" comment="aspnetcore-runtime-9.0-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968307" comment="aspnetcore-runtime-dbg-9.0-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968308" comment="aspnetcore-targeting-pack-9.0-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968309" comment="dotnet-9.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968310" comment="dotnet-apphost-pack-9.0-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968311" comment="dotnet-host-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968312" comment="dotnet-hostfxr-9.0-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968313" comment="dotnet-runtime-9.0-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968314" comment="dotnet-runtime-dbg-9.0-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968315" comment="dotnet-sdk-9.0-9.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968316" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968317" comment="dotnet-sdk-aot-9.0-9.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968318" comment="dotnet-sdk-dbg-9.0-9.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968319" comment="dotnet-targeting-pack-9.0-9.0.3-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968320" comment="dotnet-templates-9.0-9.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968321" comment="netstandard-targeting-pack-2.1-9.0.104-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3327" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-24070" ref_url="https://www.suse.com/security/cve/CVE-2025-24070/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2670.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2670.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24070/">CVE-2025-24070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24070">CVE-2025-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968322" comment="aspnetcore-runtime-8.0-8.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968323" comment="aspnetcore-runtime-dbg-8.0-8.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968324" comment="aspnetcore-targeting-pack-8.0-8.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968325" comment="dotnet-apphost-pack-8.0-8.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968326" comment="dotnet-hostfxr-8.0-8.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968327" comment="dotnet-runtime-8.0-8.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968328" comment="dotnet-runtime-dbg-8.0-8.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968329" comment="dotnet-sdk-8.0-8.0.114-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968330" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968331" comment="dotnet-sdk-dbg-8.0-8.0.114-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968332" comment="dotnet-targeting-pack-8.0-8.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968333" comment="dotnet-templates-8.0-8.0.114-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3328" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-56171" ref_url="https://www.suse.com/security/cve/CVE-2024-56171/" source="CVE"/>
		<reference ref_id="CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2686.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2686.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56171/">CVE-2024-56171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968334" comment="libxml2-2.9.7-19.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968335" comment="libxml2-devel-2.9.7-19.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968336" comment="python3-libxml2-2.9.7-19.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3329" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-24528" ref_url="https://www.suse.com/security/cve/CVE-2025-24528/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2722.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2722.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24528/">CVE-2025-24528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968337" comment="krb5-devel-1.18.2-31.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968338" comment="krb5-libs-1.18.2-31.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968339" comment="krb5-pkinit-1.18.2-31.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968340" comment="krb5-server-1.18.2-31.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968341" comment="krb5-server-ldap-1.18.2-31.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968342" comment="krb5-workstation-1.18.2-31.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968343" comment="libkadm5-1.18.2-31.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3330" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-24201" ref_url="https://www.suse.com/security/cve/CVE-2025-24201/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2863.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2863.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24201/">CVE-2025-24201 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24201">CVE-2025-24201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968344" comment="webkit2gtk3-2.46.6-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968345" comment="webkit2gtk3-devel-2.46.6-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968346" comment="webkit2gtk3-jsc-2.46.6-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968347" comment="webkit2gtk3-jsc-devel-2.46.6-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3331" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937/" source="CVE"/>
		<reference ref_id="CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2900.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2900.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968348" comment="thunderbird-128.8.0-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3332" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3026.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3026.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969542" comment="bpftool-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969543" comment="kernel-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969544" comment="kernel-abi-stablelists-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969545" comment="kernel-core-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969546" comment="kernel-cross-headers-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969547" comment="kernel-debug-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969548" comment="kernel-debug-core-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969550" comment="kernel-debug-modules-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969551" comment="kernel-debug-modules-extra-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969553" comment="kernel-doc-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969554" comment="kernel-headers-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969555" comment="kernel-modules-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969556" comment="kernel-modules-extra-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969557" comment="kernel-tools-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969558" comment="kernel-tools-libs-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969560" comment="perf-4.18.0-553.45.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969561" comment="python3-perf-4.18.0-553.45.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3333" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3210.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3210.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970352" comment="aardvark-dns-1.10.1-2.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970353" comment="buildah-1.33.12-1.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970354" comment="buildah-tests-1.33.12-1.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970355" comment="cockpit-podman-84.1-1.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970356" comment="conmon-2.1.10-1.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970357" comment="container-selinux-2.229.0-2.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970358" comment="containernetworking-plugins-1.4.0-5.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970359" comment="containers-common-1-82.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970360" comment="crit-3.18-5.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970361" comment="criu-3.18-5.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970362" comment="criu-devel-3.18-5.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970363" comment="criu-libs-3.18-5.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970364" comment="crun-1.14.3-2.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970365" comment="fuse-overlayfs-1.13-1.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970366" comment="libslirp-4.4.0-2.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970367" comment="libslirp-devel-4.4.0-2.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970368" comment="netavark-1.10.3-1.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970369" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970370" comment="podman-4.9.4-20.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970371" comment="podman-catatonit-4.9.4-20.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970372" comment="podman-docker-4.9.4-20.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970373" comment="podman-gvproxy-4.9.4-20.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970374" comment="podman-plugins-4.9.4-20.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970375" comment="podman-remote-4.9.4-20.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970376" comment="podman-tests-4.9.4-20.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970377" comment="python3-criu-3.18-5.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970378" comment="python3-podman-4.9.0-3.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970379" comment="runc-1.1.12-6.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970380" comment="skopeo-1.14.5-3.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970381" comment="skopeo-tests-1.14.5-3.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970382" comment="slirp4netns-1.2.3-1.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970383" comment="toolbox-0.0.99.5-2.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970384" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+22931+799fd806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970385" comment="udica-0.2.6-21.module+el8.10.0+22931+799fd806 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3334" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21785" ref_url="https://www.suse.com/security/cve/CVE-2025-21785/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3260.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3260.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21785/">CVE-2025-21785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970386" comment="bpftool-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970387" comment="kernel-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970388" comment="kernel-abi-stablelists-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970389" comment="kernel-core-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970390" comment="kernel-cross-headers-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970391" comment="kernel-debug-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970392" comment="kernel-debug-core-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970394" comment="kernel-debug-modules-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970395" comment="kernel-debug-modules-extra-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970397" comment="kernel-doc-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970398" comment="kernel-headers-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970399" comment="kernel-modules-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970400" comment="kernel-modules-extra-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970401" comment="kernel-tools-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970402" comment="kernel-tools-libs-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970404" comment="perf-4.18.0-553.46.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970405" comment="python3-perf-4.18.0-553.46.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3335" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-0624" ref_url="https://www.suse.com/security/cve/CVE-2025-0624/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3367.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3367.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0624/">CVE-2025-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0624">CVE-2025-0624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009970621" comment="grub2-common-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970622" comment="grub2-efi-ia32-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970623" comment="grub2-efi-ia32-cdboot-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970624" comment="grub2-efi-ia32-modules-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970625" comment="grub2-efi-x64-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970626" comment="grub2-efi-x64-cdboot-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970627" comment="grub2-efi-x64-modules-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970628" comment="grub2-pc-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970629" comment="grub2-pc-modules-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970630" comment="grub2-tools-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970631" comment="grub2-tools-efi-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970632" comment="grub2-tools-extra-2.02-162.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009970633" comment="grub2-tools-minimal-2.02-162.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3336" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-27516" ref_url="https://www.suse.com/security/cve/CVE-2025-27516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3388.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3388.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-27516/">CVE-2025-27516 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27516">CVE-2025-27516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974169" comment="python3-jinja2-2.10.1-7.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3337" version="1" class="patch">
	<metadata>
		<title>security update for freetype (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-27363" ref_url="https://www.suse.com/security/cve/CVE-2025-27363/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3421.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3421.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27363/">CVE-2025-27363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27363">CVE-2025-27363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974170" comment="freetype-2.9.1-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974171" comment="freetype-devel-2.9.1-10.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3338" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974394" comment="firefox-128.9.0-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3339" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<reference ref_id="CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3615.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3615.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974495" comment="libxslt-1.1.32-6.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974496" comment="libxslt-devel-1.1.32-6.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3340" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-50379" ref_url="https://www.suse.com/security/cve/CVE-2024-50379/" source="CVE"/>
		<reference ref_id="CVE-2025-24813" ref_url="https://www.suse.com/security/cve/CVE-2025-24813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3683.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3683.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50379/">CVE-2024-50379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50379">CVE-2024-50379 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24813/">CVE-2025-24813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24813">CVE-2025-24813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974598" comment="tomcat-9.0.87-1.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974599" comment="tomcat-admin-webapps-9.0.87-1.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974600" comment="tomcat-docs-webapp-9.0.87-1.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974601" comment="tomcat-el-3.0-api-9.0.87-1.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974602" comment="tomcat-jsp-2.3-api-9.0.87-1.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974603" comment="tomcat-lib-9.0.87-1.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974604" comment="tomcat-servlet-4.0-api-9.0.87-1.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974605" comment="tomcat-webapps-9.0.87-1.el8_10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3341" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336/" source="CVE"/>
		<reference ref_id="CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3772.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3772.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974974" comment="delve-1.24.1-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974975" comment="go-toolset-1.23.6-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974976" comment="golang-1.23.6-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974977" comment="golang-bin-1.23.6-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974978" comment="golang-docs-1.23.6-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974979" comment="golang-misc-1.23.6-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974980" comment="golang-src-1.23.6-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974981" comment="golang-tests-1.23.6-1.module+el8.10.0+22945+b2c96a17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3342" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-0395" ref_url="https://www.suse.com/security/cve/CVE-2025-0395/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3828.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3828.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0395/">CVE-2025-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975072" comment="compat-libpthread-nonshared-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975073" comment="glibc-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975074" comment="glibc-all-langpacks-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975075" comment="glibc-benchtests-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975076" comment="glibc-common-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975077" comment="glibc-devel-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975078" comment="glibc-doc-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975079" comment="glibc-gconv-extra-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975080" comment="glibc-headers-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975081" comment="glibc-langpack-aa-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975082" comment="glibc-langpack-af-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975083" comment="glibc-langpack-agr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975084" comment="glibc-langpack-ak-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975085" comment="glibc-langpack-am-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975086" comment="glibc-langpack-an-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975087" comment="glibc-langpack-anp-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975088" comment="glibc-langpack-ar-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975089" comment="glibc-langpack-as-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975090" comment="glibc-langpack-ast-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975091" comment="glibc-langpack-ayc-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975092" comment="glibc-langpack-az-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975093" comment="glibc-langpack-be-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975094" comment="glibc-langpack-bem-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975095" comment="glibc-langpack-ber-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975096" comment="glibc-langpack-bg-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975097" comment="glibc-langpack-bhb-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975098" comment="glibc-langpack-bho-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975099" comment="glibc-langpack-bi-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975100" comment="glibc-langpack-bn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975101" comment="glibc-langpack-bo-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975102" comment="glibc-langpack-br-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975103" comment="glibc-langpack-brx-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975104" comment="glibc-langpack-bs-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975105" comment="glibc-langpack-byn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975106" comment="glibc-langpack-ca-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975107" comment="glibc-langpack-ce-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975108" comment="glibc-langpack-chr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975109" comment="glibc-langpack-cmn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975110" comment="glibc-langpack-crh-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975111" comment="glibc-langpack-cs-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975112" comment="glibc-langpack-csb-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975113" comment="glibc-langpack-cv-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975114" comment="glibc-langpack-cy-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975115" comment="glibc-langpack-da-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975116" comment="glibc-langpack-de-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975117" comment="glibc-langpack-doi-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975118" comment="glibc-langpack-dsb-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975119" comment="glibc-langpack-dv-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975120" comment="glibc-langpack-dz-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975121" comment="glibc-langpack-el-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975122" comment="glibc-langpack-en-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975123" comment="glibc-langpack-eo-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975124" comment="glibc-langpack-es-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975125" comment="glibc-langpack-et-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975126" comment="glibc-langpack-eu-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975127" comment="glibc-langpack-fa-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975128" comment="glibc-langpack-ff-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975129" comment="glibc-langpack-fi-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975130" comment="glibc-langpack-fil-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975131" comment="glibc-langpack-fo-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975132" comment="glibc-langpack-fr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975133" comment="glibc-langpack-fur-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975134" comment="glibc-langpack-fy-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975135" comment="glibc-langpack-ga-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975136" comment="glibc-langpack-gd-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975137" comment="glibc-langpack-gez-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975138" comment="glibc-langpack-gl-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975139" comment="glibc-langpack-gu-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975140" comment="glibc-langpack-gv-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975141" comment="glibc-langpack-ha-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975142" comment="glibc-langpack-hak-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975143" comment="glibc-langpack-he-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975144" comment="glibc-langpack-hi-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975145" comment="glibc-langpack-hif-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975146" comment="glibc-langpack-hne-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975147" comment="glibc-langpack-hr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975148" comment="glibc-langpack-hsb-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975149" comment="glibc-langpack-ht-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975150" comment="glibc-langpack-hu-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975151" comment="glibc-langpack-hy-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975152" comment="glibc-langpack-ia-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975153" comment="glibc-langpack-id-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975154" comment="glibc-langpack-ig-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975155" comment="glibc-langpack-ik-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975156" comment="glibc-langpack-is-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975157" comment="glibc-langpack-it-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975158" comment="glibc-langpack-iu-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975159" comment="glibc-langpack-ja-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975160" comment="glibc-langpack-ka-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975161" comment="glibc-langpack-kab-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975162" comment="glibc-langpack-kk-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975163" comment="glibc-langpack-kl-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975164" comment="glibc-langpack-km-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975165" comment="glibc-langpack-kn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975166" comment="glibc-langpack-ko-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975167" comment="glibc-langpack-kok-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975168" comment="glibc-langpack-ks-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975169" comment="glibc-langpack-ku-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975170" comment="glibc-langpack-kw-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975171" comment="glibc-langpack-ky-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975172" comment="glibc-langpack-lb-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975173" comment="glibc-langpack-lg-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975174" comment="glibc-langpack-li-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975175" comment="glibc-langpack-lij-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975176" comment="glibc-langpack-ln-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975177" comment="glibc-langpack-lo-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975178" comment="glibc-langpack-lt-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975179" comment="glibc-langpack-lv-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975180" comment="glibc-langpack-lzh-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975181" comment="glibc-langpack-mag-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975182" comment="glibc-langpack-mai-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975183" comment="glibc-langpack-mfe-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975184" comment="glibc-langpack-mg-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975185" comment="glibc-langpack-mhr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975186" comment="glibc-langpack-mi-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975187" comment="glibc-langpack-miq-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975188" comment="glibc-langpack-mjw-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975189" comment="glibc-langpack-mk-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975190" comment="glibc-langpack-ml-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975191" comment="glibc-langpack-mn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975192" comment="glibc-langpack-mni-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975193" comment="glibc-langpack-mr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975194" comment="glibc-langpack-ms-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975195" comment="glibc-langpack-mt-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975196" comment="glibc-langpack-my-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975197" comment="glibc-langpack-nan-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975198" comment="glibc-langpack-nb-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975199" comment="glibc-langpack-nds-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975200" comment="glibc-langpack-ne-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975201" comment="glibc-langpack-nhn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975202" comment="glibc-langpack-niu-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975203" comment="glibc-langpack-nl-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975204" comment="glibc-langpack-nn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975205" comment="glibc-langpack-nr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975206" comment="glibc-langpack-nso-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975207" comment="glibc-langpack-oc-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975208" comment="glibc-langpack-om-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975209" comment="glibc-langpack-or-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975210" comment="glibc-langpack-os-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975211" comment="glibc-langpack-pa-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975212" comment="glibc-langpack-pap-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975213" comment="glibc-langpack-pl-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975214" comment="glibc-langpack-ps-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975215" comment="glibc-langpack-pt-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975216" comment="glibc-langpack-quz-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975217" comment="glibc-langpack-raj-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975218" comment="glibc-langpack-ro-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975219" comment="glibc-langpack-ru-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975220" comment="glibc-langpack-rw-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975221" comment="glibc-langpack-sa-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975222" comment="glibc-langpack-sah-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975223" comment="glibc-langpack-sat-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975224" comment="glibc-langpack-sc-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975225" comment="glibc-langpack-sd-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975226" comment="glibc-langpack-se-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975227" comment="glibc-langpack-sgs-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975228" comment="glibc-langpack-shn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975229" comment="glibc-langpack-shs-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975230" comment="glibc-langpack-si-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975231" comment="glibc-langpack-sid-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975232" comment="glibc-langpack-sk-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975233" comment="glibc-langpack-sl-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975234" comment="glibc-langpack-sm-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975235" comment="glibc-langpack-so-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975236" comment="glibc-langpack-sq-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975237" comment="glibc-langpack-sr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975238" comment="glibc-langpack-ss-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975239" comment="glibc-langpack-st-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975240" comment="glibc-langpack-sv-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975241" comment="glibc-langpack-sw-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975242" comment="glibc-langpack-szl-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975243" comment="glibc-langpack-ta-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975244" comment="glibc-langpack-tcy-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975245" comment="glibc-langpack-te-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975246" comment="glibc-langpack-tg-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975247" comment="glibc-langpack-th-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975248" comment="glibc-langpack-the-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975249" comment="glibc-langpack-ti-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975250" comment="glibc-langpack-tig-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975251" comment="glibc-langpack-tk-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975252" comment="glibc-langpack-tl-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975253" comment="glibc-langpack-tn-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975254" comment="glibc-langpack-to-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975255" comment="glibc-langpack-tpi-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975256" comment="glibc-langpack-tr-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975257" comment="glibc-langpack-ts-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975258" comment="glibc-langpack-tt-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975259" comment="glibc-langpack-ug-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975260" comment="glibc-langpack-uk-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975261" comment="glibc-langpack-unm-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975262" comment="glibc-langpack-ur-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975263" comment="glibc-langpack-uz-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975264" comment="glibc-langpack-ve-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975265" comment="glibc-langpack-vi-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975266" comment="glibc-langpack-wa-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975267" comment="glibc-langpack-wae-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975268" comment="glibc-langpack-wal-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975269" comment="glibc-langpack-wo-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975270" comment="glibc-langpack-xh-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975271" comment="glibc-langpack-yi-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975272" comment="glibc-langpack-yo-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975273" comment="glibc-langpack-yue-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975274" comment="glibc-langpack-yuw-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975275" comment="glibc-langpack-zh-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975276" comment="glibc-langpack-zu-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975277" comment="glibc-locale-source-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975278" comment="glibc-minimal-langpack-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975279" comment="glibc-nss-devel-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975280" comment="glibc-static-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975281" comment="glibc-utils-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975282" comment="libnsl-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975283" comment="nscd-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975284" comment="nss_db-2.28-251.el8_10.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975285" comment="nss_hesiod-2.28-251.el8_10.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3343" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3845.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3845.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976014" comment="java-1.8.0-openjdk-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976015" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976016" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.452.b09-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976017" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.452.b09-2.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976018" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976019" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976020" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976021" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976022" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976023" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976024" comment="java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976025" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976026" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976027" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976028" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976029" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976030" comment="java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976031" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976032" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976033" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3344" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999610" comment="java-11-openjdk-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999611" comment="java-11-openjdk-demo-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999552" comment="java-11-openjdk-demo-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999553" comment="java-11-openjdk-demo-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999612" comment="java-11-openjdk-devel-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999556" comment="java-11-openjdk-devel-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999557" comment="java-11-openjdk-devel-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999558" comment="java-11-openjdk-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999613" comment="java-11-openjdk-headless-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999561" comment="java-11-openjdk-headless-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999562" comment="java-11-openjdk-headless-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999614" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999615" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999616" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999569" comment="java-11-openjdk-jmods-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999570" comment="java-11-openjdk-jmods-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999571" comment="java-11-openjdk-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999617" comment="java-11-openjdk-src-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999574" comment="java-11-openjdk-src-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999575" comment="java-11-openjdk-src-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999618" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999578" comment="java-11-openjdk-static-libs-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999579" comment="java-11-openjdk-static-libs-slowdebug-11.0.27.0.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3345" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976149" comment="java-17-openjdk-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976150" comment="java-17-openjdk-demo-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976151" comment="java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976152" comment="java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976153" comment="java-17-openjdk-devel-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976154" comment="java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976155" comment="java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976156" comment="java-17-openjdk-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976157" comment="java-17-openjdk-headless-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976158" comment="java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976159" comment="java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976160" comment="java-17-openjdk-javadoc-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976161" comment="java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976162" comment="java-17-openjdk-jmods-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976163" comment="java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976164" comment="java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976165" comment="java-17-openjdk-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976166" comment="java-17-openjdk-src-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976167" comment="java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976168" comment="java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976169" comment="java-17-openjdk-static-libs-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976170" comment="java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976171" comment="java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3346" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3855.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3855.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976253" comment="java-21-openjdk-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976254" comment="java-21-openjdk-demo-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976255" comment="java-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976256" comment="java-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976257" comment="java-21-openjdk-devel-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976258" comment="java-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976259" comment="java-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976260" comment="java-21-openjdk-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976261" comment="java-21-openjdk-headless-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976262" comment="java-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976263" comment="java-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976264" comment="java-21-openjdk-javadoc-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976265" comment="java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976266" comment="java-21-openjdk-jmods-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976267" comment="java-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976268" comment="java-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976269" comment="java-21-openjdk-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976270" comment="java-21-openjdk-src-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976271" comment="java-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976272" comment="java-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976273" comment="java-21-openjdk-static-libs-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976274" comment="java-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976275" comment="java-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3347" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-53150" ref_url="https://www.suse.com/security/cve/CVE-2024-53150/" source="CVE"/>
		<reference ref_id="CVE-2024-53241" ref_url="https://www.suse.com/security/cve/CVE-2024-53241/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3893.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3893.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53150/">CVE-2024-53150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53241/">CVE-2024-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975553" comment="bpftool-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975554" comment="kernel-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975555" comment="kernel-abi-stablelists-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975556" comment="kernel-core-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975557" comment="kernel-cross-headers-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975558" comment="kernel-debug-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975559" comment="kernel-debug-core-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975561" comment="kernel-debug-modules-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975562" comment="kernel-debug-modules-extra-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975564" comment="kernel-doc-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975565" comment="kernel-headers-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975566" comment="kernel-modules-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975567" comment="kernel-modules-extra-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975568" comment="kernel-tools-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975569" comment="kernel-tools-libs-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975571" comment="perf-4.18.0-553.50.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975572" comment="python3-perf-4.18.0-553.50.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3348" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-8176" ref_url="https://www.suse.com/security/cve/CVE-2024-8176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8176/">CVE-2024-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975727" comment="expat-2.2.5-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975728" comment="expat-devel-2.2.5-17.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3349" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-44192" ref_url="https://www.suse.com/security/cve/CVE-2024-44192/" source="CVE"/>
		<reference ref_id="CVE-2024-54467" ref_url="https://www.suse.com/security/cve/CVE-2024-54467/" source="CVE"/>
		<reference ref_id="CVE-2024-54551" ref_url="https://www.suse.com/security/cve/CVE-2024-54551/" source="CVE"/>
		<reference ref_id="CVE-2025-24189" ref_url="https://www.suse.com/security/cve/CVE-2025-24189/" source="CVE"/>
		<reference ref_id="CVE-2025-24208" ref_url="https://www.suse.com/security/cve/CVE-2025-24208/" source="CVE"/>
		<reference ref_id="CVE-2025-24209" ref_url="https://www.suse.com/security/cve/CVE-2025-24209/" source="CVE"/>
		<reference ref_id="CVE-2025-24216" ref_url="https://www.suse.com/security/cve/CVE-2025-24216/" source="CVE"/>
		<reference ref_id="CVE-2025-30427" ref_url="https://www.suse.com/security/cve/CVE-2025-30427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3974.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3974.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44192/">CVE-2024-44192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44192">CVE-2024-44192 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54467/">CVE-2024-54467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54467">CVE-2024-54467 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54551/">CVE-2024-54551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54551">CVE-2024-54551 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24189/">CVE-2025-24189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24189">CVE-2025-24189 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24208/">CVE-2025-24208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24208">CVE-2025-24208 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24209/">CVE-2025-24209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24209">CVE-2025-24209 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24216/">CVE-2025-24216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24216">CVE-2025-24216 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30427/">CVE-2025-30427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30427">CVE-2025-30427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975984" comment="webkit2gtk3-2.48.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975985" comment="webkit2gtk3-devel-2.48.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975986" comment="webkit2gtk3-jsc-2.48.1-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975987" comment="webkit2gtk3-jsc-devel-2.48.1-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3350" version="1" class="patch">
	<metadata>
		<title>security update for cjose (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-31492" ref_url="https://www.suse.com/security/cve/CVE-2025-31492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3997.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3997.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31492/">CVE-2025-31492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31492">CVE-2025-31492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881234" comment="cjose-0.6.1-4.module+el8.10.0+21813+b5444eb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881235" comment="cjose-devel-0.6.1-4.module+el8.10.0+21813+b5444eb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975988" comment="mod_auth_openidc-2.4.9.4-7.module+el8.10.0+23023+ba6d7066 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3351" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349/" source="CVE"/>
		<reference ref_id="CVE-2023-51589" ref_url="https://www.suse.com/security/cve/CVE-2023-51589/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4043.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4043.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-51589/">CVE-2023-51589 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51589">CVE-2023-51589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976047" comment="bluez-5.63-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976048" comment="bluez-cups-5.63-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976049" comment="bluez-hid2hci-5.63-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976050" comment="bluez-libs-5.63-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976051" comment="bluez-libs-devel-5.63-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976052" comment="bluez-obexd-5.63-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3352" version="1" class="patch">
	<metadata>
		<title>security update for xmlrpc-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-8176" ref_url="https://www.suse.com/security/cve/CVE-2024-8176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4048.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4048.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8176/">CVE-2024-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976172" comment="xmlrpc-c-1.51.0-11.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976173" comment="xmlrpc-c-c++-1.51.0-11.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976174" comment="xmlrpc-c-client-1.51.0-11.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976175" comment="xmlrpc-c-client++-1.51.0-11.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976176" comment="xmlrpc-c-devel-1.51.0-11.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3353" version="1" class="patch">
	<metadata>
		<title>security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-12133" ref_url="https://www.suse.com/security/cve/CVE-2024-12133/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12133/">CVE-2024-12133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976177" comment="libtasn1-4.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976178" comment="libtasn1-devel-4.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976179" comment="libtasn1-tools-4.13-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3354" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-12243" ref_url="https://www.suse.com/security/cve/CVE-2024-12243/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4051.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4051.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12243/">CVE-2024-12243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12243">CVE-2024-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976180" comment="gnutls-3.6.16-8.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976181" comment="gnutls-c++-3.6.16-8.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976182" comment="gnutls-dane-3.6.16-8.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976183" comment="gnutls-devel-3.6.16-8.el8_10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976184" comment="gnutls-utils-3.6.16-8.el8_10.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3355" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-39908" ref_url="https://www.suse.com/security/cve/CVE-2024-39908/" source="CVE"/>
		<reference ref_id="CVE-2024-41123" ref_url="https://www.suse.com/security/cve/CVE-2024-41123/" source="CVE"/>
		<reference ref_id="CVE-2024-41946" ref_url="https://www.suse.com/security/cve/CVE-2024-41946/" source="CVE"/>
		<reference ref_id="CVE-2024-43398" ref_url="https://www.suse.com/security/cve/CVE-2024-43398/" source="CVE"/>
		<reference ref_id="CVE-2025-27219" ref_url="https://www.suse.com/security/cve/CVE-2025-27219/" source="CVE"/>
		<reference ref_id="CVE-2025-27220" ref_url="https://www.suse.com/security/cve/CVE-2025-27220/" source="CVE"/>
		<reference ref_id="CVE-2025-27221" ref_url="https://www.suse.com/security/cve/CVE-2025-27221/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39908/">CVE-2024-39908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39908">CVE-2024-39908 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41123/">CVE-2024-41123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41946/">CVE-2024-41946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43398/">CVE-2024-43398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43398">CVE-2024-43398 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27219/">CVE-2025-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27219">CVE-2025-27219 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27220/">CVE-2025-27220 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27220">CVE-2025-27220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27221/">CVE-2025-27221 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27221">CVE-2025-27221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976185" comment="ruby-3.1.7-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976186" comment="ruby-bundled-gems-3.1.7-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976187" comment="ruby-default-gems-3.1.7-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976188" comment="ruby-devel-3.1.7-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976189" comment="ruby-doc-3.1.7-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976190" comment="ruby-libs-3.1.7-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874596" comment="rubygem-abrt-0.4.0-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874597" comment="rubygem-abrt-doc-0.4.0-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976191" comment="rubygem-bigdecimal-3.1.1-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976192" comment="rubygem-bundler-2.3.27-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976193" comment="rubygem-io-console-0.5.11-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976194" comment="rubygem-irb-1.4.1-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976195" comment="rubygem-json-2.6.1-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976196" comment="rubygem-minitest-5.15.0-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874604" comment="rubygem-mysql2-0.5.3-3.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874605" comment="rubygem-mysql2-doc-0.5.3-3.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874606" comment="rubygem-pg-1.3.2-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874607" comment="rubygem-pg-doc-1.3.2-1.module+el8.10.0+21470+43ec8058 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976197" comment="rubygem-power_assert-2.0.1-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976198" comment="rubygem-psych-4.0.4-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976199" comment="rubygem-rake-13.0.6-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976200" comment="rubygem-rbs-2.7.0-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976201" comment="rubygem-rdoc-6.4.1.1-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976202" comment="rubygem-rexml-3.3.9-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976203" comment="rubygem-rss-0.3.1-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976204" comment="rubygem-test-unit-3.5.3-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976205" comment="rubygem-typeprof-0.21.3-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976206" comment="rubygems-3.3.27-145.module+el8.10.0+23011+f9d508f8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976207" comment="rubygems-devel-3.3.27-145.module+el8.10.0+23011+f9d508f8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3356" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028/" source="CVE"/>
		<reference ref_id="CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029/" source="CVE"/>
		<reference ref_id="CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4170.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4170.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976399" comment="thunderbird-128.9.0-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3357" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-27792" ref_url="https://www.suse.com/security/cve/CVE-2020-27792/" source="CVE"/>
		<reference ref_id="CVE-2023-46751" ref_url="https://www.suse.com/security/cve/CVE-2023-46751/" source="CVE"/>
		<reference ref_id="CVE-2024-46951" ref_url="https://www.suse.com/security/cve/CVE-2024-46951/" source="CVE"/>
		<reference ref_id="CVE-2024-46952" ref_url="https://www.suse.com/security/cve/CVE-2024-46952/" source="CVE"/>
		<reference ref_id="CVE-2024-46953" ref_url="https://www.suse.com/security/cve/CVE-2024-46953/" source="CVE"/>
		<reference ref_id="CVE-2024-46954" ref_url="https://www.suse.com/security/cve/CVE-2024-46954/" source="CVE"/>
		<reference ref_id="CVE-2024-46956" ref_url="https://www.suse.com/security/cve/CVE-2024-46956/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4362.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4362.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27792/">CVE-2020-27792 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27792">CVE-2020-27792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46751/">CVE-2023-46751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46751">CVE-2023-46751 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46951/">CVE-2024-46951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46951">CVE-2024-46951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46952/">CVE-2024-46952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46952">CVE-2024-46952 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46953/">CVE-2024-46953 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46953">CVE-2024-46953 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46954/">CVE-2024-46954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46954">CVE-2024-46954 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46956/">CVE-2024-46956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46956">CVE-2024-46956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976890" comment="ghostscript-9.27-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976891" comment="ghostscript-doc-9.27-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976892" comment="ghostscript-tools-dvipdf-9.27-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976893" comment="ghostscript-tools-fonts-9.27-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976894" comment="ghostscript-tools-printing-9.27-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976895" comment="ghostscript-x11-9.27-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976896" comment="libgs-9.27-16.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976897" comment="libgs-devel-9.27-16.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3358" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<reference ref_id="CVE-2025-4083" ref_url="https://www.suse.com/security/cve/CVE-2025-4083/" source="CVE"/>
		<reference ref_id="CVE-2025-4087" ref_url="https://www.suse.com/security/cve/CVE-2025-4087/" source="CVE"/>
		<reference ref_id="CVE-2025-4091" ref_url="https://www.suse.com/security/cve/CVE-2025-4091/" source="CVE"/>
		<reference ref_id="CVE-2025-4093" ref_url="https://www.suse.com/security/cve/CVE-2025-4093/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4458.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4458.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4083/">CVE-2025-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4083">CVE-2025-4083 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4087/">CVE-2025-4087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4087">CVE-2025-4087 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4091/">CVE-2025-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4091">CVE-2025-4091 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4093/">CVE-2025-4093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4093">CVE-2025-4093 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977532" comment="firefox-128.10.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3359" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-31498" ref_url="https://www.suse.com/security/cve/CVE-2025-31498/" source="CVE"/>
		<reference ref_id="CVE-2025-3277" ref_url="https://www.suse.com/security/cve/CVE-2025-3277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4459.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4459.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31498/">CVE-2025-31498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31498">CVE-2025-31498 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3277/">CVE-2025-3277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3277">CVE-2025-3277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977533" comment="nodejs-22.15.0-1.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977534" comment="nodejs-devel-22.15.0-1.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977535" comment="nodejs-docs-22.15.0-1.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977536" comment="nodejs-full-i18n-22.15.0-1.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977537" comment="nodejs-libs-22.15.0-1.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977538" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977539" comment="nodejs-packaging-2021.06-4.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977540" comment="nodejs-packaging-bundler-2021.06-4.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977541" comment="npm-10.9.2-1.22.15.0.1.module+el8.10.0+23068+28ff2340 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977542" comment="v8-12.4-devel-12.4.254.21-1.22.15.0.1.module+el8.10.0+23068+28ff2340 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3360" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-31498" ref_url="https://www.suse.com/security/cve/CVE-2025-31498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4461.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4461.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31498/">CVE-2025-31498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31498">CVE-2025-31498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977543" comment="nodejs-20.19.1-1.module+el8.10.0+23054+5431297f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977544" comment="nodejs-devel-20.19.1-1.module+el8.10.0+23054+5431297f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977545" comment="nodejs-docs-20.19.1-1.module+el8.10.0+23054+5431297f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977546" comment="nodejs-full-i18n-20.19.1-1.module+el8.10.0+23054+5431297f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977547" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+22904+d0fedeff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977548" comment="nodejs-packaging-2021.06-4.module+el8.10.0+22904+d0fedeff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977549" comment="nodejs-packaging-bundler-2021.06-4.module+el8.10.0+22904+d0fedeff is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977550" comment="npm-10.8.2-1.20.19.1.1.module+el8.10.0+23054+5431297f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3361" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-32050" ref_url="https://www.suse.com/security/cve/CVE-2025-32050/" source="CVE"/>
		<reference ref_id="CVE-2025-32052" ref_url="https://www.suse.com/security/cve/CVE-2025-32052/" source="CVE"/>
		<reference ref_id="CVE-2025-32053" ref_url="https://www.suse.com/security/cve/CVE-2025-32053/" source="CVE"/>
		<reference ref_id="CVE-2025-32906" ref_url="https://www.suse.com/security/cve/CVE-2025-32906/" source="CVE"/>
		<reference ref_id="CVE-2025-32911" ref_url="https://www.suse.com/security/cve/CVE-2025-32911/" source="CVE"/>
		<reference ref_id="CVE-2025-32913" ref_url="https://www.suse.com/security/cve/CVE-2025-32913/" source="CVE"/>
		<reference ref_id="CVE-2025-46420" ref_url="https://www.suse.com/security/cve/CVE-2025-46420/" source="CVE"/>
		<reference ref_id="CVE-2025-46421" ref_url="https://www.suse.com/security/cve/CVE-2025-46421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4560.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4560.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32050/">CVE-2025-32050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32050">CVE-2025-32050 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32052/">CVE-2025-32052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32052">CVE-2025-32052 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32053/">CVE-2025-32053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32053">CVE-2025-32053 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32906/">CVE-2025-32906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32906">CVE-2025-32906 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-32911/">CVE-2025-32911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32911">CVE-2025-32911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32913/">CVE-2025-32913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32913">CVE-2025-32913 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46420/">CVE-2025-46420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46420">CVE-2025-46420 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46421/">CVE-2025-46421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46421">CVE-2025-46421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977551" comment="libsoup-2.62.3-8.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977552" comment="libsoup-devel-2.62.3-8.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3362" version="1" class="patch">
	<metadata>
		<title>security update for cjose (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-3891" ref_url="https://www.suse.com/security/cve/CVE-2025-3891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4597.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4597.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3891/">CVE-2025-3891 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3891">CVE-2025-3891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881234" comment="cjose-0.6.1-4.module+el8.10.0+21813+b5444eb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881235" comment="cjose-devel-0.6.1-4.module+el8.10.0+21813+b5444eb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977553" comment="mod_auth_openidc-2.4.9.4-8.module+el8.10.0+23056+decb09b1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3363" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-2830" ref_url="https://www.suse.com/security/cve/CVE-2025-2830/" source="CVE"/>
		<reference ref_id="CVE-2025-3522" ref_url="https://www.suse.com/security/cve/CVE-2025-3522/" source="CVE"/>
		<reference ref_id="CVE-2025-3523" ref_url="https://www.suse.com/security/cve/CVE-2025-3523/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4649.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4649.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="4.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2830/">CVE-2025-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2830">CVE-2025-2830 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3522/">CVE-2025-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3522">CVE-2025-3522 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3523/">CVE-2025-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3523">CVE-2025-3523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981836" comment="thunderbird-128.9.2-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3364" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4658.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4658.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009981837" comment="libtiff-4.0.9-34.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981838" comment="libtiff-devel-4.0.9-34.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981839" comment="libtiff-tools-4.0.9-34.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3365" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817/" source="CVE"/>
		<reference ref_id="CVE-2025-4083" ref_url="https://www.suse.com/security/cve/CVE-2025-4083/" source="CVE"/>
		<reference ref_id="CVE-2025-4087" ref_url="https://www.suse.com/security/cve/CVE-2025-4087/" source="CVE"/>
		<reference ref_id="CVE-2025-4091" ref_url="https://www.suse.com/security/cve/CVE-2025-4091/" source="CVE"/>
		<reference ref_id="CVE-2025-4093" ref_url="https://www.suse.com/security/cve/CVE-2025-4093/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4797.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4797.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4083/">CVE-2025-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4083">CVE-2025-4083 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4087/">CVE-2025-4087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4087">CVE-2025-4087 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4091/">CVE-2025-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4091">CVE-2025-4091 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4093/">CVE-2025-4093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4093">CVE-2025-4093 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009981935" comment="thunderbird-128.10.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3366" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011/" source="CVE"/>
		<reference ref_id="CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7531.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7531.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982182" comment="bpftool-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982183" comment="kernel-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982184" comment="kernel-abi-stablelists-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982185" comment="kernel-core-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982186" comment="kernel-cross-headers-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982187" comment="kernel-debug-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982188" comment="kernel-debug-core-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982190" comment="kernel-debug-modules-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982191" comment="kernel-debug-modules-extra-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982193" comment="kernel-doc-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982194" comment="kernel-headers-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982195" comment="kernel-modules-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982196" comment="kernel-modules-extra-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982197" comment="kernel-tools-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982198" comment="kernel-tools-libs-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982200" comment="perf-4.18.0-553.52.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982201" comment="python3-perf-4.18.0-553.52.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3367" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-19012" ref_url="https://www.suse.com/security/cve/CVE-2019-19012/" source="CVE"/>
		<reference ref_id="CVE-2021-43809" ref_url="https://www.suse.com/security/cve/CVE-2021-43809/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7539.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7539.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19012/">CVE-2019-19012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-19012">CVE-2019-19012 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43809/">CVE-2021-43809 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43809">CVE-2021-43809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982202" comment="ruby-2.5.9-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982203" comment="ruby-devel-2.5.9-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982204" comment="ruby-doc-2.5.9-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982205" comment="ruby-irb-2.5.9-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982206" comment="ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873732" comment="rubygem-abrt-0.3.0-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873733" comment="rubygem-abrt-doc-0.3.0-4.module+el8.10.0+22021+135c76a8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982207" comment="rubygem-bigdecimal-1.3.4-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843367" comment="rubygem-bson-4.3.0-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843368" comment="rubygem-bson-doc-4.3.0-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982208" comment="rubygem-bundler-1.16.1-5.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982209" comment="rubygem-bundler-doc-1.16.1-5.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982210" comment="rubygem-did_you_mean-1.2.0-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982211" comment="rubygem-io-console-0.4.6-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982212" comment="rubygem-json-2.1.0-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982213" comment="rubygem-minitest-5.10.3-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843375" comment="rubygem-mongo-2.5.1-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843376" comment="rubygem-mongo-doc-2.5.1-2.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843377" comment="rubygem-mysql2-0.4.10-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843378" comment="rubygem-mysql2-doc-0.4.10-4.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982214" comment="rubygem-net-telnet-0.1.1-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982215" comment="rubygem-openssl-2.1.2-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843381" comment="rubygem-pg-1.0.0-3.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009843382" comment="rubygem-pg-doc-1.0.0-3.module+el8.9.0+19193+435404ae is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982216" comment="rubygem-power_assert-1.1.1-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982217" comment="rubygem-psych-3.0.2-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982218" comment="rubygem-rake-12.3.3-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982219" comment="rubygem-rdoc-6.0.1.1-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982220" comment="rubygem-test-unit-3.2.7-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982221" comment="rubygem-xmlrpc-0.3.0-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982222" comment="rubygems-2.7.6.3-114.module+el8.10.0+23088+750dc6ca is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982223" comment="rubygems-devel-2.7.6.3-114.module+el8.10.0+23088+750dc6ca is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3368" version="1" class="patch">
	<metadata>
		<title>security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7540.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7540.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">CVE-2020-13790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982224" comment="libjpeg-turbo-1.5.3-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982225" comment="libjpeg-turbo-devel-1.5.3-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982226" comment="libjpeg-turbo-utils-1.5.3-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982227" comment="turbojpeg-1.5.3-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982228" comment="turbojpeg-devel-1.5.3-14.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3369" version="1" class="patch">
	<metadata>
		<title>security update for yelp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-3155" ref_url="https://www.suse.com/security/cve/CVE-2025-3155/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7569.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7569.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3155/">CVE-2025-3155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3155">CVE-2025-3155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982229" comment="yelp-3.28.1-3.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982230" comment="yelp-devel-3.28.1-3.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982231" comment="yelp-libs-3.28.1-3.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982232" comment="yelp-xsl-3.28.0-2.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3370" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-26646" ref_url="https://www.suse.com/security/cve/CVE-2025-26646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7571.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7571.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26646/">CVE-2025-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26646">CVE-2025-26646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982233" comment="aspnetcore-runtime-9.0-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982234" comment="aspnetcore-runtime-dbg-9.0-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982235" comment="aspnetcore-targeting-pack-9.0-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982236" comment="dotnet-9.0.106-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982237" comment="dotnet-apphost-pack-9.0-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982238" comment="dotnet-host-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982239" comment="dotnet-hostfxr-9.0-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982240" comment="dotnet-runtime-9.0-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982241" comment="dotnet-runtime-dbg-9.0-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982242" comment="dotnet-sdk-9.0-9.0.106-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982243" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982244" comment="dotnet-sdk-aot-9.0-9.0.106-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982245" comment="dotnet-sdk-dbg-9.0-9.0.106-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982246" comment="dotnet-targeting-pack-9.0-9.0.5-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982247" comment="dotnet-templates-9.0-9.0.106-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982248" comment="netstandard-targeting-pack-2.1-9.0.106-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3371" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-26646" ref_url="https://www.suse.com/security/cve/CVE-2025-26646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7589.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7589.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26646/">CVE-2025-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26646">CVE-2025-26646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982249" comment="aspnetcore-runtime-8.0-8.0.16-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982250" comment="aspnetcore-runtime-dbg-8.0-8.0.16-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982251" comment="aspnetcore-targeting-pack-8.0-8.0.16-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982252" comment="dotnet-apphost-pack-8.0-8.0.16-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982253" comment="dotnet-hostfxr-8.0-8.0.16-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982254" comment="dotnet-runtime-8.0-8.0.16-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982255" comment="dotnet-runtime-dbg-8.0-8.0.16-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982256" comment="dotnet-sdk-8.0-8.0.116-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982257" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982258" comment="dotnet-sdk-dbg-8.0-8.0.116-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982259" comment="dotnet-targeting-pack-8.0-8.0.16-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982260" comment="dotnet-templates-8.0-8.0.116-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3372" version="1" class="patch">
	<metadata>
		<title>security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-21605" ref_url="https://www.suse.com/security/cve/CVE-2025-21605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7686.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7686.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21605/">CVE-2025-21605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21605">CVE-2025-21605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982261" comment="redis-6.2.18-1.module+el8.10.0+23050+05ea4e95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982262" comment="redis-devel-6.2.18-1.module+el8.10.0+23050+05ea4e95 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982263" comment="redis-doc-6.2.18-1.module+el8.10.0+23050+05ea4e95 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3373" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4123" ref_url="https://www.suse.com/security/cve/CVE-2025-4123/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7894.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7894.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-4123/">CVE-2025-4123 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4123">CVE-2025-4123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982453" comment="grafana-9.2.10-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982454" comment="grafana-selinux-9.2.10-23.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3374" version="1" class="patch">
	<metadata>
		<title>security update for compat-openssl10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7895.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7895.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982455" comment="compat-openssl10-1.0.2o-4.el8_10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3375" version="1" class="patch">
	<metadata>
		<title>security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-31205" ref_url="https://www.suse.com/security/cve/CVE-2025-31205/" source="CVE"/>
		<reference ref_id="CVE-2025-31257" ref_url="https://www.suse.com/security/cve/CVE-2025-31257/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-31205/">CVE-2025-31205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31205">CVE-2025-31205 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31257/">CVE-2025-31257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31257">CVE-2025-31257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983370" comment="webkit2gtk3-2.48.2-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983371" comment="webkit2gtk3-devel-2.48.2-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983372" comment="webkit2gtk3-jsc-2.48.2-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983373" comment="webkit2gtk3-jsc-devel-2.48.2-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3376" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-40906" ref_url="https://www.suse.com/security/cve/CVE-2024-40906/" source="CVE"/>
		<reference ref_id="CVE-2024-44970" ref_url="https://www.suse.com/security/cve/CVE-2024-44970/" source="CVE"/>
		<reference ref_id="CVE-2025-21756" ref_url="https://www.suse.com/security/cve/CVE-2025-21756/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8056.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8056.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40906/">CVE-2024-40906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44970/">CVE-2024-44970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44970">CVE-2024-44970 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21756/">CVE-2025-21756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982631" comment="bpftool-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982632" comment="kernel-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982633" comment="kernel-abi-stablelists-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982634" comment="kernel-core-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982635" comment="kernel-cross-headers-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982636" comment="kernel-debug-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982637" comment="kernel-debug-core-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982639" comment="kernel-debug-modules-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982640" comment="kernel-debug-modules-extra-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982642" comment="kernel-doc-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982643" comment="kernel-headers-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982644" comment="kernel-modules-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982645" comment="kernel-modules-extra-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982646" comment="kernel-tools-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982647" comment="kernel-tools-libs-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982649" comment="perf-4.18.0-553.53.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982650" comment="python3-perf-4.18.0-553.53.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3377" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918/" source="CVE"/>
		<reference ref_id="CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982952" comment="firefox-128.10.1-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3378" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-2784" ref_url="https://www.suse.com/security/cve/CVE-2025-2784/" source="CVE"/>
		<reference ref_id="CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049/" source="CVE"/>
		<reference ref_id="CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914/" source="CVE"/>
		<reference ref_id="CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8132.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8132.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2784/">CVE-2025-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2784">CVE-2025-2784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983374" comment="libsoup-2.62.3-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983375" comment="libsoup-devel-2.62.3-9.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3379" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-3887" ref_url="https://www.suse.com/security/cve/CVE-2025-3887/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3887/">CVE-2025-3887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3887">CVE-2025-3887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983834" comment="gstreamer1-plugins-bad-free-1.16.1-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983835" comment="gstreamer1-plugins-bad-free-devel-1.16.1-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3380" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-43842" ref_url="https://www.suse.com/security/cve/CVE-2024-43842/" source="CVE"/>
		<reference ref_id="CVE-2025-38234" ref_url="https://www.suse.com/security/cve/CVE-2025-38234/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8246.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8246.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43842/">CVE-2024-43842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38234/">CVE-2025-38234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38234">CVE-2025-38234 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983836" comment="bpftool-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983837" comment="kernel-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983838" comment="kernel-abi-stablelists-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983839" comment="kernel-core-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983840" comment="kernel-cross-headers-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983841" comment="kernel-debug-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983842" comment="kernel-debug-core-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983844" comment="kernel-debug-modules-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983845" comment="kernel-debug-modules-extra-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983847" comment="kernel-doc-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983848" comment="kernel-headers-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983849" comment="kernel-modules-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983850" comment="kernel-modules-extra-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983851" comment="kernel-tools-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983852" comment="kernel-tools-libs-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983854" comment="perf-4.18.0-553.54.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983855" comment="python3-perf-4.18.0-553.54.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3381" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8308.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8308.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985322" comment="firefox-128.11.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3382" version="1" class="patch">
	<metadata>
		<title>security update for varnish (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47905" ref_url="https://www.suse.com/security/cve/CVE-2025-47905/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47905/">CVE-2025-47905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47905">CVE-2025-47905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985777" comment="varnish-6.0.13-1.module+el8.10.0+23111+831cc069.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985778" comment="varnish-devel-6.0.13-1.module+el8.10.0+23111+831cc069.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985779" comment="varnish-docs-6.0.13-1.module+el8.10.0+23111+831cc069.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985780" comment="varnish-modules-0.15.0-6.module+el8.10.0+21682+bcdd3a30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3383" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8395.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8395.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985781" comment="rsync-3.1.3-23.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985782" comment="rsync-daemon-3.1.3-23.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3384" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-3576" ref_url="https://www.suse.com/security/cve/CVE-2025-3576/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8411.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8411.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3576/">CVE-2025-3576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">CVE-2025-3576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985783" comment="krb5-devel-1.18.2-32.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985784" comment="krb5-libs-1.18.2-32.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985785" comment="krb5-pkinit-1.18.2-32.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985786" comment="krb5-server-1.18.2-32.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985787" comment="krb5-server-ldap-1.18.2-32.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985788" comment="krb5-workstation-1.18.2-32.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985789" comment="libkadm5-1.18.2-32.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3385" version="1" class="patch">
	<metadata>
		<title>security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-52005" ref_url="https://www.suse.com/security/cve/CVE-2024-52005/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8414.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8414.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-52005/">CVE-2024-52005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52005">CVE-2024-52005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985790" comment="git-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985791" comment="git-all-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985792" comment="git-core-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985793" comment="git-core-doc-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985794" comment="git-credential-libsecret-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985795" comment="git-daemon-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985796" comment="git-email-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985797" comment="git-gui-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985798" comment="git-instaweb-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985799" comment="git-subtree-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985800" comment="git-svn-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985801" comment="gitk-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985802" comment="gitweb-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985803" comment="perl-Git-2.43.5-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985804" comment="perl-Git-SVN-2.43.5-3.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3386" version="1" class="patch">
	<metadata>
		<title>security update for python-PyMySQL (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-5629" ref_url="https://www.suse.com/security/cve/CVE-2024-5629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8419.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8419.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5629/">CVE-2024-5629 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5629">CVE-2024-5629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957399" comment="python-nose-docs-1.3.7-31.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985805" comment="python-pymongo-doc-3.7.0-2.module+el8.10.0+23071+07f1d18e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957401" comment="python-sqlalchemy-doc-1.3.2-3.module+el8.10.0+20981+3704b446 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957402" comment="python-virtualenv-doc-15.1.0-23.module+el8.10.0+22619+61b70790 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957403" comment="python3-PyMySQL-0.10.1-2.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985806" comment="python3-bson-3.7.0-2.module+el8.10.0+23071+07f1d18e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957405" comment="python3-distro-1.4.0-2.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957406" comment="python3-docs-3.6.7-2.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957407" comment="python3-docutils-0.14-12.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957408" comment="python3-nose-1.3.7-31.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957409" comment="python3-pygments-2.2.0-22.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985807" comment="python3-pymongo-3.7.0-2.module+el8.10.0+23071+07f1d18e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985808" comment="python3-pymongo-gridfs-3.7.0-2.module+el8.10.0+23071+07f1d18e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957412" comment="python3-scipy-1.0.0-21.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957413" comment="python3-sqlalchemy-1.3.2-3.module+el8.10.0+20981+3704b446 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957414" comment="python3-virtualenv-15.1.0-23.module+el8.10.0+22619+61b70790 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957415" comment="python3-wheel-0.31.1-3.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957416" comment="python3-wheel-wheel-0.31.1-3.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957417" comment="python36-3.6.8-39.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957418" comment="python36-debug-3.6.8-39.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957419" comment="python36-devel-3.6.8-39.module+el8.10.0+20784+edafcd43 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957420" comment="python36-rpm-macros-3.6.8-39.module+el8.10.0+20784+edafcd43 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3387" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-27832" ref_url="https://www.suse.com/security/cve/CVE-2025-27832/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8421.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8421.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27832/">CVE-2025-27832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27832">CVE-2025-27832 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985934" comment="ghostscript-9.27-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985935" comment="ghostscript-doc-9.27-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985936" comment="ghostscript-tools-dvipdf-9.27-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985937" comment="ghostscript-tools-fonts-9.27-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985938" comment="ghostscript-tools-printing-9.27-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985939" comment="ghostscript-x11-9.27-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985940" comment="libgs-9.27-17.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985941" comment="libgs-devel-9.27-17.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3388" version="1" class="patch">
	<metadata>
		<title>security update for pandoc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-24824" ref_url="https://www.suse.com/security/cve/CVE-2023-24824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8427.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8427.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24824/">CVE-2023-24824 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24824">CVE-2023-24824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985942" comment="pandoc-2.0.6-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985943" comment="pandoc-common-2.0.6-7.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3389" version="1" class="patch">
	<metadata>
		<title>security update for perl-CPAN (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2020-16156" ref_url="https://www.suse.com/security/cve/CVE-2020-16156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8432.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8432.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-16156/">CVE-2020-16156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16156">CVE-2020-16156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985944" comment="perl-CPAN-2.18-402.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3390" version="1" class="patch">
	<metadata>
		<title>security update for delve (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8478.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8478.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974974" comment="delve-1.24.1-1.module+el8.10.0+22945+b2c96a17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985945" comment="go-toolset-1.23.9-1.module+el8.10.0+23162+9223a61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985946" comment="golang-1.23.9-1.module+el8.10.0+23162+9223a61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985947" comment="golang-bin-1.23.9-1.module+el8.10.0+23162+9223a61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985948" comment="golang-docs-1.23.9-1.module+el8.10.0+23162+9223a61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985949" comment="golang-misc-1.23.9-1.module+el8.10.0+23162+9223a61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985950" comment="golang-src-1.23.9-1.module+el8.10.0+23162+9223a61a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985951" comment="golang-tests-1.23.9-1.module+el8.10.0+23162+9223a61a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3391" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-23165" ref_url="https://www.suse.com/security/cve/CVE-2025-23165/" source="CVE"/>
		<reference ref_id="CVE-2025-23166" ref_url="https://www.suse.com/security/cve/CVE-2025-23166/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8506.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8506.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23165/">CVE-2025-23165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23165">CVE-2025-23165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23166/">CVE-2025-23166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166">CVE-2025-23166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986157" comment="nodejs-22.16.0-1.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986158" comment="nodejs-devel-22.16.0-1.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986159" comment="nodejs-docs-22.16.0-1.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986160" comment="nodejs-full-i18n-22.16.0-1.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986161" comment="nodejs-libs-22.16.0-1.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986162" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986163" comment="nodejs-packaging-2021.06-4.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986164" comment="nodejs-packaging-bundler-2021.06-4.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986165" comment="npm-10.9.2-1.22.16.0.1.module+el8.10.0+23140+4056b950 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986166" comment="v8-12.4-devel-12.4.254.21-1.22.16.0.1.module+el8.10.0+23140+4056b950 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3392" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-23165" ref_url="https://www.suse.com/security/cve/CVE-2025-23165/" source="CVE"/>
		<reference ref_id="CVE-2025-23166" ref_url="https://www.suse.com/security/cve/CVE-2025-23166/" source="CVE"/>
		<reference ref_id="CVE-2025-23167" ref_url="https://www.suse.com/security/cve/CVE-2025-23167/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8514.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8514.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23165/">CVE-2025-23165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23165">CVE-2025-23165 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23166/">CVE-2025-23166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166">CVE-2025-23166 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23167/">CVE-2025-23167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23167">CVE-2025-23167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986167" comment="nodejs-20.19.2-1.module+el8.10.0+23139+21ba74c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986168" comment="nodejs-devel-20.19.2-1.module+el8.10.0+23139+21ba74c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986169" comment="nodejs-docs-20.19.2-1.module+el8.10.0+23139+21ba74c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986170" comment="nodejs-full-i18n-20.19.2-1.module+el8.10.0+23139+21ba74c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986171" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+23139+21ba74c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986172" comment="nodejs-packaging-2021.06-4.module+el8.10.0+23139+21ba74c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986173" comment="nodejs-packaging-bundler-2021.06-4.module+el8.10.0+23139+21ba74c5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986174" comment="npm-10.8.2-1.20.19.2.1.module+el8.10.0+23139+21ba74c5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3393" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986175" comment="grafana-9.2.10-25.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986176" comment="grafana-selinux-9.2.10-25.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3394" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-40403" ref_url="https://www.suse.com/security/cve/CVE-2023-40403/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8676.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8676.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-40403/">CVE-2023-40403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40403">CVE-2023-40403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986636" comment="libxslt-1.1.32-6.2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986637" comment="libxslt-devel-1.1.32-6.2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3395" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-4802" ref_url="https://www.suse.com/security/cve/CVE-2025-4802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8686.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8686.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4802/">CVE-2025-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009997442" comment="compat-libpthread-nonshared-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997443" comment="glibc-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997444" comment="glibc-all-langpacks-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997445" comment="glibc-benchtests-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997446" comment="glibc-common-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997447" comment="glibc-devel-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997448" comment="glibc-doc-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997449" comment="glibc-gconv-extra-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997450" comment="glibc-headers-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997451" comment="glibc-langpack-aa-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997452" comment="glibc-langpack-af-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997453" comment="glibc-langpack-agr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997454" comment="glibc-langpack-ak-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997455" comment="glibc-langpack-am-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997456" comment="glibc-langpack-an-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997457" comment="glibc-langpack-anp-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997458" comment="glibc-langpack-ar-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997459" comment="glibc-langpack-as-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997460" comment="glibc-langpack-ast-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997461" comment="glibc-langpack-ayc-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997462" comment="glibc-langpack-az-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997463" comment="glibc-langpack-be-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997464" comment="glibc-langpack-bem-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997465" comment="glibc-langpack-ber-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997466" comment="glibc-langpack-bg-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997467" comment="glibc-langpack-bhb-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997468" comment="glibc-langpack-bho-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997469" comment="glibc-langpack-bi-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997470" comment="glibc-langpack-bn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997471" comment="glibc-langpack-bo-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997472" comment="glibc-langpack-br-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997473" comment="glibc-langpack-brx-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997474" comment="glibc-langpack-bs-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997475" comment="glibc-langpack-byn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997476" comment="glibc-langpack-ca-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997477" comment="glibc-langpack-ce-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997478" comment="glibc-langpack-chr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997479" comment="glibc-langpack-cmn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997480" comment="glibc-langpack-crh-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997481" comment="glibc-langpack-cs-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997482" comment="glibc-langpack-csb-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997483" comment="glibc-langpack-cv-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997484" comment="glibc-langpack-cy-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997485" comment="glibc-langpack-da-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997486" comment="glibc-langpack-de-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997487" comment="glibc-langpack-doi-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997488" comment="glibc-langpack-dsb-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997489" comment="glibc-langpack-dv-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997490" comment="glibc-langpack-dz-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997491" comment="glibc-langpack-el-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997492" comment="glibc-langpack-en-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997493" comment="glibc-langpack-eo-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997494" comment="glibc-langpack-es-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997495" comment="glibc-langpack-et-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997496" comment="glibc-langpack-eu-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997497" comment="glibc-langpack-fa-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997498" comment="glibc-langpack-ff-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997499" comment="glibc-langpack-fi-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997500" comment="glibc-langpack-fil-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997501" comment="glibc-langpack-fo-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997502" comment="glibc-langpack-fr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997503" comment="glibc-langpack-fur-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997504" comment="glibc-langpack-fy-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997505" comment="glibc-langpack-ga-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997506" comment="glibc-langpack-gd-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997507" comment="glibc-langpack-gez-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997508" comment="glibc-langpack-gl-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997509" comment="glibc-langpack-gu-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997510" comment="glibc-langpack-gv-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997511" comment="glibc-langpack-ha-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997512" comment="glibc-langpack-hak-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997513" comment="glibc-langpack-he-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997514" comment="glibc-langpack-hi-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997515" comment="glibc-langpack-hif-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997516" comment="glibc-langpack-hne-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997517" comment="glibc-langpack-hr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997518" comment="glibc-langpack-hsb-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997519" comment="glibc-langpack-ht-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997520" comment="glibc-langpack-hu-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997521" comment="glibc-langpack-hy-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997522" comment="glibc-langpack-ia-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997523" comment="glibc-langpack-id-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997524" comment="glibc-langpack-ig-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997525" comment="glibc-langpack-ik-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997526" comment="glibc-langpack-is-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997527" comment="glibc-langpack-it-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997528" comment="glibc-langpack-iu-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997529" comment="glibc-langpack-ja-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997530" comment="glibc-langpack-ka-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997531" comment="glibc-langpack-kab-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997532" comment="glibc-langpack-kk-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997533" comment="glibc-langpack-kl-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997534" comment="glibc-langpack-km-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997535" comment="glibc-langpack-kn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997536" comment="glibc-langpack-ko-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997537" comment="glibc-langpack-kok-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997538" comment="glibc-langpack-ks-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997539" comment="glibc-langpack-ku-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997540" comment="glibc-langpack-kw-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997541" comment="glibc-langpack-ky-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997542" comment="glibc-langpack-lb-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997543" comment="glibc-langpack-lg-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997544" comment="glibc-langpack-li-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997545" comment="glibc-langpack-lij-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997546" comment="glibc-langpack-ln-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997547" comment="glibc-langpack-lo-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997548" comment="glibc-langpack-lt-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997549" comment="glibc-langpack-lv-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997550" comment="glibc-langpack-lzh-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997551" comment="glibc-langpack-mag-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997552" comment="glibc-langpack-mai-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997553" comment="glibc-langpack-mfe-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997554" comment="glibc-langpack-mg-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997555" comment="glibc-langpack-mhr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997556" comment="glibc-langpack-mi-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997557" comment="glibc-langpack-miq-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997558" comment="glibc-langpack-mjw-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997559" comment="glibc-langpack-mk-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997560" comment="glibc-langpack-ml-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997561" comment="glibc-langpack-mn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997562" comment="glibc-langpack-mni-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997563" comment="glibc-langpack-mr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997564" comment="glibc-langpack-ms-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997565" comment="glibc-langpack-mt-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997566" comment="glibc-langpack-my-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997567" comment="glibc-langpack-nan-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997568" comment="glibc-langpack-nb-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997569" comment="glibc-langpack-nds-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997570" comment="glibc-langpack-ne-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997571" comment="glibc-langpack-nhn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997572" comment="glibc-langpack-niu-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997573" comment="glibc-langpack-nl-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997574" comment="glibc-langpack-nn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997575" comment="glibc-langpack-nr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997576" comment="glibc-langpack-nso-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997577" comment="glibc-langpack-oc-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997578" comment="glibc-langpack-om-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997579" comment="glibc-langpack-or-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997580" comment="glibc-langpack-os-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997581" comment="glibc-langpack-pa-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997582" comment="glibc-langpack-pap-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997583" comment="glibc-langpack-pl-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997584" comment="glibc-langpack-ps-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997585" comment="glibc-langpack-pt-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997586" comment="glibc-langpack-quz-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997587" comment="glibc-langpack-raj-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997588" comment="glibc-langpack-ro-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997589" comment="glibc-langpack-ru-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997590" comment="glibc-langpack-rw-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997591" comment="glibc-langpack-sa-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997592" comment="glibc-langpack-sah-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997593" comment="glibc-langpack-sat-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997594" comment="glibc-langpack-sc-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997595" comment="glibc-langpack-sd-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997596" comment="glibc-langpack-se-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997597" comment="glibc-langpack-sgs-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997598" comment="glibc-langpack-shn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997599" comment="glibc-langpack-shs-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997600" comment="glibc-langpack-si-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997601" comment="glibc-langpack-sid-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997602" comment="glibc-langpack-sk-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997603" comment="glibc-langpack-sl-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997604" comment="glibc-langpack-sm-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997605" comment="glibc-langpack-so-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997606" comment="glibc-langpack-sq-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997607" comment="glibc-langpack-sr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997608" comment="glibc-langpack-ss-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997609" comment="glibc-langpack-st-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997610" comment="glibc-langpack-sv-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997611" comment="glibc-langpack-sw-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997612" comment="glibc-langpack-szl-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997613" comment="glibc-langpack-ta-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997614" comment="glibc-langpack-tcy-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997615" comment="glibc-langpack-te-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997616" comment="glibc-langpack-tg-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997617" comment="glibc-langpack-th-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997618" comment="glibc-langpack-the-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997619" comment="glibc-langpack-ti-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997620" comment="glibc-langpack-tig-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997621" comment="glibc-langpack-tk-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997622" comment="glibc-langpack-tl-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997623" comment="glibc-langpack-tn-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997624" comment="glibc-langpack-to-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997625" comment="glibc-langpack-tpi-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997626" comment="glibc-langpack-tr-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997627" comment="glibc-langpack-ts-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997628" comment="glibc-langpack-tt-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997629" comment="glibc-langpack-ug-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997630" comment="glibc-langpack-uk-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997631" comment="glibc-langpack-unm-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997632" comment="glibc-langpack-ur-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997633" comment="glibc-langpack-uz-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997634" comment="glibc-langpack-ve-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997635" comment="glibc-langpack-vi-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997636" comment="glibc-langpack-wa-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997637" comment="glibc-langpack-wae-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997638" comment="glibc-langpack-wal-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997639" comment="glibc-langpack-wo-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997640" comment="glibc-langpack-xh-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997641" comment="glibc-langpack-yi-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997642" comment="glibc-langpack-yo-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997643" comment="glibc-langpack-yue-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997644" comment="glibc-langpack-yuw-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997645" comment="glibc-langpack-zh-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997646" comment="glibc-langpack-zu-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997647" comment="glibc-locale-source-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997648" comment="glibc-minimal-langpack-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997649" comment="glibc-nss-devel-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997650" comment="glibc-static-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997651" comment="glibc-utils-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997652" comment="libnsl-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997653" comment="nscd-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997654" comment="nss_db-2.28-251.el8_10.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997655" comment="nss_hesiod-2.28-251.el8_10.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3396" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-49395" ref_url="https://www.suse.com/security/cve/CVE-2022-49395/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8743.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8743.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49395/">CVE-2022-49395 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49395">CVE-2022-49395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986290" comment="bpftool-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986291" comment="kernel-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986292" comment="kernel-abi-stablelists-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986293" comment="kernel-core-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986294" comment="kernel-cross-headers-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986295" comment="kernel-debug-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986296" comment="kernel-debug-core-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986298" comment="kernel-debug-modules-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986299" comment="kernel-debug-modules-extra-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986301" comment="kernel-doc-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986302" comment="kernel-headers-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986303" comment="kernel-modules-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986304" comment="kernel-modules-extra-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986305" comment="kernel-tools-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986306" comment="kernel-tools-libs-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986308" comment="perf-4.18.0-553.56.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986309" comment="python3-perf-4.18.0-553.56.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3397" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-3875" ref_url="https://www.suse.com/security/cve/CVE-2025-3875/" source="CVE"/>
		<reference ref_id="CVE-2025-3877" ref_url="https://www.suse.com/security/cve/CVE-2025-3877/" source="CVE"/>
		<reference ref_id="CVE-2025-3909" ref_url="https://www.suse.com/security/cve/CVE-2025-3909/" source="CVE"/>
		<reference ref_id="CVE-2025-3932" ref_url="https://www.suse.com/security/cve/CVE-2025-3932/" source="CVE"/>
		<reference ref_id="CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918/" source="CVE"/>
		<reference ref_id="CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919/" source="CVE"/>
		<reference ref_id="CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263/" source="CVE"/>
		<reference ref_id="CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264/" source="CVE"/>
		<reference ref_id="CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266/" source="CVE"/>
		<reference ref_id="CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267/" source="CVE"/>
		<reference ref_id="CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268/" source="CVE"/>
		<reference ref_id="CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269/" source="CVE"/>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8756.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8756.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3875/">CVE-2025-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3875">CVE-2025-3875 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3877/">CVE-2025-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3877">CVE-2025-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3909/">CVE-2025-3909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3909">CVE-2025-3909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3932/">CVE-2025-3932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3932">CVE-2025-3932 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986310" comment="thunderbird-128.11.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3398" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-30399" ref_url="https://www.suse.com/security/cve/CVE-2025-30399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8812.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8812.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30399/">CVE-2025-30399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30399">CVE-2025-30399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986638" comment="aspnetcore-runtime-8.0-8.0.17-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986639" comment="aspnetcore-runtime-dbg-8.0-8.0.17-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986640" comment="aspnetcore-targeting-pack-8.0-8.0.17-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986641" comment="dotnet-apphost-pack-8.0-8.0.17-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986642" comment="dotnet-hostfxr-8.0-8.0.17-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986643" comment="dotnet-runtime-8.0-8.0.17-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986644" comment="dotnet-runtime-dbg-8.0-8.0.17-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986645" comment="dotnet-sdk-8.0-8.0.117-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986646" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986647" comment="dotnet-sdk-dbg-8.0-8.0.117-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986648" comment="dotnet-targeting-pack-8.0-8.0.17-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986649" comment="dotnet-templates-8.0-8.0.117-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3399" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-30399" ref_url="https://www.suse.com/security/cve/CVE-2025-30399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8815.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8815.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30399/">CVE-2025-30399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30399">CVE-2025-30399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986796" comment="aspnetcore-runtime-9.0-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986797" comment="aspnetcore-runtime-dbg-9.0-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986798" comment="aspnetcore-targeting-pack-9.0-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986799" comment="dotnet-9.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986800" comment="dotnet-apphost-pack-9.0-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986801" comment="dotnet-host-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986802" comment="dotnet-hostfxr-9.0-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986803" comment="dotnet-runtime-9.0-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986804" comment="dotnet-runtime-dbg-9.0-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986805" comment="dotnet-sdk-9.0-9.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986806" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986807" comment="dotnet-sdk-aot-9.0-9.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986808" comment="dotnet-sdk-dbg-9.0-9.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986809" comment="dotnet-targeting-pack-9.0-9.0.6-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986810" comment="dotnet-templates-9.0-9.0.107-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986811" comment="netstandard-targeting-pack-2.1-9.0.107-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3400" version="1" class="patch">
	<metadata>
		<title>security update for mod_security (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47947" ref_url="https://www.suse.com/security/cve/CVE-2025-47947/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8844.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8844.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47947/">CVE-2025-47947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47947">CVE-2025-47947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986650" comment="mod_security-2.9.6-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986651" comment="mod_security-mlogc-2.9.6-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3401" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8918.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8918.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986964" comment="grafana-pcp-5.1.1-10.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3402" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-32414" ref_url="https://www.suse.com/security/cve/CVE-2025-32414/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8958.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8958.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-32414/">CVE-2025-32414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986965" comment="libxml2-2.9.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986966" comment="libxml2-devel-2.9.7-20.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986967" comment="python3-libxml2-2.9.7-20.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3403" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986968" comment="git-lfs-3.4.1-5.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3404" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9119.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9119.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986969" comment="libvpx-1.7.0-12.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986970" comment="libvpx-devel-1.7.0-12.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3405" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986834" comment="aardvark-dns-1.10.1-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986835" comment="buildah-1.33.12-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986836" comment="buildah-tests-1.33.12-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986837" comment="cockpit-podman-84.1-1.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986838" comment="conmon-2.1.10-1.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986839" comment="container-selinux-2.229.0-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986840" comment="containernetworking-plugins-1.4.0-6.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986841" comment="containers-common-1-82.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986842" comment="crit-3.18-5.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986843" comment="criu-3.18-5.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986844" comment="criu-devel-3.18-5.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986845" comment="criu-libs-3.18-5.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986846" comment="crun-1.14.3-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986847" comment="fuse-overlayfs-1.13-1.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986848" comment="libslirp-4.4.0-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986849" comment="libslirp-devel-4.4.0-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986850" comment="netavark-1.10.3-1.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986851" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986852" comment="podman-4.9.4-20.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986853" comment="podman-catatonit-4.9.4-20.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986854" comment="podman-docker-4.9.4-20.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986855" comment="podman-gvproxy-4.9.4-20.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986856" comment="podman-plugins-4.9.4-20.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986857" comment="podman-remote-4.9.4-20.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986858" comment="podman-tests-4.9.4-20.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986859" comment="python3-criu-3.18-5.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986860" comment="python3-podman-4.9.0-3.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986861" comment="runc-1.1.12-6.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986862" comment="skopeo-1.14.5-4.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986863" comment="skopeo-tests-1.14.5-4.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986864" comment="slirp4netns-1.2.3-1.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986865" comment="toolbox-0.0.99.5-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986866" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+23250+94af2c8e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986867" comment="udica-0.2.6-21.module+el8.10.0+23250+94af2c8e is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3406" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-48797" ref_url="https://www.suse.com/security/cve/CVE-2025-48797/" source="CVE"/>
		<reference ref_id="CVE-2025-48798" ref_url="https://www.suse.com/security/cve/CVE-2025-48798/" source="CVE"/>
		<reference ref_id="CVE-2025-5473" ref_url="https://www.suse.com/security/cve/CVE-2025-5473/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9165.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9165.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48797/">CVE-2025-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48797">CVE-2025-48797 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48798/">CVE-2025-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48798">CVE-2025-48798 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5473/">CVE-2025-5473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5473">CVE-2025-5473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009987301" comment="gimp-2.8.22-26.module+el8.10.0+23269+4b36efb0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987302" comment="gimp-devel-2.8.22-26.module+el8.10.0+23269+4b36efb0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987303" comment="gimp-devel-tools-2.8.22-26.module+el8.10.0+23269+4b36efb0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009987304" comment="gimp-libs-2.8.22-26.module+el8.10.0+23269+4b36efb0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962044" comment="pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962045" comment="pygobject2-codegen-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962046" comment="pygobject2-devel-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962047" comment="pygobject2-doc-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962048" comment="pygtk2-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962049" comment="pygtk2-codegen-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962050" comment="pygtk2-devel-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962051" comment="pygtk2-doc-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962052" comment="python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962053" comment="python2-cairo-devel-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3407" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9305.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9305.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996827" comment="xorg-x11-server-Xdmx-1.20.11-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996828" comment="xorg-x11-server-Xephyr-1.20.11-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996829" comment="xorg-x11-server-Xnest-1.20.11-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996830" comment="xorg-x11-server-Xorg-1.20.11-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996831" comment="xorg-x11-server-Xvfb-1.20.11-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996832" comment="xorg-x11-server-Xwayland-21.1.3-18.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996833" comment="xorg-x11-server-common-1.20.11-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996834" comment="xorg-x11-server-devel-1.20.11-26.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996835" comment="xorg-x11-server-source-1.20.11-26.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3408" version="1" class="patch">
	<metadata>
		<title>security update for ant (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086/" source="CVE"/>
		<reference ref_id="CVE-2025-48734" ref_url="https://www.suse.com/security/cve/CVE-2025-48734/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9318.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9318.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10086">CVE-2019-10086 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48734/">CVE-2025-48734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020882" comment="ant-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020883" comment="ant-antlr-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020884" comment="ant-apache-bcel-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020885" comment="ant-apache-bsf-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020886" comment="ant-apache-log4j-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020887" comment="ant-apache-oro-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020888" comment="ant-apache-regexp-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020889" comment="ant-apache-resolver-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020890" comment="ant-apache-xalan2-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020891" comment="ant-commons-logging-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020892" comment="ant-commons-net-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020893" comment="ant-contrib-1.0-0.32.b3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020894" comment="ant-contrib-javadoc-1.0-0.32.b3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020895" comment="ant-javadoc-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020896" comment="ant-javamail-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020897" comment="ant-jdepend-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020898" comment="ant-jmf-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020899" comment="ant-jsch-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020900" comment="ant-junit-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020901" comment="ant-lib-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020902" comment="ant-manual-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020903" comment="ant-swing-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020904" comment="ant-testutil-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020905" comment="ant-xz-1.10.5-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020906" comment="antlr-C++-2.7.7-56.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020907" comment="antlr-javadoc-2.7.7-56.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020908" comment="antlr-manual-2.7.7-56.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020909" comment="antlr-tool-2.7.7-56.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020910" comment="aopalliance-1.0-17.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020911" comment="aopalliance-javadoc-1.0-17.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020912" comment="apache-commons-beanutils-1.9.3-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020913" comment="apache-commons-beanutils-javadoc-1.9.3-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020914" comment="apache-commons-cli-1.4-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020915" comment="apache-commons-cli-javadoc-1.4-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020916" comment="apache-commons-codec-1.11-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020917" comment="apache-commons-codec-javadoc-1.11-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020918" comment="apache-commons-collections-3.2.2-10.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020919" comment="apache-commons-collections-javadoc-3.2.2-10.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020920" comment="apache-commons-collections-testframework-3.2.2-10.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020921" comment="apache-commons-compress-1.18-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020922" comment="apache-commons-compress-javadoc-1.18-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020923" comment="apache-commons-exec-1.3-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020924" comment="apache-commons-exec-javadoc-1.3-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020925" comment="apache-commons-io-2.6-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020926" comment="apache-commons-io-javadoc-2.6-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020927" comment="apache-commons-jxpath-1.3-29.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020928" comment="apache-commons-jxpath-javadoc-1.3-29.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020929" comment="apache-commons-lang-2.6-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020930" comment="apache-commons-lang-javadoc-2.6-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020931" comment="apache-commons-lang3-3.7-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020932" comment="apache-commons-lang3-javadoc-3.7-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020933" comment="apache-commons-logging-1.2-13.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020934" comment="apache-commons-logging-javadoc-1.2-13.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020935" comment="apache-commons-net-3.6-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020936" comment="apache-commons-net-javadoc-3.6-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020937" comment="apache-commons-parent-43-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020938" comment="apache-ivy-2.4.0-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020939" comment="apache-ivy-javadoc-2.4.0-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020940" comment="apache-parent-19-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020941" comment="apache-resource-bundles-2-20.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020942" comment="aqute-bnd-3.5.0-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020943" comment="aqute-bnd-javadoc-3.5.0-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020944" comment="aqute-bndlib-3.5.0-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020945" comment="assertj-core-3.8.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020946" comment="assertj-core-javadoc-3.8.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020947" comment="atinject-1-28.20100611svn86.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020948" comment="atinject-javadoc-1-28.20100611svn86.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020949" comment="atinject-tck-1-28.20100611svn86.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020950" comment="bcel-6.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020951" comment="bcel-javadoc-6.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020952" comment="beust-jcommander-1.71-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020953" comment="beust-jcommander-javadoc-1.71-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020954" comment="bnd-maven-plugin-3.5.0-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020955" comment="bsf-2.4.0-30.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020956" comment="bsf-javadoc-2.4.0-30.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020957" comment="bsh-2.0-13.b6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020958" comment="bsh-javadoc-2.0-13.b6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020959" comment="bsh-manual-2.0-13.b6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020960" comment="byaccj-1.15-17.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020961" comment="cal10n-0.8.1-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020962" comment="cal10n-javadoc-0.8.1-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020963" comment="cdi-api-1.2-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020964" comment="cdi-api-javadoc-1.2-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020965" comment="cglib-3.2.4-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020966" comment="cglib-javadoc-3.2.4-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020967" comment="easymock-3.5-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020968" comment="easymock-javadoc-3.5-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020969" comment="exec-maven-plugin-1.6.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020970" comment="exec-maven-plugin-javadoc-1.6.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020971" comment="felix-osgi-compendium-1.4.0-26.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020972" comment="felix-osgi-compendium-javadoc-1.4.0-26.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020973" comment="felix-osgi-core-1.4.0-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020974" comment="felix-osgi-core-javadoc-1.4.0-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020975" comment="felix-osgi-foundation-1.2.0-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020976" comment="felix-osgi-foundation-javadoc-1.2.0-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020977" comment="felix-parent-4-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020978" comment="felix-utils-1.10.4-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020979" comment="felix-utils-javadoc-1.10.4-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020980" comment="forge-parent-38-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020981" comment="fusesource-pom-1.11-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020982" comment="geronimo-annotation-1.0-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020983" comment="geronimo-annotation-javadoc-1.0-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020984" comment="geronimo-jms-1.1.1-25.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020985" comment="geronimo-jms-javadoc-1.1.1-25.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020986" comment="geronimo-jpa-1.1.1-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020987" comment="geronimo-jpa-javadoc-1.1.1-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020988" comment="geronimo-parent-poms-1.6-25.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020989" comment="glassfish-annotation-api-1.2-13.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020990" comment="glassfish-annotation-api-javadoc-1.2-13.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020991" comment="glassfish-el-3.0.1-0.7.b08.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020992" comment="glassfish-el-api-3.0.1-0.7.b08.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020993" comment="glassfish-el-javadoc-3.0.1-0.7.b08.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020994" comment="glassfish-jsp-api-2.3.2-0.9.b01.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020995" comment="glassfish-jsp-api-javadoc-2.3.2-0.9.b01.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020996" comment="glassfish-legal-1.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020997" comment="glassfish-master-pom-8-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020998" comment="glassfish-servlet-api-3.1.0-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020999" comment="glassfish-servlet-api-javadoc-3.1.0-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021000" comment="google-guice-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021001" comment="google-guice-javadoc-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021002" comment="guava20-20.0-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021003" comment="guava20-javadoc-20.0-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021004" comment="guava20-testlib-20.0-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021005" comment="guice-assistedinject-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021006" comment="guice-bom-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021007" comment="guice-extensions-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021008" comment="guice-grapher-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021009" comment="guice-jmx-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021010" comment="guice-jndi-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021011" comment="guice-multibindings-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021012" comment="guice-parent-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021013" comment="guice-servlet-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021014" comment="guice-testlib-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021015" comment="guice-throwingproviders-4.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021016" comment="hamcrest-1.3-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021017" comment="hamcrest-core-1.3-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021018" comment="hamcrest-demo-1.3-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021019" comment="hamcrest-javadoc-1.3-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021020" comment="hawtjni-1.16-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021021" comment="hawtjni-javadoc-1.16-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021022" comment="hawtjni-runtime-1.16-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021023" comment="httpcomponents-client-4.5.5-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021024" comment="httpcomponents-client-cache-4.5.5-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021025" comment="httpcomponents-client-javadoc-4.5.5-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021026" comment="httpcomponents-core-4.4.10-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021027" comment="httpcomponents-core-javadoc-4.4.10-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021028" comment="httpcomponents-project-9-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021029" comment="isorelax-0-0.23.release20050331.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021030" comment="isorelax-javadoc-0-0.23.release20050331.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021031" comment="ivy-local-5.3.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021032" comment="jakarta-commons-httpclient-3.1-28.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021033" comment="jakarta-commons-httpclient-demo-3.1-28.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021034" comment="jakarta-commons-httpclient-javadoc-3.1-28.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021035" comment="jakarta-commons-httpclient-manual-3.1-28.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021036" comment="jakarta-oro-2.0.8-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021037" comment="jakarta-oro-javadoc-2.0.8-23.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021038" comment="jansi-1.17.1-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021039" comment="jansi-javadoc-1.17.1-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021040" comment="jansi-native-1.7-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021041" comment="jansi-native-javadoc-1.7-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021042" comment="java_cup-0.11b-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021043" comment="java_cup-javadoc-0.11b-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021044" comment="java_cup-manual-0.11b-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021045" comment="javacc-7.0.2-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021046" comment="javacc-demo-7.0.2-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021047" comment="javacc-javadoc-7.0.2-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021048" comment="javacc-manual-7.0.2-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021049" comment="javacc-maven-plugin-2.6-25.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021050" comment="javacc-maven-plugin-javadoc-2.6-25.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021051" comment="javamail-1.5.2-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021052" comment="javamail-javadoc-1.5.2-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021053" comment="javapackages-filesystem-5.3.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021054" comment="javapackages-local-5.3.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021055" comment="javapackages-tools-5.3.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021056" comment="javassist-3.18.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021057" comment="javassist-javadoc-3.18.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021058" comment="jaxen-1.1.6-18.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021059" comment="jaxen-demo-1.1.6-18.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021060" comment="jaxen-javadoc-1.1.6-18.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021061" comment="jboss-interceptors-1.2-api-1.0.0-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021062" comment="jboss-interceptors-1.2-api-javadoc-1.0.0-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021063" comment="jboss-parent-20-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021064" comment="jcl-over-slf4j-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021065" comment="jdepend-2.9.1-18.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021066" comment="jdepend-demo-2.9.1-18.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021067" comment="jdepend-javadoc-2.9.1-18.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021068" comment="jdependency-1.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021069" comment="jdependency-javadoc-1.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021070" comment="jdom-1.1.3-17.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021071" comment="jdom-demo-1.1.3-17.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021072" comment="jdom-javadoc-1.1.3-17.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021073" comment="jdom2-2.0.6-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021074" comment="jdom2-javadoc-2.0.6-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021075" comment="jflex-1.6.1-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021076" comment="jflex-javadoc-1.6.1-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021077" comment="jline-2.14.6-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021078" comment="jline-javadoc-2.14.6-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021079" comment="jsch-0.1.54-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021080" comment="jsch-javadoc-0.1.54-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021081" comment="jsoup-1.11.3-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021082" comment="jsoup-javadoc-1.11.3-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021083" comment="jsr-305-0-0.22.20130910svn.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021084" comment="jsr-305-javadoc-0-0.22.20130910svn.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021085" comment="jtidy-1.0-0.28.20100930svn1125.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021086" comment="jtidy-javadoc-1.0-0.28.20100930svn1125.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021087" comment="jul-to-slf4j-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021088" comment="junit-4.12-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021089" comment="junit-javadoc-4.12-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021090" comment="junit-manual-4.12-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021091" comment="jvnet-parent-4-10.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021092" comment="jzlib-1.1.3-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021093" comment="jzlib-demo-1.1.3-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021094" comment="jzlib-javadoc-1.1.3-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021095" comment="log4j-over-slf4j-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021096" comment="log4j12-1.2.17-22.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021097" comment="log4j12-javadoc-1.2.17-22.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021098" comment="maven-3.5.4-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021099" comment="maven-antrun-plugin-1.8-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021100" comment="maven-antrun-plugin-javadoc-1.8-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021101" comment="maven-archiver-3.2.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021102" comment="maven-archiver-javadoc-3.2.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021103" comment="maven-artifact-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021104" comment="maven-artifact-manager-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021105" comment="maven-artifact-resolver-1.0-18.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021106" comment="maven-artifact-resolver-javadoc-1.0-18.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021107" comment="maven-artifact-transfer-0.9.0-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021108" comment="maven-artifact-transfer-javadoc-0.9.0-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021109" comment="maven-assembly-plugin-3.1.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021110" comment="maven-assembly-plugin-javadoc-3.1.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021111" comment="maven-cal10n-plugin-0.8.1-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021112" comment="maven-clean-plugin-3.0.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021113" comment="maven-clean-plugin-javadoc-3.0.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021114" comment="maven-common-artifact-filters-3.0.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021115" comment="maven-common-artifact-filters-javadoc-3.0.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021116" comment="maven-compiler-plugin-3.7.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021117" comment="maven-compiler-plugin-javadoc-3.7.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021118" comment="maven-dependency-analyzer-1.8-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021119" comment="maven-dependency-analyzer-javadoc-1.8-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021120" comment="maven-dependency-plugin-3.0.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021121" comment="maven-dependency-plugin-javadoc-3.0.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021122" comment="maven-dependency-tree-3.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021123" comment="maven-dependency-tree-javadoc-3.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021124" comment="maven-doxia-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021125" comment="maven-doxia-core-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021126" comment="maven-doxia-javadoc-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021127" comment="maven-doxia-logging-api-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021128" comment="maven-doxia-module-apt-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021129" comment="maven-doxia-module-confluence-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021130" comment="maven-doxia-module-docbook-simple-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021131" comment="maven-doxia-module-fml-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021132" comment="maven-doxia-module-latex-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021133" comment="maven-doxia-module-rtf-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021134" comment="maven-doxia-module-twiki-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021135" comment="maven-doxia-module-xdoc-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021136" comment="maven-doxia-module-xhtml-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021137" comment="maven-doxia-modules-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021138" comment="maven-doxia-sink-api-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021139" comment="maven-doxia-sitetools-1.7.5-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021140" comment="maven-doxia-sitetools-javadoc-1.7.5-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021141" comment="maven-doxia-test-docs-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021142" comment="maven-doxia-tests-1.7-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021143" comment="maven-enforcer-1.4.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021144" comment="maven-enforcer-api-1.4.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021145" comment="maven-enforcer-javadoc-1.4.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021146" comment="maven-enforcer-plugin-1.4.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021147" comment="maven-enforcer-rules-1.4.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021148" comment="maven-failsafe-plugin-2.22.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021149" comment="maven-file-management-3.0.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021150" comment="maven-file-management-javadoc-3.0.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021151" comment="maven-filtering-3.1.1-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021152" comment="maven-filtering-javadoc-3.1.1-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021153" comment="maven-hawtjni-plugin-1.16-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021154" comment="maven-install-plugin-2.5.2-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021155" comment="maven-install-plugin-javadoc-2.5.2-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021156" comment="maven-invoker-2.2-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021157" comment="maven-invoker-javadoc-2.2-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021158" comment="maven-invoker-plugin-1.10-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021159" comment="maven-invoker-plugin-javadoc-1.10-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021160" comment="maven-jar-plugin-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021161" comment="maven-jar-plugin-javadoc-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021162" comment="maven-javadoc-3.5.4-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021163" comment="maven-lib-3.5.4-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021164" comment="maven-local-5.3.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021165" comment="maven-model-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021166" comment="maven-monitor-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021167" comment="maven-parent-27-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021168" comment="maven-plugin-annotations-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021169" comment="maven-plugin-build-helper-1.9.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021170" comment="maven-plugin-build-helper-javadoc-1.9.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021171" comment="maven-plugin-bundle-3.5.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021172" comment="maven-plugin-bundle-javadoc-3.5.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021173" comment="maven-plugin-descriptor-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021174" comment="maven-plugin-plugin-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021175" comment="maven-plugin-registry-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021176" comment="maven-plugin-testing-3.3.0-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021177" comment="maven-plugin-testing-harness-3.3.0-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021178" comment="maven-plugin-testing-javadoc-3.3.0-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021179" comment="maven-plugin-testing-tools-3.3.0-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021180" comment="maven-plugin-tools-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021181" comment="maven-plugin-tools-annotations-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021182" comment="maven-plugin-tools-ant-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021183" comment="maven-plugin-tools-api-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021184" comment="maven-plugin-tools-beanshell-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021185" comment="maven-plugin-tools-generators-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021186" comment="maven-plugin-tools-java-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021187" comment="maven-plugin-tools-javadoc-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021188" comment="maven-plugin-tools-javadocs-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021189" comment="maven-plugin-tools-model-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021190" comment="maven-plugins-pom-28-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021191" comment="maven-profile-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021192" comment="maven-project-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021193" comment="maven-remote-resources-plugin-1.5-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021194" comment="maven-remote-resources-plugin-javadoc-1.5-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021195" comment="maven-reporting-api-3.0-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021196" comment="maven-reporting-api-javadoc-3.0-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021197" comment="maven-reporting-impl-3.0.0-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021198" comment="maven-reporting-impl-javadoc-3.0.0-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021199" comment="maven-resolver-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021200" comment="maven-resolver-api-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021201" comment="maven-resolver-connector-basic-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021202" comment="maven-resolver-impl-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021203" comment="maven-resolver-javadoc-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021204" comment="maven-resolver-spi-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021205" comment="maven-resolver-test-util-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021206" comment="maven-resolver-transport-classpath-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021207" comment="maven-resolver-transport-file-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021208" comment="maven-resolver-transport-http-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021209" comment="maven-resolver-transport-wagon-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021210" comment="maven-resolver-util-1.1.1-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021211" comment="maven-resources-plugin-3.1.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021212" comment="maven-resources-plugin-javadoc-3.1.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021213" comment="maven-script-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021214" comment="maven-script-ant-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021215" comment="maven-script-beanshell-3.5.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021216" comment="maven-script-interpreter-1.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021217" comment="maven-script-interpreter-javadoc-1.1-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021218" comment="maven-settings-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021219" comment="maven-shade-plugin-3.1.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021220" comment="maven-shade-plugin-javadoc-3.1.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021221" comment="maven-shared-22-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021222" comment="maven-shared-incremental-1.1-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021223" comment="maven-shared-incremental-javadoc-1.1-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021224" comment="maven-shared-io-3.0.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021225" comment="maven-shared-io-javadoc-3.0.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021226" comment="maven-shared-utils-3.2.1-0.1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021227" comment="maven-shared-utils-javadoc-3.2.1-0.1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021228" comment="maven-source-plugin-3.0.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021229" comment="maven-source-plugin-javadoc-3.0.1-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021230" comment="maven-surefire-2.22.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021231" comment="maven-surefire-javadoc-2.22.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021232" comment="maven-surefire-plugin-2.22.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021233" comment="maven-surefire-provider-junit-2.22.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021234" comment="maven-surefire-provider-testng-2.22.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021235" comment="maven-surefire-report-parser-2.22.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021236" comment="maven-surefire-report-plugin-2.22.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021237" comment="maven-test-tools-3.3.0-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021238" comment="maven-toolchain-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021239" comment="maven-verifier-1.6-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021240" comment="maven-verifier-javadoc-1.6-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021241" comment="maven-wagon-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021242" comment="maven-wagon-file-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021243" comment="maven-wagon-ftp-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021244" comment="maven-wagon-http-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021245" comment="maven-wagon-http-lightweight-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021246" comment="maven-wagon-http-shared-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021247" comment="maven-wagon-javadoc-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021248" comment="maven-wagon-provider-api-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021249" comment="maven-wagon-providers-3.1.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021250" comment="maven2-javadoc-2.2.1-59.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021251" comment="mockito-1.10.19-17.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021252" comment="mockito-javadoc-1.10.19-17.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021253" comment="modello-1.9.1-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021254" comment="modello-javadoc-1.9.1-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021255" comment="mojo-parent-40-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021256" comment="munge-maven-plugin-1.0-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021257" comment="munge-maven-plugin-javadoc-1.0-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021258" comment="objectweb-asm-6.2-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021259" comment="objectweb-asm-javadoc-6.2-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021260" comment="objectweb-pom-1.5-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021261" comment="objenesis-2.6-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021262" comment="objenesis-javadoc-2.6-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021263" comment="os-maven-plugin-1.2.3-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021264" comment="os-maven-plugin-javadoc-1.2.3-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021265" comment="osgi-annotation-6.0.0-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021266" comment="osgi-annotation-javadoc-6.0.0-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021267" comment="osgi-compendium-6.0.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021268" comment="osgi-compendium-javadoc-6.0.0-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021269" comment="osgi-core-6.0.0-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021270" comment="osgi-core-javadoc-6.0.0-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021271" comment="plexus-ant-factory-1.0-0.20.a2.2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021272" comment="plexus-ant-factory-javadoc-1.0-0.20.a2.2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021273" comment="plexus-archiver-3.6.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021274" comment="plexus-archiver-javadoc-3.6.0-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021275" comment="plexus-bsh-factory-1.0-0.19.a7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021276" comment="plexus-bsh-factory-javadoc-1.0-0.19.a7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021277" comment="plexus-build-api-0.0.7-20.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021278" comment="plexus-build-api-javadoc-0.0.7-20.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021279" comment="plexus-cipher-1.7-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021280" comment="plexus-cipher-javadoc-1.7-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021281" comment="plexus-classworlds-2.5.2-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021282" comment="plexus-classworlds-javadoc-2.5.2-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021283" comment="plexus-cli-1.6-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021284" comment="plexus-cli-javadoc-1.6-6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021285" comment="plexus-compiler-2.8.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021286" comment="plexus-compiler-extras-2.8.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021287" comment="plexus-compiler-javadoc-2.8.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021288" comment="plexus-compiler-pom-2.8.2-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021289" comment="plexus-component-api-1.0-0.24.alpha15.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021290" comment="plexus-component-api-javadoc-1.0-0.24.alpha15.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021291" comment="plexus-component-factories-pom-1.0-0.15.alpha11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021292" comment="plexus-components-pom-1.3.1-10.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021293" comment="plexus-containers-1.7.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021294" comment="plexus-containers-component-annotations-1.7.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021295" comment="plexus-containers-component-javadoc-1.7.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021296" comment="plexus-containers-component-metadata-1.7.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021297" comment="plexus-containers-container-default-1.7.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021298" comment="plexus-containers-javadoc-1.7.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021299" comment="plexus-i18n-1.0-0.11.b10.4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021300" comment="plexus-i18n-javadoc-1.0-0.11.b10.4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021301" comment="plexus-interactivity-1.0-0.27.alpha6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021302" comment="plexus-interactivity-api-1.0-0.27.alpha6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021303" comment="plexus-interactivity-javadoc-1.0-0.27.alpha6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021304" comment="plexus-interactivity-jline-1.0-0.27.alpha6.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021305" comment="plexus-interpolation-1.22-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021306" comment="plexus-interpolation-javadoc-1.22-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021307" comment="plexus-io-3.0.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021308" comment="plexus-io-javadoc-3.0.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021309" comment="plexus-languages-0.9.10-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021310" comment="plexus-languages-javadoc-0.9.10-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021311" comment="plexus-pom-5.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021312" comment="plexus-resources-1.0-0.23.a7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021313" comment="plexus-resources-javadoc-1.0-0.23.a7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021314" comment="plexus-sec-dispatcher-1.4-26.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021315" comment="plexus-sec-dispatcher-javadoc-1.4-26.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021316" comment="plexus-utils-3.1.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021317" comment="plexus-utils-javadoc-3.1.0-3.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021318" comment="plexus-velocity-1.2-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021319" comment="plexus-velocity-javadoc-1.2-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021320" comment="powermock-api-easymock-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021321" comment="powermock-api-mockito-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021322" comment="powermock-api-support-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021323" comment="powermock-common-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021324" comment="powermock-core-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021325" comment="powermock-javadoc-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021326" comment="powermock-junit4-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021327" comment="powermock-reflect-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021328" comment="powermock-testng-1.6.5-9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021329" comment="python3-javapackages-5.3.0-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021330" comment="qdox-2.0-3.M9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021331" comment="qdox-javadoc-2.0-3.M9.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021332" comment="regexp-1.5-26.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021333" comment="regexp-javadoc-1.5-26.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021334" comment="sisu-inject-0.3.3-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021335" comment="sisu-javadoc-0.3.3-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021336" comment="sisu-mojos-0.3.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021337" comment="sisu-mojos-javadoc-0.3.1-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021338" comment="sisu-plexus-0.3.3-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021339" comment="slf4j-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021340" comment="slf4j-ext-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021341" comment="slf4j-javadoc-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021342" comment="slf4j-jcl-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021343" comment="slf4j-jdk14-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021344" comment="slf4j-log4j12-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021345" comment="slf4j-manual-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021346" comment="slf4j-sources-1.7.25-4.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021347" comment="sonatype-oss-parent-7-14.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021348" comment="sonatype-plugins-parent-8-12.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021349" comment="spec-version-maven-plugin-1.2-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021350" comment="spec-version-maven-plugin-javadoc-1.2-11.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021351" comment="spice-parent-26-8.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021352" comment="testng-6.14.3-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021353" comment="testng-javadoc-6.14.3-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021354" comment="velocity-1.7-24.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021355" comment="velocity-demo-1.7-24.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021356" comment="velocity-javadoc-1.7-24.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021357" comment="velocity-manual-1.7-24.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021358" comment="weld-parent-34-5.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021359" comment="xalan-j2-2.7.1-38.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021360" comment="xalan-j2-demo-2.7.1-38.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021361" comment="xalan-j2-javadoc-2.7.1-38.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021362" comment="xalan-j2-manual-2.7.1-38.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021363" comment="xalan-j2-xsltc-2.7.1-38.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021364" comment="xbean-4.8-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021365" comment="xbean-javadoc-4.8-1.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021366" comment="xerces-j2-2.11.0-34.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021367" comment="xerces-j2-demo-2.11.0-34.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021368" comment="xerces-j2-javadoc-2.11.0-34.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021369" comment="xml-commons-apis-1.4.01-25.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021370" comment="xml-commons-apis-javadoc-1.4.01-25.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021371" comment="xml-commons-apis-manual-1.4.01-25.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021372" comment="xml-commons-resolver-1.2-26.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021373" comment="xml-commons-resolver-javadoc-1.2-26.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021374" comment="xmlunit-1.6-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021375" comment="xmlunit-javadoc-1.6-7.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021376" comment="xmvn-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021377" comment="xmvn-api-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021378" comment="xmvn-bisect-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021379" comment="xmvn-connector-aether-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021380" comment="xmvn-connector-ivy-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021381" comment="xmvn-core-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021382" comment="xmvn-install-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021383" comment="xmvn-javadoc-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021384" comment="xmvn-minimal-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021385" comment="xmvn-mojo-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021386" comment="xmvn-parent-pom-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021387" comment="xmvn-resolve-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021388" comment="xmvn-subst-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021389" comment="xmvn-tools-pom-3.0.0-21.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021390" comment="xz-java-1.8-2.module+el8.10.0+23274+27840b45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010021391" comment="xz-java-javadoc-1.8-2.module+el8.10.0+23274+27840b45 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3409" version="1" class="patch">
	<metadata>
		<title>security update for perl-YAML-LibYAML (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-40908" ref_url="https://www.suse.com/security/cve/CVE-2025-40908/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9329.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9329.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40908/">CVE-2025-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40908">CVE-2025-40908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996836" comment="perl-YAML-LibYAML-0.70-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3410" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9392.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9392.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009996837" comment="tigervnc-1.15.0-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996838" comment="tigervnc-icons-1.15.0-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996839" comment="tigervnc-license-1.15.0-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996840" comment="tigervnc-selinux-1.15.0-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996841" comment="tigervnc-server-1.15.0-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996842" comment="tigervnc-server-minimal-1.15.0-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009996843" comment="tigervnc-server-module-1.15.0-7.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3411" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919/" source="CVE"/>
		<reference ref_id="CVE-2023-53230" ref_url="https://www.suse.com/security/cve/CVE-2023-53230/" source="CVE"/>
		<reference ref_id="CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301/" source="CVE"/>
		<reference ref_id="CVE-2024-53064" ref_url="https://www.suse.com/security/cve/CVE-2024-53064/" source="CVE"/>
		<reference ref_id="CVE-2025-21764" ref_url="https://www.suse.com/security/cve/CVE-2025-21764/" source="CVE"/>
		<reference ref_id="CVE-2025-22116" ref_url="https://www.suse.com/security/cve/CVE-2025-22116/" source="CVE"/>
		<reference ref_id="CVE-2025-38053" ref_url="https://www.suse.com/security/cve/CVE-2025-38053/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9580.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9580.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53230/">CVE-2023-53230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53230">CVE-2023-53230 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53064/">CVE-2024-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53064">CVE-2024-53064 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21764/">CVE-2025-21764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22116/">CVE-2025-22116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22116">CVE-2025-22116 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38053/">CVE-2025-38053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38053">CVE-2025-38053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009997656" comment="bpftool-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997657" comment="kernel-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997658" comment="kernel-abi-stablelists-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997659" comment="kernel-core-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997660" comment="kernel-cross-headers-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997661" comment="kernel-debug-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997662" comment="kernel-debug-core-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997664" comment="kernel-debug-modules-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997665" comment="kernel-debug-modules-extra-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997667" comment="kernel-doc-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997668" comment="kernel-headers-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997669" comment="kernel-modules-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997670" comment="kernel-modules-extra-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997671" comment="kernel-tools-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997672" comment="kernel-tools-libs-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997674" comment="perf-4.18.0-553.58.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997675" comment="python3-perf-4.18.0-553.58.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3412" version="1" class="patch">
	<metadata>
		<title>security update for perl-File-Find-Rule (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2011-10007" ref_url="https://www.suse.com/security/cve/CVE-2011-10007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9605.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9605.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2011-10007/">CVE-2011-10007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-10007">CVE-2011-10007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997676" comment="perl-File-Find-Rule-0.34-9.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3413" version="1" class="patch">
	<metadata>
		<title>security update for weldr-client (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9845.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9845.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997677" comment="weldr-client-35.12-3.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3414" version="1" class="patch">
	<metadata>
		<title>security update for libblockdev (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-6019" ref_url="https://www.suse.com/security/cve/CVE-2025-6019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9878.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9878.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6019/">CVE-2025-6019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6019">CVE-2025-6019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009997678" comment="libblockdev-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997679" comment="libblockdev-crypto-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997680" comment="libblockdev-crypto-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997681" comment="libblockdev-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997682" comment="libblockdev-dm-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997683" comment="libblockdev-fs-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997684" comment="libblockdev-fs-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997685" comment="libblockdev-kbd-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997686" comment="libblockdev-loop-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997687" comment="libblockdev-loop-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997688" comment="libblockdev-lvm-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997689" comment="libblockdev-lvm-dbus-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997690" comment="libblockdev-lvm-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997691" comment="libblockdev-mdraid-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997692" comment="libblockdev-mdraid-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997693" comment="libblockdev-mpath-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997694" comment="libblockdev-nvdimm-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997695" comment="libblockdev-part-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997696" comment="libblockdev-part-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997697" comment="libblockdev-plugins-all-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997698" comment="libblockdev-swap-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997699" comment="libblockdev-swap-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997700" comment="libblockdev-utils-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997701" comment="libblockdev-utils-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997702" comment="libblockdev-vdo-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997703" comment="libblockdev-vdo-devel-2.28-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009997704" comment="python3-blockdev-2.28-7.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3415" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321/" source="CVE"/>
		<reference ref_id="CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322/" source="CVE"/>
		<reference ref_id="CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323/" source="CVE"/>
		<reference ref_id="CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324/" source="CVE"/>
		<reference ref_id="CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325/" source="CVE"/>
		<reference ref_id="CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328/" source="CVE"/>
		<reference ref_id="CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329/" source="CVE"/>
		<reference ref_id="CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330/" source="CVE"/>
		<reference ref_id="CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331/" source="CVE"/>
		<reference ref_id="CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0026.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0026.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010035687" comment="thunderbird-140.6.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3416" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0123.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0123.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036453" comment="python3.12-3.12.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036454" comment="python3.12-debug-3.12.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036455" comment="python3.12-devel-3.12.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036456" comment="python3.12-idle-3.12.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036457" comment="python3.12-libs-3.12.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036458" comment="python3.12-rpm-macros-3.12.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036459" comment="python3.12-test-3.12.12-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036460" comment="python3.12-tkinter-3.12.12-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3417" version="1" class="patch">
	<metadata>
		<title>security update for mingw-libpng (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0125.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0125.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036461" comment="mingw32-libpng-1.6.34-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036462" comment="mingw32-libpng-static-1.6.34-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036463" comment="mingw64-libpng-1.6.34-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036464" comment="mingw64-libpng-static-1.6.34-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3418" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-32365" ref_url="https://www.suse.com/security/cve/CVE-2025-32365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0130.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0130.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32365/">CVE-2025-32365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32365">CVE-2025-32365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036465" comment="poppler-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036466" comment="poppler-cpp-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036467" comment="poppler-cpp-devel-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036468" comment="poppler-devel-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036469" comment="poppler-glib-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036470" comment="poppler-glib-devel-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036471" comment="poppler-glib-doc-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036472" comment="poppler-qt5-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036473" comment="poppler-qt5-devel-20.11.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036474" comment="poppler-utils-20.11.0-13.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3419" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-13699" ref_url="https://www.suse.com/security/cve/CVE-2025-13699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0225.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0225.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13699/">CVE-2025-13699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13699">CVE-2025-13699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036574" comment="Judy-1.0.5-18.module+el8.9.0+19449+ad5852d3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036575" comment="galera-25.3.37-1.module+el8.9.0+19449+ad5852d3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036576" comment="mariadb-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036577" comment="mariadb-backup-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036578" comment="mariadb-common-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036579" comment="mariadb-devel-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036580" comment="mariadb-embedded-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036581" comment="mariadb-embedded-devel-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036582" comment="mariadb-errmsg-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036583" comment="mariadb-gssapi-server-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036584" comment="mariadb-oqgraph-engine-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036585" comment="mariadb-server-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036586" comment="mariadb-server-galera-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036587" comment="mariadb-server-utils-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036588" comment="mariadb-test-10.3.39-2.module+el8.10.0+23756+5eac0e54 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3420" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-13699" ref_url="https://www.suse.com/security/cve/CVE-2025-13699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0232.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0232.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13699/">CVE-2025-13699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13699">CVE-2025-13699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962580" comment="Judy-1.0.5-18.module+el8.10.0+21221+7bee72c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962581" comment="galera-26.4.20-1.module+el8.10.0+22586+3d7c2ef3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036589" comment="mariadb-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036590" comment="mariadb-backup-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036591" comment="mariadb-common-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036592" comment="mariadb-devel-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036593" comment="mariadb-embedded-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036594" comment="mariadb-embedded-devel-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036595" comment="mariadb-errmsg-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036596" comment="mariadb-gssapi-server-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036597" comment="mariadb-oqgraph-engine-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036598" comment="mariadb-pam-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036599" comment="mariadb-server-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036600" comment="mariadb-server-galera-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036601" comment="mariadb-server-utils-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036602" comment="mariadb-test-10.11.10-2.module+el8.10.0+23755+8858eb6a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3421" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-13699" ref_url="https://www.suse.com/security/cve/CVE-2025-13699/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0233.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0233.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13699/">CVE-2025-13699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13699">CVE-2025-13699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020747" comment="Judy-1.0.5-18.module+el8.10.0+22630+cacda3f1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025539" comment="galera-26.4.22-1.module+el8.10.0+23546+c942e1d0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036603" comment="mariadb-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036604" comment="mariadb-backup-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036605" comment="mariadb-common-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036606" comment="mariadb-devel-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036607" comment="mariadb-embedded-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036608" comment="mariadb-embedded-devel-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036609" comment="mariadb-errmsg-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036610" comment="mariadb-gssapi-server-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036611" comment="mariadb-oqgraph-engine-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036612" comment="mariadb-pam-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036613" comment="mariadb-server-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036614" comment="mariadb-server-galera-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036615" comment="mariadb-server-utils-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036616" comment="mariadb-test-10.5.29-3.module+el8.10.0+23752+7ef55629 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3422" version="1" class="patch">
	<metadata>
		<title>security update for libpng (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0241.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0241.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036617" comment="libpng-1.6.34-9.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036618" comment="libpng-devel-1.6.34-9.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3423" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010036619" comment="openssl-1.1.1k-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036620" comment="openssl-devel-1.1.1k-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036621" comment="openssl-libs-1.1.1k-14.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010036622" comment="openssl-perl-1.1.1k-14.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3424" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0421.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0421.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037078" comment="libsoup-2.62.3-11.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037079" comment="libsoup-devel-2.62.3-11.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3425" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993/" source="CVE"/>
		<reference ref_id="CVE-2025-40240" ref_url="https://www.suse.com/security/cve/CVE-2025-40240/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0444.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0444.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40240/">CVE-2025-40240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40240">CVE-2025-40240 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037345" comment="bpftool-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037346" comment="kernel-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037347" comment="kernel-abi-stablelists-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037348" comment="kernel-core-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037349" comment="kernel-cross-headers-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037350" comment="kernel-debug-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037351" comment="kernel-debug-core-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037353" comment="kernel-debug-modules-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037354" comment="kernel-debug-modules-extra-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037356" comment="kernel-doc-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037357" comment="kernel-headers-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037358" comment="kernel-modules-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037359" comment="kernel-modules-extra-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037360" comment="kernel-tools-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037361" comment="kernel-tools-libs-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037363" comment="perf-4.18.0-553.92.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037364" comment="python3-perf-4.18.0-553.92.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3426" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0519.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0519.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956875" comment="pg_repack-1.5.1-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881424" comment="pgaudit-16.0-1.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881425" comment="postgres-decoderbufs-2.4.0-1.Final.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037365" comment="postgresql-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037366" comment="postgresql-contrib-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037367" comment="postgresql-docs-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037368" comment="postgresql-plperl-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037369" comment="postgresql-plpython3-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037370" comment="postgresql-pltcl-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037371" comment="postgresql-private-devel-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037372" comment="postgresql-private-libs-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037373" comment="postgresql-server-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037374" comment="postgresql-server-devel-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037375" comment="postgresql-static-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037376" comment="postgresql-test-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037377" comment="postgresql-test-rpm-macros-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037378" comment="postgresql-upgrade-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037379" comment="postgresql-upgrade-devel-16.11-1.module+el8.10.0+23783+d9790420 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3427" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0523.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0523.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020518" comment="pg_repack-1.4.6-3.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020519" comment="pgaudit-1.5.0-1.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020520" comment="postgres-decoderbufs-0.10.0-2.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037380" comment="postgresql-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037381" comment="postgresql-contrib-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037382" comment="postgresql-docs-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037383" comment="postgresql-plperl-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037384" comment="postgresql-plpython3-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037385" comment="postgresql-pltcl-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037386" comment="postgresql-server-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037387" comment="postgresql-server-devel-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037388" comment="postgresql-static-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037389" comment="postgresql-test-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037390" comment="postgresql-test-rpm-macros-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037391" comment="postgresql-upgrade-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037392" comment="postgresql-upgrade-devel-13.23-1.module+el8.10.0+23781+c6a61bc8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3428" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817/" source="CVE"/>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0524.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0524.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850258" comment="pg_repack-1.4.8-1.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850259" comment="pgaudit-1.7.0-1.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850260" comment="postgres-decoderbufs-1.9.7-1.Final.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037648" comment="postgresql-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037649" comment="postgresql-contrib-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037650" comment="postgresql-docs-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037651" comment="postgresql-plperl-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037652" comment="postgresql-plpython3-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037653" comment="postgresql-pltcl-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037654" comment="postgresql-private-devel-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037655" comment="postgresql-private-libs-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037656" comment="postgresql-server-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037657" comment="postgresql-server-devel-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037658" comment="postgresql-static-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037659" comment="postgresql-test-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037660" comment="postgresql-test-rpm-macros-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037661" comment="postgresql-upgrade-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037662" comment="postgresql-upgrade-devel-15.15-1.module+el8.10.0+23782+2d6b2a31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3429" version="1" class="patch">
	<metadata>
		<title>security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436/" source="CVE"/>
		<reference ref_id="CVE-2025-61915" ref_url="https://www.suse.com/security/cve/CVE-2025-61915/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0596.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0596.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61915/">CVE-2025-61915 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61915">CVE-2025-61915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037663" comment="cups-2.2.6-66.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037664" comment="cups-client-2.2.6-66.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037665" comment="cups-devel-2.2.6-66.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037666" comment="cups-filesystem-2.2.6-66.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037667" comment="cups-ipptool-2.2.6-66.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037668" comment="cups-libs-2.2.6-66.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037669" comment="cups-lpd-2.2.6-66.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3430" version="1" class="patch">
	<metadata>
		<title>security update for vsftpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14242" ref_url="https://www.suse.com/security/cve/CVE-2025-14242/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0608.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0608.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14242/">CVE-2025-14242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14242">CVE-2025-14242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037670" comment="vsftpd-3.0.3-36.el8_10.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3431" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327/" source="CVE"/>
		<reference ref_id="CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877/" source="CVE"/>
		<reference ref_id="CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878/" source="CVE"/>
		<reference ref_id="CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879/" source="CVE"/>
		<reference ref_id="CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880/" source="CVE"/>
		<reference ref_id="CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882/" source="CVE"/>
		<reference ref_id="CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883/" source="CVE"/>
		<reference ref_id="CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884/" source="CVE"/>
		<reference ref_id="CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885/" source="CVE"/>
		<reference ref_id="CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886/" source="CVE"/>
		<reference ref_id="CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887/" source="CVE"/>
		<reference ref_id="CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890/" source="CVE"/>
		<reference ref_id="CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037797" comment="firefox-140.7.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3432" version="1" class="patch">
	<metadata>
		<title>security update for libpq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0695.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0695.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037671" comment="libpq-13.23-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037672" comment="libpq-devel-13.23-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3433" version="1" class="patch">
	<metadata>
		<title>security update for gnupg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-68973" ref_url="https://www.suse.com/security/cve/CVE-2025-68973/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0728.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0728.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-68973/">CVE-2025-68973 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68973">CVE-2025-68973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037798" comment="gnupg2-2.2.20-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037799" comment="gnupg2-smime-2.2.20-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3434" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-68615" ref_url="https://www.suse.com/security/cve/CVE-2025-68615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0750.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0750.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68615/">CVE-2025-68615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68615">CVE-2025-68615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038231" comment="net-snmp-5.8-33.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038232" comment="net-snmp-agent-libs-5.8-33.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038233" comment="net-snmp-devel-5.8-33.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038234" comment="net-snmp-libs-5.8-33.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038235" comment="net-snmp-perl-5.8-33.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038236" comment="net-snmp-utils-5.8-33.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3435" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0753.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0753.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038237" comment="aardvark-dns-1.10.1-2.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038238" comment="buildah-1.33.14-1.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038239" comment="buildah-tests-1.33.14-1.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038240" comment="cockpit-podman-84.1-1.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038241" comment="conmon-2.1.10-1.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038242" comment="container-selinux-2.229.0-2.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038243" comment="containernetworking-plugins-1.4.0-6.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038244" comment="containers-common-1-82.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038245" comment="crit-3.18-5.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038246" comment="criu-3.18-5.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038247" comment="criu-devel-3.18-5.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038248" comment="criu-libs-3.18-5.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038249" comment="crun-1.14.3-2.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038250" comment="fuse-overlayfs-1.13-1.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038251" comment="libslirp-4.4.0-2.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038252" comment="libslirp-devel-4.4.0-2.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038253" comment="netavark-1.10.3-1.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038254" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038255" comment="podman-4.9.4-27.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038256" comment="podman-catatonit-4.9.4-27.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038257" comment="podman-docker-4.9.4-27.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038258" comment="podman-gvproxy-4.9.4-27.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038259" comment="podman-plugins-4.9.4-27.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038260" comment="podman-remote-4.9.4-27.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038261" comment="podman-tests-4.9.4-27.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038262" comment="python3-criu-3.18-5.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038263" comment="python3-podman-4.9.0-3.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038264" comment="runc-1.2.9-2.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038265" comment="skopeo-1.14.5-5.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038266" comment="skopeo-tests-1.14.5-5.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038267" comment="slirp4netns-1.2.3-1.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038268" comment="toolbox-0.0.99.5-2.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038269" comment="toolbox-tests-0.0.99.5-2.module+el8.10.0+23863+d7fda2d7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038270" comment="udica-0.2.6-21.module+el8.10.0+23863+d7fda2d7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3436" version="1" class="patch">
	<metadata>
		<title>security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-46397" ref_url="https://www.suse.com/security/cve/CVE-2025-46397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0756.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0756.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46397/">CVE-2025-46397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46397">CVE-2025-46397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038271" comment="transfig-3.2.6a-5.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3437" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-53552" ref_url="https://www.suse.com/security/cve/CVE-2023-53552/" source="CVE"/>
		<reference ref_id="CVE-2025-38051" ref_url="https://www.suse.com/security/cve/CVE-2025-38051/" source="CVE"/>
		<reference ref_id="CVE-2025-39933" ref_url="https://www.suse.com/security/cve/CVE-2025-39933/" source="CVE"/>
		<reference ref_id="CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096/" source="CVE"/>
		<reference ref_id="CVE-2025-68301" ref_url="https://www.suse.com/security/cve/CVE-2025-68301/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0759.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0759.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53552/">CVE-2023-53552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53552">CVE-2023-53552 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38051/">CVE-2025-38051 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38051">CVE-2025-38051 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39933/">CVE-2025-39933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39933">CVE-2025-39933 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68301/">CVE-2025-68301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68301">CVE-2025-68301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038272" comment="bpftool-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038273" comment="kernel-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038274" comment="kernel-abi-stablelists-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038275" comment="kernel-core-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038276" comment="kernel-cross-headers-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038277" comment="kernel-debug-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038278" comment="kernel-debug-core-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038280" comment="kernel-debug-modules-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038281" comment="kernel-debug-modules-extra-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038283" comment="kernel-doc-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038284" comment="kernel-headers-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038285" comment="kernel-modules-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038286" comment="kernel-modules-extra-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038287" comment="kernel-tools-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038288" comment="kernel-tools-libs-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038290" comment="perf-4.18.0-553.94.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038291" comment="python3-perf-4.18.0-553.94.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3438" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0847.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0847.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053475" comment="java-11-openjdk-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053476" comment="java-11-openjdk-demo-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053477" comment="java-11-openjdk-demo-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053478" comment="java-11-openjdk-demo-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053479" comment="java-11-openjdk-devel-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053480" comment="java-11-openjdk-devel-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053481" comment="java-11-openjdk-devel-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053482" comment="java-11-openjdk-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053483" comment="java-11-openjdk-headless-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053484" comment="java-11-openjdk-headless-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053485" comment="java-11-openjdk-headless-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053486" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053487" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053488" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053489" comment="java-11-openjdk-jmods-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053490" comment="java-11-openjdk-jmods-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053491" comment="java-11-openjdk-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053492" comment="java-11-openjdk-src-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053493" comment="java-11-openjdk-src-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053494" comment="java-11-openjdk-src-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053495" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053496" comment="java-11-openjdk-static-libs-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053497" comment="java-11-openjdk-static-libs-slowdebug-11.0.30.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3439" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0921.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0921.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032452" comment="delve-1.25.2-1.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038514" comment="go-toolset-1.25.5-1.module+el8.10.0+23901+9d60aaf1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038515" comment="golang-1.25.5-1.module+el8.10.0+23901+9d60aaf1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038516" comment="golang-bin-1.25.5-1.module+el8.10.0+23901+9d60aaf1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038517" comment="golang-docs-1.25.5-1.module+el8.10.0+23901+9d60aaf1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038518" comment="golang-misc-1.25.5-1.module+el8.10.0+23901+9d60aaf1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038519" comment="golang-race-1.25.5-1.module+el8.10.0+23901+9d60aaf1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038520" comment="golang-src-1.25.5-1.module+el8.10.0+23901+9d60aaf1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038521" comment="golang-tests-1.25.5-1.module+el8.10.0+23901+9d60aaf1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3440" version="1" class="patch">
	<metadata>
		<title>security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0927.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0927.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039028" comment="java-17-openjdk-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039029" comment="java-17-openjdk-demo-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039030" comment="java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039031" comment="java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039032" comment="java-17-openjdk-devel-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039033" comment="java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039034" comment="java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039035" comment="java-17-openjdk-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039036" comment="java-17-openjdk-headless-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039037" comment="java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039038" comment="java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039039" comment="java-17-openjdk-javadoc-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039040" comment="java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039041" comment="java-17-openjdk-jmods-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039042" comment="java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039043" comment="java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039044" comment="java-17-openjdk-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039045" comment="java-17-openjdk-src-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039046" comment="java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039047" comment="java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039048" comment="java-17-openjdk-static-libs-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039049" comment="java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039050" comment="java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3441" version="1" class="patch">
	<metadata>
		<title>security update for java-21-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0928.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0928.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039592" comment="java-21-openjdk-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039593" comment="java-21-openjdk-demo-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039594" comment="java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039595" comment="java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039596" comment="java-21-openjdk-devel-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039597" comment="java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039598" comment="java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039599" comment="java-21-openjdk-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039600" comment="java-21-openjdk-headless-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039601" comment="java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039602" comment="java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039603" comment="java-21-openjdk-javadoc-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039604" comment="java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039605" comment="java-21-openjdk-jmods-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039606" comment="java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039607" comment="java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039608" comment="java-21-openjdk-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039609" comment="java-21-openjdk-src-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039610" comment="java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039611" comment="java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039612" comment="java-21-openjdk-static-libs-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039613" comment="java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039614" comment="java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3442" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-67725" ref_url="https://www.suse.com/security/cve/CVE-2025-67725/" source="CVE"/>
		<reference ref_id="CVE-2025-67726" ref_url="https://www.suse.com/security/cve/CVE-2025-67726/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0930.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0930.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67725/">CVE-2025-67725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67725">CVE-2025-67725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67726/">CVE-2025-67726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67726">CVE-2025-67726 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010038522" comment="pcs-0.10.18-2.el8_10.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010038523" comment="pcs-snmp-0.10.18-2.el8_10.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3443" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0932.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0932.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040212" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040213" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040214" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040215" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040216" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040217" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040218" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040219" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040220" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040221" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040222" comment="java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040223" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040224" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040225" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040226" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040227" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040228" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3444" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0991.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0991.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039051" comment="glib2-2.56.4-168.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039052" comment="glib2-devel-2.56.4-168.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039053" comment="glib2-doc-2.56.4-168.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039054" comment="glib2-fam-2.56.4-168.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039055" comment="glib2-static-2.56.4-168.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039056" comment="glib2-tests-2.56.4-168.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3445" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-53673" ref_url="https://www.suse.com/security/cve/CVE-2023-53673/" source="CVE"/>
		<reference ref_id="CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154/" source="CVE"/>
		<reference ref_id="CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248/" source="CVE"/>
		<reference ref_id="CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1142.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1142.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53673/">CVE-2023-53673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53673">CVE-2023-53673 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040291" comment="bpftool-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040292" comment="kernel-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040293" comment="kernel-abi-stablelists-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040294" comment="kernel-core-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040295" comment="kernel-cross-headers-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040296" comment="kernel-debug-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040297" comment="kernel-debug-core-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040299" comment="kernel-debug-modules-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040300" comment="kernel-debug-modules-extra-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040302" comment="kernel-doc-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040303" comment="kernel-headers-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040304" comment="kernel-modules-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040305" comment="kernel-modules-extra-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040306" comment="kernel-tools-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040307" comment="kernel-tools-libs-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040309" comment="perf-4.18.0-553.97.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040310" comment="python3-perf-4.18.0-553.97.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3446" version="1" class="patch">
	<metadata>
		<title>security update for python3.11-urllib3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1224.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1224.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040229" comment="python3.11-urllib3-1.26.12-6.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3447" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-urllib3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1226.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1226.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040230" comment="python3.12-urllib3-1.26.19-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3448" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1240.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1240.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041198" comment="fence-agents-aliyun-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041199" comment="fence-agents-all-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041200" comment="fence-agents-amt-ws-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041201" comment="fence-agents-apc-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041202" comment="fence-agents-apc-snmp-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041203" comment="fence-agents-aws-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041204" comment="fence-agents-azure-arm-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041205" comment="fence-agents-bladecenter-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041206" comment="fence-agents-brocade-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041207" comment="fence-agents-cisco-mds-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041208" comment="fence-agents-cisco-ucs-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041209" comment="fence-agents-common-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041210" comment="fence-agents-compute-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041211" comment="fence-agents-drac5-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041212" comment="fence-agents-eaton-snmp-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041213" comment="fence-agents-emerson-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041214" comment="fence-agents-eps-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041215" comment="fence-agents-gce-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041216" comment="fence-agents-heuristics-ping-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041217" comment="fence-agents-hpblade-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041218" comment="fence-agents-ibm-powervs-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041219" comment="fence-agents-ibm-vpc-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041220" comment="fence-agents-ibmblade-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041221" comment="fence-agents-ifmib-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041222" comment="fence-agents-ilo-moonshot-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041223" comment="fence-agents-ilo-mp-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041224" comment="fence-agents-ilo-ssh-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041225" comment="fence-agents-ilo2-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041226" comment="fence-agents-intelmodular-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041227" comment="fence-agents-ipdu-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041228" comment="fence-agents-ipmilan-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041229" comment="fence-agents-kdump-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041230" comment="fence-agents-kubevirt-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041231" comment="fence-agents-lpar-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041232" comment="fence-agents-mpath-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041233" comment="fence-agents-nutanix-ahv-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041234" comment="fence-agents-openstack-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041235" comment="fence-agents-redfish-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041236" comment="fence-agents-rhevm-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041237" comment="fence-agents-rsa-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041238" comment="fence-agents-rsb-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041239" comment="fence-agents-sbd-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041240" comment="fence-agents-scsi-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041241" comment="fence-agents-virsh-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041242" comment="fence-agents-vmware-rest-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041243" comment="fence-agents-vmware-soap-4.2.1-129.el8_10.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041244" comment="fence-agents-wti-4.2.1-129.el8_10.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3449" version="1" class="patch">
	<metadata>
		<title>security update for resource-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1241.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1241.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040231" comment="resource-agents-4.9.0-54.el8_10.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040232" comment="resource-agents-aliyun-4.9.0-54.el8_10.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040233" comment="resource-agents-gcp-4.9.0-54.el8_10.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040234" comment="resource-agents-paf-4.9.0-54.el8_10.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3450" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418/" source="CVE"/>
		<reference ref_id="CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471/" source="CVE"/>
		<reference ref_id="CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1254.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1254.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040235" comment="python3-urllib3-1.24.2-9.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3451" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1344.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1344.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040718" comment="grafana-9.2.10-27.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040719" comment="grafana-selinux-9.2.10-27.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3452" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1374.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1374.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040720" comment="python3.11-3.11.13-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040721" comment="python3.11-debug-3.11.13-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040722" comment="python3.11-devel-3.11.13-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040723" comment="python3.11-idle-3.11.13-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040724" comment="python3.11-libs-3.11.13-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040725" comment="python3.11-rpm-macros-3.11.13-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040726" comment="python3.11-test-3.11.13-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040727" comment="python3.11-tkinter-3.11.13-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3453" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-1220" ref_url="https://www.suse.com/security/cve/CVE-2025-1220/" source="CVE"/>
		<reference ref_id="CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177/" source="CVE"/>
		<reference ref_id="CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178/" source="CVE"/>
		<reference ref_id="CVE-2025-14180" ref_url="https://www.suse.com/security/cve/CVE-2025-14180/" source="CVE"/>
		<reference ref_id="CVE-2025-1735" ref_url="https://www.suse.com/security/cve/CVE-2025-1735/" source="CVE"/>
		<reference ref_id="CVE-2025-6491" ref_url="https://www.suse.com/security/cve/CVE-2025-6491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1412.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1412.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1220/">CVE-2025-1220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1220">CVE-2025-1220 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14180/">CVE-2025-14180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14180">CVE-2025-14180 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1735/">CVE-2025-1735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1735">CVE-2025-1735 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6491/">CVE-2025-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6491">CVE-2025-6491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957327" comment="apcu-panel-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957328" comment="libzip-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957329" comment="libzip-devel-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957330" comment="libzip-tools-1.7.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040728" comment="php-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040729" comment="php-bcmath-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040730" comment="php-cli-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040731" comment="php-common-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040732" comment="php-dba-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040733" comment="php-dbg-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040734" comment="php-devel-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040735" comment="php-embedded-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040736" comment="php-enchant-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040737" comment="php-ffi-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040738" comment="php-fpm-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040739" comment="php-gd-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040740" comment="php-gmp-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040741" comment="php-intl-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040742" comment="php-ldap-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040743" comment="php-mbstring-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040744" comment="php-mysqlnd-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040745" comment="php-odbc-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040746" comment="php-opcache-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040747" comment="php-pdo-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957351" comment="php-pear-1.10.14-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957352" comment="php-pecl-apcu-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957353" comment="php-pecl-apcu-devel-5.1.23-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957354" comment="php-pecl-rrd-2.0.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957355" comment="php-pecl-xdebug3-3.2.2-2.module+el8.10.0+20798+00eaeb41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957356" comment="php-pecl-zip-1.22.3-1.module+el8.10.0+20770+a5eca186 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040748" comment="php-pgsql-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040749" comment="php-process-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040750" comment="php-snmp-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040751" comment="php-soap-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040752" comment="php-xml-8.2.30-1.module+el8.10.0+23848+33d54484 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3454" version="1" class="patch">
	<metadata>
		<title>security update for spice-client-win (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1509.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1509.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040753" comment="spice-client-win-x64-8.10-6.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040754" comment="spice-client-win-x86-8.10-6.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3455" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1518.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1518.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040755" comment="grafana-pcp-5.1.1-11.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3456" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14422" ref_url="https://www.suse.com/security/cve/CVE-2025-14422/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1574.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1574.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14422/">CVE-2025-14422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14422">CVE-2025-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040756" comment="gimp-2.8.22-26.module+el8.10.0+23914+4745738d.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040757" comment="gimp-devel-2.8.22-26.module+el8.10.0+23914+4745738d.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040758" comment="gimp-devel-tools-2.8.22-26.module+el8.10.0+23914+4745738d.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040759" comment="gimp-libs-2.8.22-26.module+el8.10.0+23914+4745738d.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962044" comment="pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962045" comment="pygobject2-codegen-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962046" comment="pygobject2-devel-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962047" comment="pygobject2-doc-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962048" comment="pygtk2-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962049" comment="pygtk2-codegen-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962050" comment="pygtk2-devel-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962051" comment="pygtk2-doc-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962052" comment="python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962053" comment="python2-cairo-devel-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3457" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-54349" ref_url="https://www.suse.com/security/cve/CVE-2025-54349/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-54349/">CVE-2025-54349 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54349">CVE-2025-54349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040955" comment="iperf3-3.5-12.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3458" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1631.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1631.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041245" comment="platform-python-3.6.8-72.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041246" comment="platform-python-debug-3.6.8-72.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041247" comment="platform-python-devel-3.6.8-72.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041248" comment="python3-idle-3.6.8-72.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041249" comment="python3-libs-3.6.8-72.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041250" comment="python3-test-3.6.8-72.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041251" comment="python3-tkinter-3.6.8-72.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3459" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50865" ref_url="https://www.suse.com/security/cve/CVE-2022-50865/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2025-38022" ref_url="https://www.suse.com/security/cve/CVE-2025-38022/" source="CVE"/>
		<reference ref_id="CVE-2025-38024" ref_url="https://www.suse.com/security/cve/CVE-2025-38024/" source="CVE"/>
		<reference ref_id="CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415/" source="CVE"/>
		<reference ref_id="CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459/" source="CVE"/>
		<reference ref_id="CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760/" source="CVE"/>
		<reference ref_id="CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258/" source="CVE"/>
		<reference ref_id="CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271/" source="CVE"/>
		<reference ref_id="CVE-2025-40322" ref_url="https://www.suse.com/security/cve/CVE-2025-40322/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1662.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1662.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50865/">CVE-2022-50865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50865">CVE-2022-50865 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38022/">CVE-2025-38022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38022">CVE-2025-38022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38024/">CVE-2025-38024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40322/">CVE-2025-40322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40322">CVE-2025-40322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041252" comment="bpftool-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041253" comment="kernel-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041254" comment="kernel-abi-stablelists-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041255" comment="kernel-core-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041256" comment="kernel-cross-headers-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041257" comment="kernel-debug-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041258" comment="kernel-debug-core-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041260" comment="kernel-debug-modules-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041261" comment="kernel-debug-modules-extra-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041263" comment="kernel-doc-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041264" comment="kernel-headers-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041265" comment="kernel-modules-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041266" comment="kernel-modules-extra-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041267" comment="kernel-tools-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041268" comment="kernel-tools-libs-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041270" comment="perf-4.18.0-553.100.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041271" comment="python3-perf-4.18.0-553.100.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3460" version="1" class="patch">
	<metadata>
		<title>security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14104" ref_url="https://www.suse.com/security/cve/CVE-2025-14104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14104/">CVE-2025-14104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14104">CVE-2025-14104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042258" comment="libblkid-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042259" comment="libblkid-devel-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042260" comment="libfdisk-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042261" comment="libfdisk-devel-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042262" comment="libmount-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042263" comment="libmount-devel-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042264" comment="libsmartcols-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042265" comment="libsmartcols-devel-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042266" comment="libuuid-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042267" comment="libuuid-devel-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042268" comment="python3-libmount-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042269" comment="util-linux-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042270" comment="util-linux-user-2.32.1-48.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042271" comment="uuidd-2.32.1-48.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3461" version="1" class="patch">
	<metadata>
		<title>security update for resource-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1904.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1904.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042416" comment="resource-agents-4.9.0-54.el8_10.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042417" comment="resource-agents-aliyun-4.9.0-54.el8_10.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042418" comment="resource-agents-gcp-4.9.0-54.el8_10.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042419" comment="resource-agents-paf-4.9.0-54.el8_10.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3462" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1906.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1906.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042420" comment="fence-agents-aliyun-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042421" comment="fence-agents-all-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042422" comment="fence-agents-amt-ws-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042423" comment="fence-agents-apc-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042424" comment="fence-agents-apc-snmp-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042425" comment="fence-agents-aws-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042426" comment="fence-agents-azure-arm-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042427" comment="fence-agents-bladecenter-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042428" comment="fence-agents-brocade-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042429" comment="fence-agents-cisco-mds-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042430" comment="fence-agents-cisco-ucs-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042431" comment="fence-agents-common-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042432" comment="fence-agents-compute-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042433" comment="fence-agents-drac5-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042434" comment="fence-agents-eaton-snmp-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042435" comment="fence-agents-emerson-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042436" comment="fence-agents-eps-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042437" comment="fence-agents-gce-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042438" comment="fence-agents-heuristics-ping-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042439" comment="fence-agents-hpblade-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042440" comment="fence-agents-ibm-powervs-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042441" comment="fence-agents-ibm-vpc-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042442" comment="fence-agents-ibmblade-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042443" comment="fence-agents-ifmib-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042444" comment="fence-agents-ilo-moonshot-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042445" comment="fence-agents-ilo-mp-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042446" comment="fence-agents-ilo-ssh-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042447" comment="fence-agents-ilo2-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042448" comment="fence-agents-intelmodular-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042449" comment="fence-agents-ipdu-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042450" comment="fence-agents-ipmilan-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042451" comment="fence-agents-kdump-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042452" comment="fence-agents-kubevirt-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042453" comment="fence-agents-lpar-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042454" comment="fence-agents-mpath-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042455" comment="fence-agents-nutanix-ahv-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042456" comment="fence-agents-openstack-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042457" comment="fence-agents-redfish-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042458" comment="fence-agents-rhevm-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042459" comment="fence-agents-rsa-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042460" comment="fence-agents-rsb-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042461" comment="fence-agents-sbd-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042462" comment="fence-agents-scsi-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042463" comment="fence-agents-virsh-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042464" comment="fence-agents-vmware-rest-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042465" comment="fence-agents-vmware-soap-4.2.1-129.el8_10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042466" comment="fence-agents-wti-4.2.1-129.el8_10.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3463" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-23530" ref_url="https://www.suse.com/security/cve/CVE-2026-23530/" source="CVE"/>
		<reference ref_id="CVE-2026-23531" ref_url="https://www.suse.com/security/cve/CVE-2026-23531/" source="CVE"/>
		<reference ref_id="CVE-2026-23532" ref_url="https://www.suse.com/security/cve/CVE-2026-23532/" source="CVE"/>
		<reference ref_id="CVE-2026-23533" ref_url="https://www.suse.com/security/cve/CVE-2026-23533/" source="CVE"/>
		<reference ref_id="CVE-2026-23534" ref_url="https://www.suse.com/security/cve/CVE-2026-23534/" source="CVE"/>
		<reference ref_id="CVE-2026-23883" ref_url="https://www.suse.com/security/cve/CVE-2026-23883/" source="CVE"/>
		<reference ref_id="CVE-2026-23884" ref_url="https://www.suse.com/security/cve/CVE-2026-23884/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2081.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2081.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23530/">CVE-2026-23530 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23530">CVE-2026-23530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23531/">CVE-2026-23531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23531">CVE-2026-23531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23532/">CVE-2026-23532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23532">CVE-2026-23532 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23533/">CVE-2026-23533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23533">CVE-2026-23533 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23534/">CVE-2026-23534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23534">CVE-2026-23534 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23883/">CVE-2026-23883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23883">CVE-2026-23883 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23884/">CVE-2026-23884 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23884">CVE-2026-23884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042272" comment="freerdp-2.11.7-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042273" comment="freerdp-devel-2.11.7-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042274" comment="freerdp-libs-2.11.7-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042275" comment="libwinpr-2.11.7-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042276" comment="libwinpr-devel-2.11.7-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3464" version="1" class="patch">
	<metadata>
		<title>security update for python3.12-wheel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-24049" ref_url="https://www.suse.com/security/cve/CVE-2026-24049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2090.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2090.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-24049/">CVE-2026-24049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24049">CVE-2026-24049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042277" comment="python3.12-wheel-0.41.2-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042278" comment="python3.12-wheel-wheel-0.41.2-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3465" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042279" comment="platform-python-3.6.8-73.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042280" comment="platform-python-debug-3.6.8-73.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042281" comment="platform-python-devel-3.6.8-73.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042282" comment="python3-idle-3.6.8-73.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042283" comment="python3-libs-3.6.8-73.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042284" comment="python3-test-3.6.8-73.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042285" comment="python3-tkinter-3.6.8-73.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3466" version="1" class="patch">
	<metadata>
		<title>security update for spice-client-win (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719/" source="CVE"/>
		<reference ref_id="CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2214.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2214.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042467" comment="spice-client-win-x64-8.10-7.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042468" comment="spice-client-win-x86-8.10-7.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3467" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719/" source="CVE"/>
		<reference ref_id="CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2215.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2215.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042469" comment="libsoup-2.62.3-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042470" comment="libsoup-devel-2.62.3-13.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3468" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327/" source="CVE"/>
		<reference ref_id="CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877/" source="CVE"/>
		<reference ref_id="CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878/" source="CVE"/>
		<reference ref_id="CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879/" source="CVE"/>
		<reference ref_id="CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880/" source="CVE"/>
		<reference ref_id="CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882/" source="CVE"/>
		<reference ref_id="CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883/" source="CVE"/>
		<reference ref_id="CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884/" source="CVE"/>
		<reference ref_id="CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885/" source="CVE"/>
		<reference ref_id="CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886/" source="CVE"/>
		<reference ref_id="CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887/" source="CVE"/>
		<reference ref_id="CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890/" source="CVE"/>
		<reference ref_id="CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2220.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2220.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042512" comment="thunderbird-140.7.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3469" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2022-50673" ref_url="https://www.suse.com/security/cve/CVE-2022-50673/" source="CVE"/>
		<reference ref_id="CVE-2025-38403" ref_url="https://www.suse.com/security/cve/CVE-2025-38403/" source="CVE"/>
		<reference ref_id="CVE-2025-40135" ref_url="https://www.suse.com/security/cve/CVE-2025-40135/" source="CVE"/>
		<reference ref_id="CVE-2025-40158" ref_url="https://www.suse.com/security/cve/CVE-2025-40158/" source="CVE"/>
		<reference ref_id="CVE-2025-40170" ref_url="https://www.suse.com/security/cve/CVE-2025-40170/" source="CVE"/>
		<reference ref_id="CVE-2025-40269" ref_url="https://www.suse.com/security/cve/CVE-2025-40269/" source="CVE"/>
		<reference ref_id="CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349/" source="CVE"/>
		<reference ref_id="CVE-2026-22998" ref_url="https://www.suse.com/security/cve/CVE-2026-22998/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2264.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2264.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50673/">CVE-2022-50673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50673">CVE-2022-50673 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38403/">CVE-2025-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40135/">CVE-2025-40135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40135">CVE-2025-40135 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40158/">CVE-2025-40158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40158">CVE-2025-40158 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40170/">CVE-2025-40170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40170">CVE-2025-40170 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40269/">CVE-2025-40269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22998/">CVE-2026-22998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042471" comment="bpftool-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042472" comment="kernel-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042473" comment="kernel-abi-stablelists-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042474" comment="kernel-core-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042475" comment="kernel-cross-headers-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042476" comment="kernel-debug-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042477" comment="kernel-debug-core-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042479" comment="kernel-debug-modules-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042480" comment="kernel-debug-modules-extra-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042482" comment="kernel-doc-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042483" comment="kernel-headers-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042484" comment="kernel-modules-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042485" comment="kernel-modules-extra-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042486" comment="kernel-tools-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042487" comment="kernel-tools-libs-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042489" comment="perf-4.18.0-553.104.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042490" comment="python3-perf-4.18.0-553.104.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3470" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2323.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2323.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042513" comment="git-lfs-3.4.1-7.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3471" version="1" class="patch">
	<metadata>
		<title>security update for brotli (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-6176" ref_url="https://www.suse.com/security/cve/CVE-2025-6176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2389.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2389.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6176/">CVE-2025-6176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6176">CVE-2025-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042514" comment="brotli-1.0.6-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042515" comment="brotli-devel-1.0.6-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042516" comment="python3-brotli-1.0.6-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3472" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2419.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2419.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042723" comment="python3.12-3.12.12-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042724" comment="python3.12-debug-3.12.12-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042725" comment="python3.12-devel-3.12.12-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042726" comment="python3.12-idle-3.12.12-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042727" comment="python3.12-libs-3.12.12-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042728" comment="python3.12-rpm-macros-3.12.12-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042729" comment="python3.12-test-3.12.12-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042730" comment="python3.12-tkinter-3.12.12-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3473" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2420.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2420.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042731" comment="nodejs-24.13.0-0.module+el8.10.0+23888+24fa7806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042732" comment="nodejs-devel-24.13.0-0.module+el8.10.0+23888+24fa7806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042733" comment="nodejs-docs-24.13.0-0.module+el8.10.0+23888+24fa7806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042734" comment="nodejs-full-i18n-24.13.0-0.module+el8.10.0+23888+24fa7806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042735" comment="nodejs-libs-24.13.0-0.module+el8.10.0+23888+24fa7806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042736" comment="nodejs-nodemon-3.0.3-1.module+el8.10.0+23730+2ad7beb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042737" comment="nodejs-packaging-2021.06-6.module+el8.10.0+23730+2ad7beb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042738" comment="nodejs-packaging-bundler-2021.06-6.module+el8.10.0+23730+2ad7beb8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042739" comment="npm-11.6.2-1.24.13.0.0.module+el8.10.0+23888+24fa7806 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042740" comment="v8-13.6-devel-13.6.233.17-1.24.13.0.0.module+el8.10.0+23888+24fa7806 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3474" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2421.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2421.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042741" comment="nodejs-22.22.0-1.module+el8.10.0+23904+2c92f862 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042742" comment="nodejs-devel-22.22.0-1.module+el8.10.0+23904+2c92f862 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042743" comment="nodejs-docs-22.22.0-1.module+el8.10.0+23904+2c92f862 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042744" comment="nodejs-full-i18n-22.22.0-1.module+el8.10.0+23904+2c92f862 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042745" comment="nodejs-libs-22.22.0-1.module+el8.10.0+23904+2c92f862 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042746" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+23474+222d264a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042747" comment="nodejs-packaging-2021.06-5.module+el8.10.0+23590+1e59695e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042748" comment="nodejs-packaging-bundler-2021.06-5.module+el8.10.0+23590+1e59695e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042749" comment="npm-10.9.4-1.22.22.0.1.module+el8.10.0+23904+2c92f862 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042750" comment="v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el8.10.0+23904+2c92f862 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3475" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130/" source="CVE"/>
		<reference ref_id="CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131/" source="CVE"/>
		<reference ref_id="CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132/" source="CVE"/>
		<reference ref_id="CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465/" source="CVE"/>
		<reference ref_id="CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042517" comment="nodejs-20.20.0-1.module+el8.10.0+23905+c49b2aec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042518" comment="nodejs-devel-20.20.0-1.module+el8.10.0+23905+c49b2aec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042519" comment="nodejs-docs-20.20.0-1.module+el8.10.0+23905+c49b2aec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042520" comment="nodejs-full-i18n-20.20.0-1.module+el8.10.0+23905+c49b2aec is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042521" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+23521+490ebfde is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042522" comment="nodejs-packaging-2021.06-5.module+el8.10.0+23591+ff544af9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042523" comment="nodejs-packaging-bundler-2021.06-5.module+el8.10.0+23591+ff544af9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042524" comment="npm-10.8.2-1.20.20.0.1.module+el8.10.0+23905+c49b2aec is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3476" version="1" class="patch">
	<metadata>
		<title>security update for libzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217/" source="CVE"/>
		<reference ref_id="CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219/" source="CVE"/>
		<reference ref_id="CVE-2025-1220" ref_url="https://www.suse.com/security/cve/CVE-2025-1220/" source="CVE"/>
		<reference ref_id="CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177/" source="CVE"/>
		<reference ref_id="CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178/" source="CVE"/>
		<reference ref_id="CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734/" source="CVE"/>
		<reference ref_id="CVE-2025-1735" ref_url="https://www.suse.com/security/cve/CVE-2025-1735/" source="CVE"/>
		<reference ref_id="CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736/" source="CVE"/>
		<reference ref_id="CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861/" source="CVE"/>
		<reference ref_id="CVE-2025-6491" ref_url="https://www.suse.com/security/cve/CVE-2025-6491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2470.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2470.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1220/">CVE-2025-1220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1220">CVE-2025-1220 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1735/">CVE-2025-1735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1735">CVE-2025-1735 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6491/">CVE-2025-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6491">CVE-2025-6491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957362" comment="apcu-panel-5.1.18-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957363" comment="libzip-1.6.1-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957364" comment="libzip-devel-1.6.1-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957365" comment="libzip-tools-1.6.1-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042751" comment="php-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042752" comment="php-bcmath-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042753" comment="php-cli-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042754" comment="php-common-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042755" comment="php-dba-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042756" comment="php-dbg-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042757" comment="php-devel-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042758" comment="php-embedded-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042759" comment="php-enchant-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042760" comment="php-ffi-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042761" comment="php-fpm-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042762" comment="php-gd-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042763" comment="php-gmp-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042764" comment="php-intl-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042765" comment="php-json-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042766" comment="php-ldap-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042767" comment="php-mbstring-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042768" comment="php-mysqlnd-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042769" comment="php-odbc-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042770" comment="php-opcache-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042771" comment="php-pdo-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957387" comment="php-pear-1.10.13-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957388" comment="php-pecl-apcu-5.1.18-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957389" comment="php-pecl-apcu-devel-5.1.18-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957390" comment="php-pecl-rrd-2.0.1-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957391" comment="php-pecl-xdebug-2.9.5-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957392" comment="php-pecl-zip-1.18.2-1.module+el8.10.0+22485+a3539972 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042772" comment="php-pgsql-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042773" comment="php-process-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042774" comment="php-snmp-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042775" comment="php-soap-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042776" comment="php-xml-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042777" comment="php-xmlrpc-7.4.33-3.module+el8.10.0+23902+d3c8dd8f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3477" version="1" class="patch">
	<metadata>
		<title>security update for gcc-toolset-14-binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2627.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2627.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010043374" comment="gcc-toolset-14-binutils-2.41-4.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043375" comment="gcc-toolset-14-binutils-devel-2.41-4.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043376" comment="gcc-toolset-14-binutils-gold-2.41-4.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043377" comment="gcc-toolset-14-binutils-gprofng-2.41-4.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3478" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2708.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2708.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032452" comment="delve-1.25.2-1.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044030" comment="go-toolset-1.25.7-1.module+el8.10.0+23993+83a15e10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044031" comment="golang-1.25.7-1.module+el8.10.0+23993+83a15e10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044032" comment="golang-bin-1.25.7-1.module+el8.10.0+23993+83a15e10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044033" comment="golang-docs-1.25.7-1.module+el8.10.0+23993+83a15e10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044034" comment="golang-misc-1.25.7-1.module+el8.10.0+23993+83a15e10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044035" comment="golang-race-1.25.7-1.module+el8.10.0+23993+83a15e10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044036" comment="golang-src-1.25.7-1.module+el8.10.0+23993+83a15e10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044037" comment="golang-tests-1.25.7-1.module+el8.10.0+23993+83a15e10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3479" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-53762" ref_url="https://www.suse.com/security/cve/CVE-2023-53762/" source="CVE"/>
		<reference ref_id="CVE-2025-40168" ref_url="https://www.suse.com/security/cve/CVE-2025-40168/" source="CVE"/>
		<reference ref_id="CVE-2025-40304" ref_url="https://www.suse.com/security/cve/CVE-2025-40304/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2720.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2720.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53762/">CVE-2023-53762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53762">CVE-2023-53762 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40168/">CVE-2025-40168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40168">CVE-2025-40168 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40304/">CVE-2025-40304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40304">CVE-2025-40304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044135" comment="bpftool-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044136" comment="kernel-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044137" comment="kernel-abi-stablelists-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044138" comment="kernel-core-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044139" comment="kernel-cross-headers-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044140" comment="kernel-debug-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044141" comment="kernel-debug-core-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044143" comment="kernel-debug-modules-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044144" comment="kernel-debug-modules-extra-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044146" comment="kernel-doc-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044147" comment="kernel-headers-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044148" comment="kernel-modules-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044149" comment="kernel-modules-extra-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044150" comment="kernel-tools-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044151" comment="kernel-tools-libs-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044153" comment="perf-4.18.0-553.105.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044154" comment="python3-perf-4.18.0-553.105.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3480" version="1" class="patch">
	<metadata>
		<title>security update for munge (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-25506" ref_url="https://www.suse.com/security/cve/CVE-2026-25506/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3032.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3032.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-25506/">CVE-2026-25506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25506">CVE-2026-25506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044616" comment="munge-0.5.13-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044617" comment="munge-devel-0.5.13-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044618" comment="munge-libs-0.5.13-3.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3481" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3042.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3042.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044619" comment="openssl-1.1.1k-15.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044620" comment="openssl-devel-1.1.1k-15.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044621" comment="openssl-libs-1.1.1k-15.el8_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044622" comment="openssl-perl-1.1.1k-15.el8_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3482" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129/" source="CVE"/>
		<reference ref_id="CVE-2025-38248" ref_url="https://www.suse.com/security/cve/CVE-2025-38248/" source="CVE"/>
		<reference ref_id="CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064/" source="CVE"/>
		<reference ref_id="CVE-2025-68800" ref_url="https://www.suse.com/security/cve/CVE-2025-68800/" source="CVE"/>
		<reference ref_id="CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38248/">CVE-2025-38248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38248">CVE-2025-38248 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68800/">CVE-2025-68800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044734" comment="bpftool-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044735" comment="kernel-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044736" comment="kernel-abi-stablelists-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044737" comment="kernel-core-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044738" comment="kernel-cross-headers-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044739" comment="kernel-debug-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044740" comment="kernel-debug-core-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044742" comment="kernel-debug-modules-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044743" comment="kernel-debug-modules-extra-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044745" comment="kernel-doc-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044746" comment="kernel-headers-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044747" comment="kernel-modules-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044748" comment="kernel-modules-extra-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044749" comment="kernel-tools-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044750" comment="kernel-tools-libs-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044752" comment="perf-4.18.0-553.107.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044753" comment="python3-perf-4.18.0-553.107.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3483" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3187.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3187.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044754" comment="grafana-pcp-5.1.1-12.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3484" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3188.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3188.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010044755" comment="grafana-9.2.10-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010044756" comment="grafana-selinux-9.2.10-28.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3485" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-22855" ref_url="https://www.suse.com/security/cve/CVE-2026-22855/" source="CVE"/>
		<reference ref_id="CVE-2026-22858" ref_url="https://www.suse.com/security/cve/CVE-2026-22858/" source="CVE"/>
		<reference ref_id="CVE-2026-22859" ref_url="https://www.suse.com/security/cve/CVE-2026-22859/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3334.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3334.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22855/">CVE-2026-22855 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22855">CVE-2026-22855 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22858/">CVE-2026-22858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22858">CVE-2026-22858 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22859/">CVE-2026-22859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22859">CVE-2026-22859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045096" comment="freerdp-2.11.7-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045097" comment="freerdp-devel-2.11.7-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045098" comment="freerdp-libs-2.11.7-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045099" comment="libwinpr-2.11.7-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045100" comment="libwinpr-devel-2.11.7-3.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3486" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<reference ref_id="CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757/" source="CVE"/>
		<reference ref_id="CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758/" source="CVE"/>
		<reference ref_id="CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759/" source="CVE"/>
		<reference ref_id="CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760/" source="CVE"/>
		<reference ref_id="CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761/" source="CVE"/>
		<reference ref_id="CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762/" source="CVE"/>
		<reference ref_id="CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763/" source="CVE"/>
		<reference ref_id="CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764/" source="CVE"/>
		<reference ref_id="CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765/" source="CVE"/>
		<reference ref_id="CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766/" source="CVE"/>
		<reference ref_id="CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767/" source="CVE"/>
		<reference ref_id="CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768/" source="CVE"/>
		<reference ref_id="CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769/" source="CVE"/>
		<reference ref_id="CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770/" source="CVE"/>
		<reference ref_id="CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771/" source="CVE"/>
		<reference ref_id="CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772/" source="CVE"/>
		<reference ref_id="CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773/" source="CVE"/>
		<reference ref_id="CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774/" source="CVE"/>
		<reference ref_id="CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775/" source="CVE"/>
		<reference ref_id="CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776/" source="CVE"/>
		<reference ref_id="CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777/" source="CVE"/>
		<reference ref_id="CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778/" source="CVE"/>
		<reference ref_id="CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779/" source="CVE"/>
		<reference ref_id="CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780/" source="CVE"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782/" source="CVE"/>
		<reference ref_id="CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783/" source="CVE"/>
		<reference ref_id="CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784/" source="CVE"/>
		<reference ref_id="CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785/" source="CVE"/>
		<reference ref_id="CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786/" source="CVE"/>
		<reference ref_id="CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787/" source="CVE"/>
		<reference ref_id="CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788/" source="CVE"/>
		<reference ref_id="CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789/" source="CVE"/>
		<reference ref_id="CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790/" source="CVE"/>
		<reference ref_id="CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791/" source="CVE"/>
		<reference ref_id="CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792/" source="CVE"/>
		<reference ref_id="CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045282" comment="firefox-140.8.0-2.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3487" version="1" class="patch">
	<metadata>
		<title>security update for mingw-fontconfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3407.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3407.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045283" comment="mingw32-fontconfig-2.12.6-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045284" comment="mingw64-fontconfig-2.12.6-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3488" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<reference ref_id="CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729/" source="CVE"/>
		<reference ref_id="CVE-2025-65637" ref_url="https://www.suse.com/security/cve/CVE-2025-65637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3428.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3428.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2025-65637/">CVE-2025-65637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65637">CVE-2025-65637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045285" comment="aardvark-dns-1.10.1-2.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045286" comment="buildah-1.33.14-2.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045287" comment="buildah-tests-1.33.14-2.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045288" comment="cockpit-podman-84.1-1.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045289" comment="conmon-2.1.10-1.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045290" comment="container-selinux-2.229.0-2.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045291" comment="containernetworking-plugins-1.4.0-7.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045292" comment="containers-common-1-82.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045293" comment="crit-3.18-5.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045294" comment="criu-3.18-5.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045295" comment="criu-devel-3.18-5.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045296" comment="criu-libs-3.18-5.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045297" comment="crun-1.14.3-2.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045298" comment="fuse-overlayfs-1.13-1.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045299" comment="libslirp-4.4.0-2.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045300" comment="libslirp-devel-4.4.0-2.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045301" comment="netavark-1.10.3-1.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045302" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045303" comment="podman-4.9.4-28.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045304" comment="podman-catatonit-4.9.4-28.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045305" comment="podman-docker-4.9.4-28.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045306" comment="podman-gvproxy-4.9.4-28.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045307" comment="podman-plugins-4.9.4-28.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045308" comment="podman-remote-4.9.4-28.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045309" comment="podman-tests-4.9.4-28.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045310" comment="python3-criu-3.18-5.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045311" comment="python3-podman-4.9.0-3.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045312" comment="runc-1.2.9-3.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045313" comment="skopeo-1.14.5-6.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045314" comment="skopeo-tests-1.14.5-6.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045315" comment="slirp4netns-1.2.3-1.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045316" comment="toolbox-0.0.99.5.1-1.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045317" comment="toolbox-tests-0.0.99.5.1-1.module+el8.10.0+23963+b64d8032 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045318" comment="udica-0.2.6-21.module+el8.10.0+23963+b64d8032 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3489" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-23097" ref_url="https://www.suse.com/security/cve/CVE-2026-23097/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23097/">CVE-2026-23097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010046346" comment="bpftool-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046347" comment="kernel-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046348" comment="kernel-abi-stablelists-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046349" comment="kernel-core-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046350" comment="kernel-cross-headers-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046351" comment="kernel-debug-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046352" comment="kernel-debug-core-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046354" comment="kernel-debug-modules-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046355" comment="kernel-debug-modules-extra-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046357" comment="kernel-doc-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046358" comment="kernel-headers-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046359" comment="kernel-modules-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046360" comment="kernel-modules-extra-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046361" comment="kernel-tools-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046362" comment="kernel-tools-libs-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046364" comment="perf-4.18.0-553.109.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046365" comment="python3-perf-4.18.0-553.109.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3490" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<reference ref_id="CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757/" source="CVE"/>
		<reference ref_id="CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758/" source="CVE"/>
		<reference ref_id="CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759/" source="CVE"/>
		<reference ref_id="CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760/" source="CVE"/>
		<reference ref_id="CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761/" source="CVE"/>
		<reference ref_id="CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762/" source="CVE"/>
		<reference ref_id="CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763/" source="CVE"/>
		<reference ref_id="CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764/" source="CVE"/>
		<reference ref_id="CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765/" source="CVE"/>
		<reference ref_id="CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766/" source="CVE"/>
		<reference ref_id="CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767/" source="CVE"/>
		<reference ref_id="CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768/" source="CVE"/>
		<reference ref_id="CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769/" source="CVE"/>
		<reference ref_id="CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770/" source="CVE"/>
		<reference ref_id="CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771/" source="CVE"/>
		<reference ref_id="CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772/" source="CVE"/>
		<reference ref_id="CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773/" source="CVE"/>
		<reference ref_id="CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774/" source="CVE"/>
		<reference ref_id="CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775/" source="CVE"/>
		<reference ref_id="CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776/" source="CVE"/>
		<reference ref_id="CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777/" source="CVE"/>
		<reference ref_id="CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778/" source="CVE"/>
		<reference ref_id="CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779/" source="CVE"/>
		<reference ref_id="CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780/" source="CVE"/>
		<reference ref_id="CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781/" source="CVE"/>
		<reference ref_id="CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782/" source="CVE"/>
		<reference ref_id="CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783/" source="CVE"/>
		<reference ref_id="CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784/" source="CVE"/>
		<reference ref_id="CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785/" source="CVE"/>
		<reference ref_id="CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786/" source="CVE"/>
		<reference ref_id="CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787/" source="CVE"/>
		<reference ref_id="CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788/" source="CVE"/>
		<reference ref_id="CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789/" source="CVE"/>
		<reference ref_id="CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790/" source="CVE"/>
		<reference ref_id="CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791/" source="CVE"/>
		<reference ref_id="CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792/" source="CVE"/>
		<reference ref_id="CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3515.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3515.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010046386" comment="thunderbird-140.8.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3491" version="1" class="patch">
	<metadata>
		<title>security update for nfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-12801" ref_url="https://www.suse.com/security/cve/CVE-2025-12801/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3938.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3938.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12801/">CVE-2025-12801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12801">CVE-2025-12801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047518" comment="libnfsidmap-2.3.3-68.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047519" comment="libnfsidmap-devel-2.3.3-68.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047520" comment="nfs-utils-2.3.3-68.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3492" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085/" source="CVE"/>
		<reference ref_id="CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3963.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3963.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047807" comment="bpftool-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047808" comment="kernel-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047809" comment="kernel-abi-stablelists-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047810" comment="kernel-core-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047811" comment="kernel-cross-headers-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047812" comment="kernel-debug-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047813" comment="kernel-debug-core-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047814" comment="kernel-debug-modules-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047815" comment="kernel-debug-modules-extra-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047816" comment="kernel-doc-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047817" comment="kernel-headers-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047818" comment="kernel-modules-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047819" comment="kernel-modules-extra-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047820" comment="kernel-tools-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047821" comment="kernel-tools-libs-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047822" comment="perf-4.18.0-553.111.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047823" comment="python3-perf-4.18.0-553.111.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3493" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3967.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3967.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047824" comment="libvpx-1.7.0-13.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047825" comment="libvpx-devel-1.7.0-13.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3494" version="1" class="patch">
	<metadata>
		<title>security update for git-lfs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3985.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3985.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047826" comment="git-lfs-3.4.1-8.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3495" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020518" comment="pg_repack-1.4.6-3.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020519" comment="pgaudit-1.5.0-1.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020520" comment="postgres-decoderbufs-0.10.0-2.module+el8.9.0+20664+9c30cf7f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048068" comment="postgresql-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048069" comment="postgresql-contrib-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048070" comment="postgresql-docs-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048071" comment="postgresql-plperl-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048072" comment="postgresql-plpython3-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048073" comment="postgresql-pltcl-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048074" comment="postgresql-server-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048075" comment="postgresql-server-devel-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048076" comment="postgresql-static-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048077" comment="postgresql-test-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048078" comment="postgresql-test-rpm-macros-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048079" comment="postgresql-upgrade-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048080" comment="postgresql-upgrade-devel-13.23-2.module+el8.10.0+24039+b49622e4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3496" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850258" comment="pg_repack-1.4.8-1.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850259" comment="pgaudit-1.7.0-1.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850260" comment="postgres-decoderbufs-1.9.7-1.Final.module+el8.9.0+19797+c4ce5969 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048490" comment="postgresql-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048491" comment="postgresql-contrib-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048492" comment="postgresql-docs-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048493" comment="postgresql-plperl-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048494" comment="postgresql-plpython3-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048495" comment="postgresql-pltcl-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048496" comment="postgresql-private-devel-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048497" comment="postgresql-private-libs-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048498" comment="postgresql-server-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048499" comment="postgresql-server-devel-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048500" comment="postgresql-static-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048501" comment="postgresql-test-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048502" comment="postgresql-test-rpm-macros-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048503" comment="postgresql-upgrade-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048504" comment="postgresql-upgrade-devel-15.17-1.module+el8.10.0+24043+d28c3b3f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3497" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003/" source="CVE"/>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956875" comment="pg_repack-1.5.1-1.module+el8.10.0+22551+c0330dc9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881424" comment="pgaudit-16.0-1.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881425" comment="postgres-decoderbufs-2.4.0-1.Final.module+el8.10.0+20413+d8116364 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048081" comment="postgresql-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048082" comment="postgresql-contrib-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048083" comment="postgresql-docs-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048084" comment="postgresql-plperl-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048085" comment="postgresql-plpython3-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048086" comment="postgresql-pltcl-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048087" comment="postgresql-private-devel-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048088" comment="postgresql-private-libs-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048089" comment="postgresql-server-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048090" comment="postgresql-server-devel-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048091" comment="postgresql-static-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048092" comment="postgresql-test-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048093" comment="postgresql-test-rpm-macros-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048094" comment="postgresql-upgrade-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048095" comment="postgresql-upgrade-devel-16.13-1.module+el8.10.0+24044+3710dd58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3498" version="1" class="patch">
	<metadata>
		<title>security update for pg_repack (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004/" source="CVE"/>
		<reference ref_id="CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005/" source="CVE"/>
		<reference ref_id="CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4064.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4064.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048153" comment="pg_repack-1.4.6-3.module+el8.9.0+19330+c97ddbdf is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048154" comment="pgaudit-1.4.0-7.module+el8.10.0+22214+9beb89d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048155" comment="postgres-decoderbufs-0.10.0-2.module+el8.9.0+19330+c97ddbdf is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048156" comment="postgresql-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048157" comment="postgresql-contrib-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048158" comment="postgresql-docs-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048159" comment="postgresql-plperl-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048160" comment="postgresql-plpython3-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048161" comment="postgresql-pltcl-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048162" comment="postgresql-server-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048163" comment="postgresql-server-devel-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048164" comment="postgresql-static-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048165" comment="postgresql-test-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048166" comment="postgresql-test-rpm-macros-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048167" comment="postgresql-upgrade-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048168" comment="postgresql-upgrade-devel-12.22-6.module+el8.10.0+24045+2b30545f is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3499" version="1" class="patch">
	<metadata>
		<title>security update for python-pyasn1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4146.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4146.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047827" comment="python3-pyasn1-0.3.7-6.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047828" comment="python3-pyasn1-modules-0.3.7-6.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3500" version="1" class="patch">
	<metadata>
		<title>security update for mingw-libpng (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695/" source="CVE"/>
		<reference ref_id="CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801/" source="CVE"/>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4306.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4306.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048169" comment="mingw32-libpng-1.6.34-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048170" comment="mingw32-libpng-static-1.6.34-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048171" comment="mingw64-libpng-1.6.34-2.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048172" comment="mingw64-libpng-static-1.6.34-2.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3501" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-25749" ref_url="https://www.suse.com/security/cve/CVE-2026-25749/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4442.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4442.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" cvss4="5.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25749/">CVE-2026-25749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25749">CVE-2026-25749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048505" comment="vim-X11-8.0.1763-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048506" comment="vim-common-8.0.1763-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048507" comment="vim-enhanced-8.0.1763-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048508" comment="vim-filesystem-8.0.1763-22.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048509" comment="vim-minimal-8.0.1763-22.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3502" version="1" class="patch">
	<metadata>
		<title>security update for dotnet9.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-26127" ref_url="https://www.suse.com/security/cve/CVE-2026-26127/" source="CVE"/>
		<reference ref_id="CVE-2026-26130" ref_url="https://www.suse.com/security/cve/CVE-2026-26130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4443.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4443.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26127/">CVE-2026-26127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26127">CVE-2026-26127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26130/">CVE-2026-26130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26130">CVE-2026-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048877" comment="aspnetcore-runtime-9.0-9.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048878" comment="aspnetcore-runtime-dbg-9.0-9.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048879" comment="aspnetcore-targeting-pack-9.0-9.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048880" comment="dotnet-apphost-pack-9.0-9.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048881" comment="dotnet-hostfxr-9.0-9.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048882" comment="dotnet-runtime-9.0-9.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048883" comment="dotnet-runtime-dbg-9.0-9.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048884" comment="dotnet-sdk-9.0-9.0.115-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048885" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048886" comment="dotnet-sdk-aot-9.0-9.0.115-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048887" comment="dotnet-sdk-dbg-9.0-9.0.115-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048888" comment="dotnet-targeting-pack-9.0-9.0.14-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048889" comment="dotnet-templates-9.0-9.0.115-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048890" comment="netstandard-targeting-pack-2.1-9.0.115-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3503" version="1" class="patch">
	<metadata>
		<title>security update for dotnet8.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-26130" ref_url="https://www.suse.com/security/cve/CVE-2026-26130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4455.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4455.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26130/">CVE-2026-26130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26130">CVE-2026-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048891" comment="aspnetcore-runtime-8.0-8.0.25-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048892" comment="aspnetcore-runtime-dbg-8.0-8.0.25-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048893" comment="aspnetcore-targeting-pack-8.0-8.0.25-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048894" comment="dotnet-apphost-pack-8.0-8.0.25-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048895" comment="dotnet-hostfxr-8.0-8.0.25-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048896" comment="dotnet-runtime-8.0-8.0.25-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048897" comment="dotnet-runtime-dbg-8.0-8.0.25-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048898" comment="dotnet-sdk-8.0-8.0.125-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048899" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048900" comment="dotnet-sdk-dbg-8.0-8.0.125-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048901" comment="dotnet-targeting-pack-8.0-8.0.25-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048902" comment="dotnet-templates-8.0-8.0.125-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3504" version="1" class="patch">
	<metadata>
		<title>security update for dotnet10.0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-26127" ref_url="https://www.suse.com/security/cve/CVE-2026-26127/" source="CVE"/>
		<reference ref_id="CVE-2026-26130" ref_url="https://www.suse.com/security/cve/CVE-2026-26130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4458.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4458.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26127/">CVE-2026-26127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26127">CVE-2026-26127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26130/">CVE-2026-26130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26130">CVE-2026-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048903" comment="aspnetcore-runtime-10.0-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048904" comment="aspnetcore-runtime-dbg-10.0-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048905" comment="aspnetcore-targeting-pack-10.0-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048906" comment="dotnet-10.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048907" comment="dotnet-apphost-pack-10.0-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048908" comment="dotnet-host-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048909" comment="dotnet-hostfxr-10.0-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048910" comment="dotnet-runtime-10.0-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048911" comment="dotnet-runtime-dbg-10.0-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048912" comment="dotnet-sdk-10.0-10.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048913" comment="dotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048914" comment="dotnet-sdk-aot-10.0-10.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048915" comment="dotnet-sdk-dbg-10.0-10.0.104-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048916" comment="dotnet-targeting-pack-10.0-10.0.4-1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048917" comment="dotnet-templates-10.0-10.0.104-1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3505" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4463.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4463.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048510" comment="python3.12-3.12.12-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048511" comment="python3.12-debug-3.12.12-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048512" comment="python3.12-devel-3.12.12-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048513" comment="python3.12-idle-3.12.12-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048514" comment="python3.12-libs-3.12.12-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048515" comment="python3.12-rpm-macros-3.12.12-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048516" comment="python3.12-test-3.12.12-3.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048517" comment="python3.12-tkinter-3.12.12-3.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3506" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048918" comment="python3.11-3.11.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048919" comment="python3.11-debug-3.11.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048920" comment="python3.11-devel-3.11.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048921" comment="python3.11-idle-3.11.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048922" comment="python3.11-libs-3.11.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048923" comment="python3.11-rpm-macros-3.11.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048924" comment="python3.11-test-3.11.13-5.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048925" comment="python3.11-tkinter-3.11.13-5.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3507" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4648.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4648.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048982" comment="grub2-common-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048983" comment="grub2-efi-ia32-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048984" comment="grub2-efi-ia32-cdboot-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048985" comment="grub2-efi-ia32-modules-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048986" comment="grub2-efi-x64-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048987" comment="grub2-efi-x64-cdboot-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048988" comment="grub2-efi-x64-modules-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048989" comment="grub2-pc-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048990" comment="grub2-pc-modules-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048991" comment="grub2-tools-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048992" comment="grub2-tools-efi-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048993" comment="grub2-tools-extra-2.02-170.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048994" comment="grub2-tools-minimal-2.02-170.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3508" version="1" class="patch">
	<metadata>
		<title>security update for aardvark-dns (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726/" source="CVE"/>
		<reference ref_id="CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728/" source="CVE"/>
		<reference ref_id="CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4672.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4672.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010048995" comment="aardvark-dns-1.10.1-2.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048996" comment="buildah-1.33.14-3.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048997" comment="buildah-tests-1.33.14-3.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048998" comment="cockpit-podman-84.1-1.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010048999" comment="conmon-2.1.10-1.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049000" comment="container-selinux-2.229.0-2.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049001" comment="containernetworking-plugins-1.4.0-8.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049002" comment="containers-common-1-82.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049003" comment="crit-3.18-5.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049004" comment="criu-3.18-5.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049005" comment="criu-devel-3.18-5.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049006" comment="criu-libs-3.18-5.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049007" comment="crun-1.14.3-2.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049008" comment="fuse-overlayfs-1.13-1.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049009" comment="libslirp-4.4.0-2.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049010" comment="libslirp-devel-4.4.0-2.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049011" comment="netavark-1.10.3-1.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049012" comment="oci-seccomp-bpf-hook-1.2.10-1.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049013" comment="podman-4.9.4-30.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049014" comment="podman-catatonit-4.9.4-30.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049015" comment="podman-docker-4.9.4-30.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049016" comment="podman-gvproxy-4.9.4-30.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049017" comment="podman-plugins-4.9.4-30.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049018" comment="podman-remote-4.9.4-30.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049019" comment="podman-tests-4.9.4-30.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049020" comment="python3-criu-3.18-5.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049021" comment="python3-podman-4.9.0-3.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049022" comment="runc-1.2.9-4.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049023" comment="skopeo-1.14.5-7.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049024" comment="skopeo-tests-1.14.5-7.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049025" comment="slirp4netns-1.2.3-1.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049026" comment="toolbox-0.0.99.5.1-1.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049027" comment="toolbox-tests-0.0.99.5.1-1.module+el8.10.0+24081+a04d358a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049028" comment="udica-0.2.6-21.module+el8.10.0+24081+a04d358a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3509" version="1" class="patch">
	<metadata>
		<title>security update for libpng (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695/" source="CVE"/>
		<reference ref_id="CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801/" source="CVE"/>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4728.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4728.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049029" comment="libpng-1.6.34-10.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049030" comment="libpng-devel-1.6.34-10.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3510" version="1" class="patch">
	<metadata>
		<title>security update for glibc-all-langpacks-debuginfo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-15281" ref_url="https://www.suse.com/security/cve/CVE-2025-15281/" source="CVE"/>
		<reference ref_id="CVE-2026-0915" ref_url="https://www.suse.com/security/cve/CVE-2026-0915/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4772.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4772.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15281/">CVE-2025-15281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15281">CVE-2025-15281 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0915/">CVE-2026-0915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0915">CVE-2026-0915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049251" comment="glibc-langpack-aa-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049252" comment="glibc-langpack-af-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049253" comment="glibc-langpack-agr-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049254" comment="glibc-langpack-ak-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049255" comment="glibc-langpack-am-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049256" comment="glibc-langpack-an-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049257" comment="glibc-langpack-anp-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049258" comment="glibc-langpack-ast-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049259" comment="glibc-langpack-ayc-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049260" comment="glibc-langpack-az-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049261" comment="glibc-langpack-be-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049262" comment="glibc-langpack-bem-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049263" comment="glibc-langpack-ber-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049264" comment="glibc-langpack-bg-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049265" comment="glibc-langpack-bho-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049266" comment="glibc-langpack-bi-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049267" comment="glibc-langpack-bn-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049268" comment="glibc-langpack-bo-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049269" comment="glibc-langpack-brx-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049270" comment="glibc-langpack-bs-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049271" comment="glibc-langpack-ca-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049272" comment="glibc-langpack-cs-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049273" comment="glibc-langpack-csb-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049274" comment="glibc-langpack-cv-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049275" comment="glibc-langpack-cy-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049276" comment="glibc-langpack-de-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049277" comment="glibc-langpack-doi-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049278" comment="glibc-langpack-es-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049279" comment="glibc-langpack-et-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049280" comment="glibc-langpack-eu-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049281" comment="glibc-langpack-fi-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049282" comment="glibc-langpack-fil-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049283" comment="glibc-langpack-fo-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049284" comment="glibc-langpack-fr-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049285" comment="glibc-langpack-gez-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049286" comment="glibc-langpack-gl-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049287" comment="glibc-langpack-gu-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049288" comment="glibc-langpack-hak-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049289" comment="glibc-langpack-he-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049290" comment="glibc-langpack-ks-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049291" comment="glibc-langpack-ku-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049292" comment="glibc-langpack-kw-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049293" comment="glibc-langpack-lb-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049294" comment="glibc-langpack-lt-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049295" comment="glibc-langpack-lv-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049296" comment="glibc-langpack-mag-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049297" comment="glibc-langpack-mai-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049298" comment="glibc-langpack-mfe-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049299" comment="glibc-langpack-ps-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049300" comment="glibc-langpack-pt-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049301" comment="glibc-langpack-quz-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049302" comment="glibc-langpack-sat-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049303" comment="glibc-langpack-sc-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049304" comment="glibc-langpack-te-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049305" comment="glibc-langpack-tg-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049306" comment="glibc-langpack-ug-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049307" comment="glibc-langpack-uk-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049308" comment="glibc-langpack-ur-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049309" comment="glibc-langpack-uz-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049310" comment="glibc-langpack-ve-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049311" comment="glibc-langpack-vi-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049312" comment="glibc-langpack-wa-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049313" comment="glibc-locale-source-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049314" comment="glibc-minimal-langpack-2.28-251.el8_10.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049315" comment="glibc-utils-2.28-251.el8_10.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3511" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-0797" ref_url="https://www.suse.com/security/cve/CVE-2026-0797/" source="CVE"/>
		<reference ref_id="CVE-2026-2044" ref_url="https://www.suse.com/security/cve/CVE-2026-2044/" source="CVE"/>
		<reference ref_id="CVE-2026-2045" ref_url="https://www.suse.com/security/cve/CVE-2026-2045/" source="CVE"/>
		<reference ref_id="CVE-2026-2048" ref_url="https://www.suse.com/security/cve/CVE-2026-2048/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0797/">CVE-2026-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0797">CVE-2026-0797 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2044/">CVE-2026-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2044">CVE-2026-2044 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2045/">CVE-2026-2045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2045">CVE-2026-2045 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2048/">CVE-2026-2048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2048">CVE-2026-2048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010049628" comment="gimp-2.8.22-26.module+el8.10.0+24086+d017a7e0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049629" comment="gimp-devel-2.8.22-26.module+el8.10.0+24086+d017a7e0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049630" comment="gimp-devel-tools-2.8.22-26.module+el8.10.0+24086+d017a7e0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010049631" comment="gimp-libs-2.8.22-26.module+el8.10.0+24086+d017a7e0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962044" comment="pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962045" comment="pygobject2-codegen-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962046" comment="pygobject2-devel-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962047" comment="pygobject2-doc-2.28.7-5.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962048" comment="pygtk2-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962049" comment="pygtk2-codegen-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962050" comment="pygtk2-devel-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962051" comment="pygtk2-doc-2.24.0-25.module+el8.9.0+21228+8e80d31d is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962052" comment="python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962053" comment="python2-cairo-devel-1.16.3-7.module+el8.10.0+22676+becd68d6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3512" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14905" ref_url="https://www.suse.com/security/cve/CVE-2025-14905/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5513.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5513.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14905/">CVE-2025-14905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14905">CVE-2025-14905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050076" comment="389-ds-base-1.4.3.39-23.module+el8.10.0+24085+b368a310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050077" comment="389-ds-base-devel-1.4.3.39-23.module+el8.10.0+24085+b368a310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050078" comment="389-ds-base-legacy-tools-1.4.3.39-23.module+el8.10.0+24085+b368a310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050079" comment="389-ds-base-libs-1.4.3.39-23.module+el8.10.0+24085+b368a310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050080" comment="389-ds-base-snmp-1.4.3.39-23.module+el8.10.0+24085+b368a310 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050081" comment="python3-lib389-1.4.3.39-23.module+el8.10.0+24085+b368a310 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3513" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-21936" ref_url="https://www.suse.com/security/cve/CVE-2026-21936/" source="CVE"/>
		<reference ref_id="CVE-2026-21937" ref_url="https://www.suse.com/security/cve/CVE-2026-21937/" source="CVE"/>
		<reference ref_id="CVE-2026-21941" ref_url="https://www.suse.com/security/cve/CVE-2026-21941/" source="CVE"/>
		<reference ref_id="CVE-2026-21948" ref_url="https://www.suse.com/security/cve/CVE-2026-21948/" source="CVE"/>
		<reference ref_id="CVE-2026-21964" ref_url="https://www.suse.com/security/cve/CVE-2026-21964/" source="CVE"/>
		<reference ref_id="CVE-2026-21968" ref_url="https://www.suse.com/security/cve/CVE-2026-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5580.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5580.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21936/">CVE-2026-21936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21936">CVE-2026-21936 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21937/">CVE-2026-21937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21937">CVE-2026-21937 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21941/">CVE-2026-21941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21941">CVE-2026-21941 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21948/">CVE-2026-21948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21948">CVE-2026-21948 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21964/">CVE-2026-21964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21964">CVE-2026-21964 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21968/">CVE-2026-21968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21968">CVE-2026-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966641" comment="mecab-0.996-2.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966642" comment="mecab-devel-0.996-2.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966643" comment="mecab-ipadic-2.7.0.20070801-17.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966644" comment="mecab-ipadic-EUCJP-2.7.0.20070801-17.module+el8.10.0+22857+7f331edd is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050320" comment="mysql-8.0.45-1.module+el8.10.0+24016+b28eaa79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050321" comment="mysql-common-8.0.45-1.module+el8.10.0+24016+b28eaa79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050322" comment="mysql-devel-8.0.45-1.module+el8.10.0+24016+b28eaa79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050323" comment="mysql-errmsg-8.0.45-1.module+el8.10.0+24016+b28eaa79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050324" comment="mysql-libs-8.0.45-1.module+el8.10.0+24016+b28eaa79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050325" comment="mysql-server-8.0.45-1.module+el8.10.0+24016+b28eaa79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050326" comment="mysql-test-8.0.45-1.module+el8.10.0+24016+b28eaa79 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3514" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-1642" ref_url="https://www.suse.com/security/cve/CVE-2026-1642/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5581.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5581.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1642/">CVE-2026-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1642">CVE-2026-1642 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050082" comment="nginx-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050083" comment="nginx-all-modules-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050084" comment="nginx-filesystem-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050085" comment="nginx-mod-devel-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050086" comment="nginx-mod-http-image-filter-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050087" comment="nginx-mod-http-perl-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050088" comment="nginx-mod-http-xslt-filter-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050089" comment="nginx-mod-mail-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050090" comment="nginx-mod-stream-1.24.0-2.module+el8.10.0+24013+f603d2af is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3515" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-14831" ref_url="https://www.suse.com/security/cve/CVE-2025-14831/" source="CVE"/>
		<reference ref_id="CVE-2025-9820" ref_url="https://www.suse.com/security/cve/CVE-2025-9820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14831/">CVE-2025-14831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14831">CVE-2025-14831 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9820/">CVE-2025-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9820">CVE-2025-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050327" comment="gnutls-3.6.16-8.el8_10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050328" comment="gnutls-c++-3.6.16-8.el8_10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050329" comment="gnutls-dane-3.6.16-8.el8_10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050330" comment="gnutls-devel-3.6.16-8.el8_10.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050331" comment="gnutls-utils-3.6.16-8.el8_10.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3516" version="1" class="patch">
	<metadata>
		<title>security update for opencryptoki (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-23893" ref_url="https://www.suse.com/security/cve/CVE-2026-23893/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5587.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5587.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-23893/">CVE-2026-23893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23893">CVE-2026-23893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050091" comment="opencryptoki-3.22.0-3.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050092" comment="opencryptoki-devel-3.22.0-3.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050093" comment="opencryptoki-icsftok-3.22.0-3.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050094" comment="opencryptoki-libs-3.22.0-3.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050095" comment="opencryptoki-swtok-3.22.0-3.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050096" comment="opencryptoki-tpmtok-3.22.0-3.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3517" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5588.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5588.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050332" comment="platform-python-3.6.8-74.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050333" comment="platform-python-debug-3.6.8-74.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050334" comment="platform-python-devel-3.6.8-74.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050335" comment="python3-idle-3.6.8-74.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050336" comment="python3-libs-3.6.8-74.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050337" comment="python3-test-3.6.8-74.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050338" comment="python3-tkinter-3.6.8-74.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3518" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684/" source="CVE"/>
		<reference ref_id="CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685/" source="CVE"/>
		<reference ref_id="CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686/" source="CVE"/>
		<reference ref_id="CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687/" source="CVE"/>
		<reference ref_id="CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688/" source="CVE"/>
		<reference ref_id="CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689/" source="CVE"/>
		<reference ref_id="CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690/" source="CVE"/>
		<reference ref_id="CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691/" source="CVE"/>
		<reference ref_id="CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692/" source="CVE"/>
		<reference ref_id="CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693/" source="CVE"/>
		<reference ref_id="CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694/" source="CVE"/>
		<reference ref_id="CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695/" source="CVE"/>
		<reference ref_id="CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696/" source="CVE"/>
		<reference ref_id="CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697/" source="CVE"/>
		<reference ref_id="CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698/" source="CVE"/>
		<reference ref_id="CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699/" source="CVE"/>
		<reference ref_id="CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700/" source="CVE"/>
		<reference ref_id="CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701/" source="CVE"/>
		<reference ref_id="CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702/" source="CVE"/>
		<reference ref_id="CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704/" source="CVE"/>
		<reference ref_id="CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705/" source="CVE"/>
		<reference ref_id="CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706/" source="CVE"/>
		<reference ref_id="CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707/" source="CVE"/>
		<reference ref_id="CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708/" source="CVE"/>
		<reference ref_id="CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709/" source="CVE"/>
		<reference ref_id="CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710/" source="CVE"/>
		<reference ref_id="CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711/" source="CVE"/>
		<reference ref_id="CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712/" source="CVE"/>
		<reference ref_id="CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713/" source="CVE"/>
		<reference ref_id="CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714/" source="CVE"/>
		<reference ref_id="CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715/" source="CVE"/>
		<reference ref_id="CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716/" source="CVE"/>
		<reference ref_id="CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717/" source="CVE"/>
		<reference ref_id="CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718/" source="CVE"/>
		<reference ref_id="CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719/" source="CVE"/>
		<reference ref_id="CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720/" source="CVE"/>
		<reference ref_id="CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:5932.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:5932.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051546" comment="firefox-140.9.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3519" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-26955" ref_url="https://www.suse.com/security/cve/CVE-2026-26955/" source="CVE"/>
		<reference ref_id="CVE-2026-26965" ref_url="https://www.suse.com/security/cve/CVE-2026-26965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6005.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6005.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26955/">CVE-2026-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26955">CVE-2026-26955 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26965/">CVE-2026-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26965">CVE-2026-26965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052303" comment="freerdp-2.11.7-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052304" comment="freerdp-devel-2.11.7-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052305" comment="freerdp-libs-2.11.7-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052306" comment="libwinpr-2.11.7-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052307" comment="libwinpr-devel-2.11.7-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3520" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180/" source="CVE"/>
		<reference ref_id="CVE-2026-23204" ref_url="https://www.suse.com/security/cve/CVE-2026-23204/" source="CVE"/>
		<reference ref_id="CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6037.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6037.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23204/">CVE-2026-23204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23204">CVE-2026-23204 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052134" comment="bpftool-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052135" comment="kernel-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052136" comment="kernel-abi-stablelists-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052137" comment="kernel-core-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052138" comment="kernel-cross-headers-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052139" comment="kernel-debug-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052140" comment="kernel-debug-core-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052141" comment="kernel-debug-modules-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052142" comment="kernel-debug-modules-extra-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052143" comment="kernel-doc-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052144" comment="kernel-headers-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052145" comment="kernel-modules-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052146" comment="kernel-modules-extra-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052147" comment="kernel-tools-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052148" comment="kernel-tools-libs-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052149" comment="perf-4.18.0-553.115.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052150" comment="python3-perf-4.18.0-553.115.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3521" version="1" class="patch">
	<metadata>
		<title>security update for python3.11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052386" comment="python3.11-3.11.13-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052387" comment="python3.11-debug-3.11.13-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052388" comment="python3.11-devel-3.11.13-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052389" comment="python3.11-idle-3.11.13-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052390" comment="python3.11-libs-3.11.13-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052391" comment="python3.11-rpm-macros-3.11.13-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052392" comment="python3.11-test-3.11.13-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052393" comment="python3.11-tkinter-3.11.13-6.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3522" version="1" class="patch">
	<metadata>
		<title>security update for python3.12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6283.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6283.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052394" comment="python3.12-3.12.12-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052395" comment="python3.12-debug-3.12.12-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052396" comment="python3.12-devel-3.12.12-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052397" comment="python3.12-idle-3.12.12-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052398" comment="python3.12-libs-3.12.12-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052399" comment="python3.12-rpm-macros-3.12.12-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052400" comment="python3.12-test-3.12.12-4.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052401" comment="python3.12-tkinter-3.12.12-4.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3523" version="1" class="patch">
	<metadata>
		<title>security update for mecab (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-21936" ref_url="https://www.suse.com/security/cve/CVE-2026-21936/" source="CVE"/>
		<reference ref_id="CVE-2026-21937" ref_url="https://www.suse.com/security/cve/CVE-2026-21937/" source="CVE"/>
		<reference ref_id="CVE-2026-21941" ref_url="https://www.suse.com/security/cve/CVE-2026-21941/" source="CVE"/>
		<reference ref_id="CVE-2026-21948" ref_url="https://www.suse.com/security/cve/CVE-2026-21948/" source="CVE"/>
		<reference ref_id="CVE-2026-21964" ref_url="https://www.suse.com/security/cve/CVE-2026-21964/" source="CVE"/>
		<reference ref_id="CVE-2026-21968" ref_url="https://www.suse.com/security/cve/CVE-2026-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6391.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6391.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21936/">CVE-2026-21936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21936">CVE-2026-21936 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21937/">CVE-2026-21937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21937">CVE-2026-21937 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21941/">CVE-2026-21941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21941">CVE-2026-21941 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21948/">CVE-2026-21948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21948">CVE-2026-21948 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21964/">CVE-2026-21964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21964">CVE-2026-21964 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21968/">CVE-2026-21968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21968">CVE-2026-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033209" comment="mecab-0.996-2.module+el8.10.0+23550+bd321b9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033210" comment="mecab-devel-0.996-2.module+el8.10.0+23550+bd321b9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033211" comment="mecab-ipadic-2.7.0.20070801-17.module+el8.10.0+23550+bd321b9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033212" comment="mecab-ipadic-EUCJP-2.7.0.20070801-17.module+el8.10.0+23550+bd321b9a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052486" comment="mysql-8.4.8-1.module+el8.10.0+24007+c07a67f2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052487" comment="mysql-common-8.4.8-1.module+el8.10.0+24007+c07a67f2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052488" comment="mysql-devel-8.4.8-1.module+el8.10.0+24007+c07a67f2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052489" comment="mysql-errmsg-8.4.8-1.module+el8.10.0+24007+c07a67f2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052490" comment="mysql-libs-8.4.8-1.module+el8.10.0+24007+c07a67f2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052491" comment="mysql-server-8.4.8-1.module+el8.10.0+24007+c07a67f2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052492" comment="mysql-test-8.4.8-1.module+el8.10.0+24007+c07a67f2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052493" comment="mysql-test-data-8.4.8-1.module+el8.10.0+24007+c07a67f2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3524" version="1" class="patch">
	<metadata>
		<title>security update for Judy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2023-52969" ref_url="https://www.suse.com/security/cve/CVE-2023-52969/" source="CVE"/>
		<reference ref_id="CVE-2023-52970" ref_url="https://www.suse.com/security/cve/CVE-2023-52970/" source="CVE"/>
		<reference ref_id="CVE-2023-52971" ref_url="https://www.suse.com/security/cve/CVE-2023-52971/" source="CVE"/>
		<reference ref_id="CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490/" source="CVE"/>
		<reference ref_id="CVE-2025-30693" ref_url="https://www.suse.com/security/cve/CVE-2025-30693/" source="CVE"/>
		<reference ref_id="CVE-2025-30722" ref_url="https://www.suse.com/security/cve/CVE-2025-30722/" source="CVE"/>
		<reference ref_id="CVE-2026-21968" ref_url="https://www.suse.com/security/cve/CVE-2026-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6435.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6435.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52969/">CVE-2023-52969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52969">CVE-2023-52969 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52970/">CVE-2023-52970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52970">CVE-2023-52970 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52971/">CVE-2023-52971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52971">CVE-2023-52971 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-30693/">CVE-2025-30693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30693">CVE-2025-30693 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30722/">CVE-2025-30722 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30722">CVE-2025-30722 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21968/">CVE-2026-21968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21968">CVE-2026-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009962580" comment="Judy-1.0.5-18.module+el8.10.0+21221+7bee72c1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052883" comment="galera-26.4.23-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052884" comment="mariadb-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052885" comment="mariadb-backup-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052886" comment="mariadb-common-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052887" comment="mariadb-devel-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052888" comment="mariadb-embedded-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052889" comment="mariadb-embedded-devel-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052890" comment="mariadb-errmsg-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052891" comment="mariadb-gssapi-server-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052892" comment="mariadb-oqgraph-engine-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052893" comment="mariadb-pam-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052894" comment="mariadb-server-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052895" comment="mariadb-server-galera-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052896" comment="mariadb-server-utils-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052897" comment="mariadb-test-10.11.15-1.module+el8.10.0+24010+d874728a is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3525" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-10158" ref_url="https://www.suse.com/security/cve/CVE-2025-10158/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6436.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6436.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-10158/">CVE-2025-10158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10158">CVE-2025-10158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052766" comment="rsync-3.1.3-24.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052767" comment="rsync-daemon-3.1.3-24.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3526" version="1" class="patch">
	<metadata>
		<title>security update for libpng15 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6439.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6439.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052768" comment="libpng15-1.5.30-8.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3527" version="1" class="patch">
	<metadata>
		<title>security update for libpng12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6445.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6445.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052769" comment="libpng12-1.2.57-6.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3528" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-3497" ref_url="https://www.suse.com/security/cve/CVE-2026-3497/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6461.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6461.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3497/">CVE-2026-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3497">CVE-2026-3497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052898" comment="openssh-8.0p1-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052899" comment="openssh-askpass-8.0p1-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052900" comment="openssh-cavs-8.0p1-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052901" comment="openssh-clients-8.0p1-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052902" comment="openssh-keycat-8.0p1-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052903" comment="openssh-ldap-8.0p1-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052904" comment="openssh-server-8.0p1-28.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052905" comment="pam_ssh_agent_auth-0.10.3-7.28.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3529" version="1" class="patch">
	<metadata>
		<title>security update for perl-YAML-Syck (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-4177" ref_url="https://www.suse.com/security/cve/CVE-2026-4177/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6470.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6470.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4177/">CVE-2026-4177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4177">CVE-2026-4177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052770" comment="perl-YAML-Syck-1.30-6.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3530" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052771" comment="platform-python-3.6.8-75.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052772" comment="platform-python-debug-3.6.8-75.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052773" comment="platform-python-devel-3.6.8-75.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052774" comment="python3-idle-3.6.8-75.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052775" comment="python3-libs-3.6.8-75.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052776" comment="python3-test-3.6.8-75.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052777" comment="python3-tkinter-3.6.8-75.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3531" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2024-26984" ref_url="https://www.suse.com/security/cve/CVE-2024-26984/" source="CVE"/>
		<reference ref_id="CVE-2025-71238" ref_url="https://www.suse.com/security/cve/CVE-2025-71238/" source="CVE"/>
		<reference ref_id="CVE-2026-23193" ref_url="https://www.suse.com/security/cve/CVE-2026-23193/" source="CVE"/>
		<reference ref_id="CVE-2026-23231" ref_url="https://www.suse.com/security/cve/CVE-2026-23231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6571.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6571.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26984/">CVE-2024-26984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71238/">CVE-2025-71238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71238">CVE-2025-71238 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23193/">CVE-2026-23193 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23193">CVE-2026-23193 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23231/">CVE-2026-23231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23231">CVE-2026-23231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052855" comment="bpftool-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052856" comment="kernel-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052857" comment="kernel-abi-stablelists-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052858" comment="kernel-core-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052859" comment="kernel-cross-headers-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052860" comment="kernel-debug-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052861" comment="kernel-debug-core-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052862" comment="kernel-debug-modules-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052863" comment="kernel-debug-modules-extra-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052864" comment="kernel-doc-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052865" comment="kernel-headers-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052866" comment="kernel-modules-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052867" comment="kernel-modules-extra-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052868" comment="kernel-tools-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052869" comment="kernel-tools-libs-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052870" comment="perf-4.18.0-553.117.1.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052871" comment="python3-perf-4.18.0-553.117.1.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3532" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-2920" ref_url="https://www.suse.com/security/cve/CVE-2026-2920/" source="CVE"/>
		<reference ref_id="CVE-2026-2921" ref_url="https://www.suse.com/security/cve/CVE-2026-2921/" source="CVE"/>
		<reference ref_id="CVE-2026-2923" ref_url="https://www.suse.com/security/cve/CVE-2026-2923/" source="CVE"/>
		<reference ref_id="CVE-2026-3082" ref_url="https://www.suse.com/security/cve/CVE-2026-3082/" source="CVE"/>
		<reference ref_id="CVE-2026-3083" ref_url="https://www.suse.com/security/cve/CVE-2026-3083/" source="CVE"/>
		<reference ref_id="CVE-2026-3085" ref_url="https://www.suse.com/security/cve/CVE-2026-3085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6750.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6750.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2920/">CVE-2026-2920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2920">CVE-2026-2920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2921/">CVE-2026-2921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2921">CVE-2026-2921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2923/">CVE-2026-2923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2923">CVE-2026-2923 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3082/">CVE-2026-3082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3082">CVE-2026-3082 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3083/">CVE-2026-3083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3083">CVE-2026-3083 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3085/">CVE-2026-3085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3085">CVE-2026-3085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052906" comment="gstreamer1-plugins-bad-free-1.16.1-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052907" comment="gstreamer1-plugins-bad-free-devel-1.16.1-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052908" comment="gstreamer1-plugins-base-1.16.1-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052909" comment="gstreamer1-plugins-base-devel-1.16.1-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052910" comment="gstreamer1-plugins-good-1.16.1-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052911" comment="gstreamer1-plugins-good-gtk-1.16.1-6.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3533" version="1" class="patch">
	<metadata>
		<title>security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-27651" ref_url="https://www.suse.com/security/cve/CVE-2026-27651/" source="CVE"/>
		<reference ref_id="CVE-2026-27654" ref_url="https://www.suse.com/security/cve/CVE-2026-27654/" source="CVE"/>
		<reference ref_id="CVE-2026-27784" ref_url="https://www.suse.com/security/cve/CVE-2026-27784/" source="CVE"/>
		<reference ref_id="CVE-2026-32647" ref_url="https://www.suse.com/security/cve/CVE-2026-32647/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6907.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6907.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27651/">CVE-2026-27651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27651">CVE-2026-27651 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27654/">CVE-2026-27654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27654">CVE-2026-27654 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27784/">CVE-2026-27784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27784">CVE-2026-27784 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32647/">CVE-2026-32647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32647">CVE-2026-32647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053254" comment="nginx-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053255" comment="nginx-all-modules-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053256" comment="nginx-filesystem-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053257" comment="nginx-mod-devel-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053258" comment="nginx-mod-http-image-filter-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053259" comment="nginx-mod-http-perl-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053260" comment="nginx-mod-http-xslt-filter-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053261" comment="nginx-mod-mail-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053262" comment="nginx-mod-stream-1.24.0-3.module+el8.10.0+24155+8a5ade52 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3534" version="1" class="patch">
	<metadata>
		<title>security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-28417" ref_url="https://www.suse.com/security/cve/CVE-2026-28417/" source="CVE"/>
		<reference ref_id="CVE-2026-28421" ref_url="https://www.suse.com/security/cve/CVE-2026-28421/" source="CVE"/>
		<reference ref_id="CVE-2026-33412" ref_url="https://www.suse.com/security/cve/CVE-2026-33412/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6915.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6915.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28417/">CVE-2026-28417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28417">CVE-2026-28417 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28421/">CVE-2026-28421 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28421">CVE-2026-28421 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33412/">CVE-2026-33412 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33412">CVE-2026-33412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053085" comment="vim-X11-8.0.1763-22.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053086" comment="vim-common-8.0.1763-22.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053087" comment="vim-enhanced-8.0.1763-22.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053088" comment="vim-filesystem-8.0.1763-22.el8_10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053089" comment="vim-minimal-8.0.1763-22.el8_10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3535" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-3889" ref_url="https://www.suse.com/security/cve/CVE-2026-3889/" source="CVE"/>
		<reference ref_id="CVE-2026-4371" ref_url="https://www.suse.com/security/cve/CVE-2026-4371/" source="CVE"/>
		<reference ref_id="CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684/" source="CVE"/>
		<reference ref_id="CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685/" source="CVE"/>
		<reference ref_id="CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686/" source="CVE"/>
		<reference ref_id="CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687/" source="CVE"/>
		<reference ref_id="CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688/" source="CVE"/>
		<reference ref_id="CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689/" source="CVE"/>
		<reference ref_id="CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690/" source="CVE"/>
		<reference ref_id="CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691/" source="CVE"/>
		<reference ref_id="CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692/" source="CVE"/>
		<reference ref_id="CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693/" source="CVE"/>
		<reference ref_id="CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694/" source="CVE"/>
		<reference ref_id="CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695/" source="CVE"/>
		<reference ref_id="CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696/" source="CVE"/>
		<reference ref_id="CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697/" source="CVE"/>
		<reference ref_id="CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698/" source="CVE"/>
		<reference ref_id="CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699/" source="CVE"/>
		<reference ref_id="CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700/" source="CVE"/>
		<reference ref_id="CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701/" source="CVE"/>
		<reference ref_id="CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702/" source="CVE"/>
		<reference ref_id="CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704/" source="CVE"/>
		<reference ref_id="CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705/" source="CVE"/>
		<reference ref_id="CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706/" source="CVE"/>
		<reference ref_id="CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707/" source="CVE"/>
		<reference ref_id="CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708/" source="CVE"/>
		<reference ref_id="CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709/" source="CVE"/>
		<reference ref_id="CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710/" source="CVE"/>
		<reference ref_id="CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711/" source="CVE"/>
		<reference ref_id="CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712/" source="CVE"/>
		<reference ref_id="CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713/" source="CVE"/>
		<reference ref_id="CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714/" source="CVE"/>
		<reference ref_id="CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715/" source="CVE"/>
		<reference ref_id="CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716/" source="CVE"/>
		<reference ref_id="CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717/" source="CVE"/>
		<reference ref_id="CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718/" source="CVE"/>
		<reference ref_id="CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719/" source="CVE"/>
		<reference ref_id="CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720/" source="CVE"/>
		<reference ref_id="CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6917.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6917.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-3889/">CVE-2026-3889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3889">CVE-2026-3889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4371/">CVE-2026-4371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4371">CVE-2026-4371 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053090" comment="thunderbird-140.9.0-1.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3536" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-22852" ref_url="https://www.suse.com/security/cve/CVE-2026-22852/" source="CVE"/>
		<reference ref_id="CVE-2026-22854" ref_url="https://www.suse.com/security/cve/CVE-2026-22854/" source="CVE"/>
		<reference ref_id="CVE-2026-22856" ref_url="https://www.suse.com/security/cve/CVE-2026-22856/" source="CVE"/>
		<reference ref_id="CVE-2026-23732" ref_url="https://www.suse.com/security/cve/CVE-2026-23732/" source="CVE"/>
		<reference ref_id="CVE-2026-23948" ref_url="https://www.suse.com/security/cve/CVE-2026-23948/" source="CVE"/>
		<reference ref_id="CVE-2026-24491" ref_url="https://www.suse.com/security/cve/CVE-2026-24491/" source="CVE"/>
		<reference ref_id="CVE-2026-24675" ref_url="https://www.suse.com/security/cve/CVE-2026-24675/" source="CVE"/>
		<reference ref_id="CVE-2026-24676" ref_url="https://www.suse.com/security/cve/CVE-2026-24676/" source="CVE"/>
		<reference ref_id="CVE-2026-24679" ref_url="https://www.suse.com/security/cve/CVE-2026-24679/" source="CVE"/>
		<reference ref_id="CVE-2026-24681" ref_url="https://www.suse.com/security/cve/CVE-2026-24681/" source="CVE"/>
		<reference ref_id="CVE-2026-24683" ref_url="https://www.suse.com/security/cve/CVE-2026-24683/" source="CVE"/>
		<reference ref_id="CVE-2026-24684" ref_url="https://www.suse.com/security/cve/CVE-2026-24684/" source="CVE"/>
		<reference ref_id="CVE-2026-31806" ref_url="https://www.suse.com/security/cve/CVE-2026-31806/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6918.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6918.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22852/">CVE-2026-22852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22852">CVE-2026-22852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22854/">CVE-2026-22854 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22854">CVE-2026-22854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22856/">CVE-2026-22856 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22856">CVE-2026-22856 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23732/">CVE-2026-23732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23732">CVE-2026-23732 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23948/">CVE-2026-23948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23948">CVE-2026-23948 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24491/">CVE-2026-24491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24491">CVE-2026-24491 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24675/">CVE-2026-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24675">CVE-2026-24675 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24676/">CVE-2026-24676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24676">CVE-2026-24676 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24679/">CVE-2026-24679 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24679">CVE-2026-24679 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24681/">CVE-2026-24681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24681">CVE-2026-24681 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24683/">CVE-2026-24683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24683">CVE-2026-24683 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24684/">CVE-2026-24684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24684">CVE-2026-24684 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31806/">CVE-2026-31806 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31806">CVE-2026-31806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053263" comment="freerdp-2.11.7-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053264" comment="freerdp-devel-2.11.7-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053265" comment="freerdp-libs-2.11.7-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053266" comment="libwinpr-2.11.7-6.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053267" comment="libwinpr-devel-2.11.7-6.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3537" version="1" class="patch">
	<metadata>
		<title>security update for delve (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731/" source="CVE"/>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6949.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6949.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032452" comment="delve-1.25.2-1.module+el8.10.0+23746+9db33b5e is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053091" comment="go-toolset-1.25.8-1.module+el8.10.0+24168+9fd3a552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053092" comment="golang-1.25.8-1.module+el8.10.0+24168+9fd3a552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053093" comment="golang-bin-1.25.8-1.module+el8.10.0+24168+9fd3a552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053094" comment="golang-docs-1.25.8-1.module+el8.10.0+24168+9fd3a552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053095" comment="golang-misc-1.25.8-1.module+el8.10.0+24168+9fd3a552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053096" comment="golang-race-1.25.8-1.module+el8.10.0+24168+9fd3a552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053097" comment="golang-src-1.25.8-1.module+el8.10.0+24168+9fd3a552 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053098" comment="golang-tests-1.25.8-1.module+el8.10.0+24168+9fd3a552 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3538" version="1" class="patch">
	<metadata>
		<title>security update for grafana-pcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7009.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7009.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053268" comment="grafana-pcp-5.1.1-13.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3539" version="1" class="patch">
	<metadata>
		<title>security update for grafana (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053269" comment="grafana-9.2.10-29.el8_10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053270" comment="grafana-selinux-9.2.10-29.el8_10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3540" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-1525" ref_url="https://www.suse.com/security/cve/CVE-2026-1525/" source="CVE"/>
		<reference ref_id="CVE-2026-1526" ref_url="https://www.suse.com/security/cve/CVE-2026-1526/" source="CVE"/>
		<reference ref_id="CVE-2026-1528" ref_url="https://www.suse.com/security/cve/CVE-2026-1528/" source="CVE"/>
		<reference ref_id="CVE-2026-21710" ref_url="https://www.suse.com/security/cve/CVE-2026-21710/" source="CVE"/>
		<reference ref_id="CVE-2026-2229" ref_url="https://www.suse.com/security/cve/CVE-2026-2229/" source="CVE"/>
		<reference ref_id="CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547/" source="CVE"/>
		<reference ref_id="CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996/" source="CVE"/>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<reference ref_id="CVE-2026-27904" ref_url="https://www.suse.com/security/cve/CVE-2026-27904/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7123.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7123.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1525/">CVE-2026-1525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1525">CVE-2026-1525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1526/">CVE-2026-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1526">CVE-2026-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1528/">CVE-2026-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1528">CVE-2026-1528 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21710/">CVE-2026-21710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21710">CVE-2026-21710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2229/">CVE-2026-2229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2229">CVE-2026-2229 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27904/">CVE-2026-27904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27904">CVE-2026-27904 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053271" comment="nodejs-22.22.2-1.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053272" comment="nodejs-devel-22.22.2-1.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053273" comment="nodejs-docs-22.22.2-1.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053274" comment="nodejs-full-i18n-22.22.2-1.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053275" comment="nodejs-libs-22.22.2-1.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053276" comment="nodejs-nodemon-3.0.1-1.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053277" comment="nodejs-packaging-2021.06-6.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053278" comment="nodejs-packaging-bundler-2021.06-6.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053279" comment="npm-10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053280" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3541" version="1" class="patch">
	<metadata>
		<title>security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056372" comment="libnghttp2-1.33.0-6.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056373" comment="libnghttp2-devel-1.33.0-6.el8_10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056374" comment="nghttp2-1.33.0-6.el8_10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3542" version="1" class="patch">
	<metadata>
		<title>security update for nodejs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2026-1525" ref_url="https://www.suse.com/security/cve/CVE-2026-1525/" source="CVE"/>
		<reference ref_id="CVE-2026-1526" ref_url="https://www.suse.com/security/cve/CVE-2026-1526/" source="CVE"/>
		<reference ref_id="CVE-2026-1527" ref_url="https://www.suse.com/security/cve/CVE-2026-1527/" source="CVE"/>
		<reference ref_id="CVE-2026-1528" ref_url="https://www.suse.com/security/cve/CVE-2026-1528/" source="CVE"/>
		<reference ref_id="CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637/" source="CVE"/>
		<reference ref_id="CVE-2026-21710" ref_url="https://www.suse.com/security/cve/CVE-2026-21710/" source="CVE"/>
		<reference ref_id="CVE-2026-21711" ref_url="https://www.suse.com/security/cve/CVE-2026-21711/" source="CVE"/>
		<reference ref_id="CVE-2026-21712" ref_url="https://www.suse.com/security/cve/CVE-2026-21712/" source="CVE"/>
		<reference ref_id="CVE-2026-21713" ref_url="https://www.suse.com/security/cve/CVE-2026-21713/" source="CVE"/>
		<reference ref_id="CVE-2026-21714" ref_url="https://www.suse.com/security/cve/CVE-2026-21714/" source="CVE"/>
		<reference ref_id="CVE-2026-21715" ref_url="https://www.suse.com/security/cve/CVE-2026-21715/" source="CVE"/>
		<reference ref_id="CVE-2026-21716" ref_url="https://www.suse.com/security/cve/CVE-2026-21716/" source="CVE"/>
		<reference ref_id="CVE-2026-21717" ref_url="https://www.suse.com/security/cve/CVE-2026-21717/" source="CVE"/>
		<reference ref_id="CVE-2026-2229" ref_url="https://www.suse.com/security/cve/CVE-2026-2229/" source="CVE"/>
		<reference ref_id="CVE-2026-2581" ref_url="https://www.suse.com/security/cve/CVE-2026-2581/" source="CVE"/>
		<reference ref_id="CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996/" source="CVE"/>
		<reference ref_id="CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7670.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7670.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1525/">CVE-2026-1525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1525">CVE-2026-1525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1526/">CVE-2026-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1526">CVE-2026-1526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1527/">CVE-2026-1527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1527">CVE-2026-1527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1528/">CVE-2026-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1528">CVE-2026-1528 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21710/">CVE-2026-21710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21710">CVE-2026-21710 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21711/">CVE-2026-21711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21711">CVE-2026-21711 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21712/">CVE-2026-21712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21712">CVE-2026-21712 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21713/">CVE-2026-21713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21713">CVE-2026-21713 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21714/">CVE-2026-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21714">CVE-2026-21714 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21715/">CVE-2026-21715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21715">CVE-2026-21715 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21716/">CVE-2026-21716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21716">CVE-2026-21716 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21717/">CVE-2026-21717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21717">CVE-2026-21717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2229/">CVE-2026-2229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2229">CVE-2026-2229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2581/">CVE-2026-2581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2581">CVE-2026-2581 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010056587" comment="nodejs-24.14.1-2.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056588" comment="nodejs-devel-24.14.1-2.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056589" comment="nodejs-docs-24.14.1-2.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056590" comment="nodejs-full-i18n-24.14.1-2.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056591" comment="nodejs-libs-24.14.1-2.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056592" comment="nodejs-nodemon-3.0.3-1.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056593" comment="nodejs-packaging-2021.06-6.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056594" comment="nodejs-packaging-bundler-2021.06-6.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056595" comment="npm-11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056596" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3543" version="1" class="patch">
	<metadata>
		<title>security update for fontforge (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2025-15269" ref_url="https://www.suse.com/security/cve/CVE-2025-15269/" source="CVE"/>
		<reference ref_id="CVE-2025-15270" ref_url="https://www.suse.com/security/cve/CVE-2025-15270/" source="CVE"/>
		<reference ref_id="CVE-2025-15275" ref_url="https://www.suse.com/security/cve/CVE-2025-15275/" source="CVE"/>
		<reference ref_id="CVE-2025-15279" ref_url="https://www.suse.com/security/cve/CVE-2025-15279/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7677.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7677.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15269/">CVE-2025-15269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15269">CVE-2025-15269 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15270/">CVE-2025-15270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15270">CVE-2025-15270 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15275/">CVE-2025-15275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15275">CVE-2025-15275 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15279/">CVE-2025-15279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15279">CVE-2025-15279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056597" comment="fontforge-20200314-7.el8_10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3544" version="1" class="patch">
	<metadata>
		<title>security update for perl-XML-Parser (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 8</platform>
		</affected>
		<reference ref_id="CVE-2006-10002" ref_url="https://www.suse.com/security/cve/CVE-2006-10002/" source="CVE"/>
		<reference ref_id="CVE-2006-10003" ref_url="https://www.suse.com/security/cve/CVE-2006-10003/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:7681.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:7681.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10002/">CVE-2006-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10002">CVE-2006-10002 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10003/">CVE-2006-10003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10003">CVE-2006-10003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:8</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009830577" comment="SUSE Liberty Linux 8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010056375" comment="perl-XML-Parser-2.44-12.el8_10 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960787" version="1" comment="shim-ia32 is &lt;15.8-4.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960788" version="1" comment="shim-x64 is &lt;15.8-4.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830577" version="1" comment="sles_es-release-server is &gt;=8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831245" version="1" comment="hivex is &lt;1.3.18-23.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831246" version="1" comment="hivex-devel is &lt;1.3.18-23.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831247" version="1" comment="libguestfs is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831248" version="1" comment="libguestfs-appliance is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831249" version="1" comment="libguestfs-bash-completion is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831250" version="1" comment="libguestfs-devel is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831251" version="1" comment="libguestfs-gfs2 is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831252" version="1" comment="libguestfs-gobject is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831253" version="1" comment="libguestfs-gobject-devel is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831254" version="1" comment="libguestfs-inspect-icons is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831255" version="1" comment="libguestfs-java is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831256" version="1" comment="libguestfs-java-devel is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831257" version="1" comment="libguestfs-javadoc is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831258" version="1" comment="libguestfs-man-pages-ja is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831259" version="1" comment="libguestfs-man-pages-uk is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831260" version="1" comment="libguestfs-rescue is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831261" version="1" comment="libguestfs-rsync is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831262" version="1" comment="libguestfs-tools is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831263" version="1" comment="libguestfs-tools-c is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831264" version="1" comment="libguestfs-winsupport is &lt;8.6-1.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831265" version="1" comment="libguestfs-xfs is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831266" version="1" comment="libiscsi is &lt;1.18.0-8.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831267" version="1" comment="libiscsi-devel is &lt;1.18.0-8.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831268" version="1" comment="libiscsi-utils is &lt;1.18.0-8.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831269" version="1" comment="libnbd is &lt;1.6.0-5.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831270" version="1" comment="libnbd-bash-completion is &lt;1.6.0-5.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831271" version="1" comment="libnbd-devel is &lt;1.6.0-5.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831272" version="1" comment="libtpms is &lt;0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831273" version="1" comment="libtpms-devel is &lt;0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843885" version="1" comment="libvirt is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843886" version="1" comment="libvirt-client is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843887" version="1" comment="libvirt-daemon is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843888" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843889" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843890" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843891" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843892" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843893" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843894" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843895" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843896" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843897" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843898" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843899" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843900" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843901" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843902" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843903" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843904" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843905" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843906" version="1" comment="libvirt-daemon-kvm is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831296" version="1" comment="libvirt-dbus is &lt;1.3.0-2.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843907" version="1" comment="libvirt-devel is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843908" version="1" comment="libvirt-docs is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843909" version="1" comment="libvirt-libs is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843910" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843911" version="1" comment="libvirt-nss is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843912" version="1" comment="libvirt-wireshark is &lt;8.0.0-10.1.module+el8.7.0+17192+cbc2449b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831303" version="1" comment="lua-guestfs is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831304" version="1" comment="nbdfuse is &lt;1.6.0-5.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831305" version="1" comment="nbdkit is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831306" version="1" comment="nbdkit-bash-completion is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831307" version="1" comment="nbdkit-basic-filters is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831308" version="1" comment="nbdkit-basic-plugins is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831309" version="1" comment="nbdkit-curl-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831310" version="1" comment="nbdkit-devel is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831311" version="1" comment="nbdkit-example-plugins is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831312" version="1" comment="nbdkit-gzip-filter is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831313" version="1" comment="nbdkit-gzip-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831314" version="1" comment="nbdkit-linuxdisk-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831315" version="1" comment="nbdkit-nbd-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831316" version="1" comment="nbdkit-python-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831317" version="1" comment="nbdkit-server is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831318" version="1" comment="nbdkit-ssh-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831319" version="1" comment="nbdkit-tar-filter is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831320" version="1" comment="nbdkit-tar-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831321" version="1" comment="nbdkit-tmpdisk-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831322" version="1" comment="nbdkit-vddk-plugin is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831323" version="1" comment="nbdkit-xz-filter is &lt;1.24.0-4.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831324" version="1" comment="netcf is &lt;0.2.8-12.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831325" version="1" comment="netcf-devel is &lt;0.2.8-12.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831326" version="1" comment="netcf-libs is &lt;0.2.8-12.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831327" version="1" comment="perl-Sys-Guestfs is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831328" version="1" comment="perl-Sys-Virt is &lt;8.0.0-1.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831329" version="1" comment="perl-hivex is &lt;1.3.18-23.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831330" version="1" comment="python3-hivex is &lt;1.3.18-23.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831331" version="1" comment="python3-libguestfs is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831332" version="1" comment="python3-libnbd is &lt;1.6.0-5.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831333" version="1" comment="python3-libvirt is &lt;8.0.0-2.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843913" version="1" comment="qemu-guest-agent is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843914" version="1" comment="qemu-img is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843915" version="1" comment="qemu-kvm is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843916" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843917" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843918" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843919" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843920" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843921" version="1" comment="qemu-kvm-common is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843922" version="1" comment="qemu-kvm-core is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843923" version="1" comment="qemu-kvm-docs is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843924" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843925" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843926" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-21.module+el8.7.0+17573+effbd7e8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831348" version="1" comment="ruby-hivex is &lt;1.3.18-23.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831349" version="1" comment="ruby-libguestfs is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831350" version="1" comment="seabios is &lt;1.16.0-3.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831351" version="1" comment="seabios-bin is &lt;1.16.0-3.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831352" version="1" comment="seavgabios-bin is &lt;1.16.0-3.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831353" version="1" comment="sgabios is &lt;0.20170427git-3.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831354" version="1" comment="sgabios-bin is &lt;0.20170427git-3.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831355" version="1" comment="supermin is &lt;5.2.1-2.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831356" version="1" comment="supermin-devel is &lt;5.2.1-2.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831357" version="1" comment="swtpm is &lt;0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831358" version="1" comment="swtpm-devel is &lt;0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831359" version="1" comment="swtpm-libs is &lt;0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831360" version="1" comment="swtpm-tools is &lt;0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831361" version="1" comment="swtpm-tools-pkcs11 is &lt;0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831362" version="1" comment="virt-dib is &lt;1.44.0-9.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831363" version="1" comment="virt-v2v is &lt;1.42.0-21.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831364" version="1" comment="virt-v2v-bash-completion is &lt;1.42.0-21.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831365" version="1" comment="virt-v2v-man-pages-ja is &lt;1.42.0-21.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831366" version="1" comment="virt-v2v-man-pages-uk is &lt;1.42.0-21.module+el8.7.0+16689+53d59bc2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843872" version="1" comment="grub2-common is &lt;2.02-142.el8_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843873" version="1" comment="grub2-efi-ia32 is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843874" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843875" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-142.el8_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843876" version="1" comment="grub2-efi-x64 is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843877" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843878" version="1" comment="grub2-efi-x64-modules is &lt;2.02-142.el8_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843879" version="1" comment="grub2-pc is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843880" version="1" comment="grub2-pc-modules is &lt;2.02-142.el8_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843881" version="1" comment="grub2-tools is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843882" version="1" comment="grub2-tools-efi is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843883" version="1" comment="grub2-tools-extra is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843884" version="1" comment="grub2-tools-minimal is &lt;2.02-142.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831413" version="1" comment="hivex is &lt;1.3.18-23.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831414" version="1" comment="hivex-devel is &lt;1.3.18-23.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831415" version="1" comment="libguestfs is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831416" version="1" comment="libguestfs-appliance is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831417" version="1" comment="libguestfs-bash-completion is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831418" version="1" comment="libguestfs-devel is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831419" version="1" comment="libguestfs-gfs2 is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831420" version="1" comment="libguestfs-gobject is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831421" version="1" comment="libguestfs-gobject-devel is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831422" version="1" comment="libguestfs-inspect-icons is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831423" version="1" comment="libguestfs-java is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831424" version="1" comment="libguestfs-java-devel is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831425" version="1" comment="libguestfs-javadoc is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831426" version="1" comment="libguestfs-man-pages-ja is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831427" version="1" comment="libguestfs-man-pages-uk is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831428" version="1" comment="libguestfs-rescue is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831429" version="1" comment="libguestfs-rsync is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831430" version="1" comment="libguestfs-tools is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831431" version="1" comment="libguestfs-tools-c is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843820" version="1" comment="libguestfs-winsupport is &lt;8.8-1.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831433" version="1" comment="libguestfs-xfs is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831434" version="1" comment="libiscsi is &lt;1.18.0-8.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831435" version="1" comment="libiscsi-devel is &lt;1.18.0-8.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831436" version="1" comment="libiscsi-utils is &lt;1.18.0-8.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831437" version="1" comment="libnbd is &lt;1.6.0-5.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831438" version="1" comment="libnbd-bash-completion is &lt;1.6.0-5.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831439" version="1" comment="libnbd-devel is &lt;1.6.0-5.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843821" version="1" comment="libtpms is &lt;0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843822" version="1" comment="libtpms-devel is &lt;0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843823" version="1" comment="libvirt is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843824" version="1" comment="libvirt-client is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843825" version="1" comment="libvirt-daemon is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843826" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843827" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843828" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843829" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843830" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843831" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843832" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843833" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843834" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843835" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843836" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843837" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843838" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843839" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843840" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843841" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843842" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843843" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843844" version="1" comment="libvirt-daemon-kvm is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831464" version="1" comment="libvirt-dbus is &lt;1.3.0-2.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843845" version="1" comment="libvirt-devel is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843846" version="1" comment="libvirt-docs is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843847" version="1" comment="libvirt-libs is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843848" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843849" version="1" comment="libvirt-nss is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843850" version="1" comment="libvirt-wireshark is &lt;8.0.0-19.module+el8.8.0+18453+e0bf0d1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831471" version="1" comment="lua-guestfs is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831472" version="1" comment="nbdfuse is &lt;1.6.0-5.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831473" version="1" comment="nbdkit is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831474" version="1" comment="nbdkit-bash-completion is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831475" version="1" comment="nbdkit-basic-filters is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831476" version="1" comment="nbdkit-basic-plugins is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831477" version="1" comment="nbdkit-curl-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831478" version="1" comment="nbdkit-devel is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831479" version="1" comment="nbdkit-example-plugins is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831480" version="1" comment="nbdkit-gzip-filter is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831481" version="1" comment="nbdkit-gzip-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831482" version="1" comment="nbdkit-linuxdisk-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831483" version="1" comment="nbdkit-nbd-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831484" version="1" comment="nbdkit-python-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831485" version="1" comment="nbdkit-server is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831486" version="1" comment="nbdkit-ssh-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831487" version="1" comment="nbdkit-tar-filter is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831488" version="1" comment="nbdkit-tar-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831489" version="1" comment="nbdkit-tmpdisk-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831490" version="1" comment="nbdkit-vddk-plugin is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831491" version="1" comment="nbdkit-xz-filter is &lt;1.24.0-5.module+el8.8.0+17308+05924798 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831492" version="1" comment="netcf is &lt;0.2.8-12.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831493" version="1" comment="netcf-devel is &lt;0.2.8-12.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831494" version="1" comment="netcf-libs is &lt;0.2.8-12.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831495" version="1" comment="perl-Sys-Guestfs is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831496" version="1" comment="perl-Sys-Virt is &lt;8.0.0-1.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831497" version="1" comment="perl-hivex is &lt;1.3.18-23.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831498" version="1" comment="python3-hivex is &lt;1.3.18-23.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831499" version="1" comment="python3-libguestfs is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831500" version="1" comment="python3-libnbd is &lt;1.6.0-5.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831501" version="1" comment="python3-libvirt is &lt;8.0.0-2.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843851" version="1" comment="qemu-guest-agent is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843852" version="1" comment="qemu-img is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843853" version="1" comment="qemu-kvm is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843854" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843855" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843856" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843857" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843858" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843859" version="1" comment="qemu-kvm-common is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843860" version="1" comment="qemu-kvm-core is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843861" version="1" comment="qemu-kvm-docs is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843862" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843863" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843864" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-32.module+el8.8.0+18361+9f407f6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831516" version="1" comment="ruby-hivex is &lt;1.3.18-23.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831517" version="1" comment="ruby-libguestfs is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843865" version="1" comment="seabios is &lt;1.16.0-3.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843866" version="1" comment="seabios-bin is &lt;1.16.0-3.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843867" version="1" comment="seavgabios-bin is &lt;1.16.0-3.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831521" version="1" comment="sgabios is &lt;0.20170427git-3.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831522" version="1" comment="sgabios-bin is &lt;0.20170427git-3.module+el8.8.0+16781+9f4724c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831523" version="1" comment="supermin is &lt;5.2.1-2.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831524" version="1" comment="supermin-devel is &lt;5.2.1-2.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831525" version="1" comment="swtpm is &lt;0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831526" version="1" comment="swtpm-devel is &lt;0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831527" version="1" comment="swtpm-libs is &lt;0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831528" version="1" comment="swtpm-tools is &lt;0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831529" version="1" comment="swtpm-tools-pkcs11 is &lt;0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831530" version="1" comment="virt-dib is &lt;1.44.0-9.module+el8.8.0+16781+9f4724c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843868" version="1" comment="virt-v2v is &lt;1.42.0-22.module+el8.8.0+18611+5846c3aa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843869" version="1" comment="virt-v2v-bash-completion is &lt;1.42.0-22.module+el8.8.0+18611+5846c3aa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843870" version="1" comment="virt-v2v-man-pages-ja is &lt;1.42.0-22.module+el8.8.0+18611+5846c3aa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843871" version="1" comment="virt-v2v-man-pages-uk is &lt;1.42.0-22.module+el8.8.0+18611+5846c3aa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830564" version="1" comment="grub2-common is &lt;2.02-86.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830565" version="1" comment="grub2-efi-ia32 is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830566" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830567" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-86.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830568" version="1" comment="grub2-efi-x64 is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830569" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830570" version="1" comment="grub2-efi-x64-modules is &lt;2.02-86.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830571" version="1" comment="grub2-pc is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830572" version="1" comment="grub2-pc-modules is &lt;2.02-86.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830573" version="1" comment="grub2-tools is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830574" version="1" comment="grub2-tools-efi is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830575" version="1" comment="grub2-tools-extra is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830576" version="1" comment="grub2-tools-minimal is &lt;2.02-86.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830578" version="1" comment="fwupd is &lt;1.1.4-6.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830579" version="1" comment="fwupd-devel is &lt;1.1.4-6.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830580" version="1" comment="fwupd-tests is &lt;1.1.4-6.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830581" version="1" comment="grub2-common is &lt;2.02-87.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830582" version="1" comment="grub2-efi-ia32 is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830583" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830584" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-87.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830585" version="1" comment="grub2-efi-x64 is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830586" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830587" version="1" comment="grub2-efi-x64-modules is &lt;2.02-87.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830588" version="1" comment="grub2-pc is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830589" version="1" comment="grub2-pc-modules is &lt;2.02-87.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830590" version="1" comment="grub2-tools is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830591" version="1" comment="grub2-tools-efi is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830592" version="1" comment="grub2-tools-extra is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830593" version="1" comment="grub2-tools-minimal is &lt;2.02-87.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830594" version="1" comment="appstream-data is &lt;8-20200724.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830595" version="1" comment="gnome-software is &lt;3.36.1-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830596" version="1" comment="fwupd is &lt;1.4.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830597" version="1" comment="bogofilter is &lt;1.2.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830598" version="1" comment="evolution is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830599" version="1" comment="evolution-bogofilter is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830600" version="1" comment="evolution-data-server is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830601" version="1" comment="evolution-data-server-devel is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830602" version="1" comment="evolution-data-server-langpacks is &lt;3.28.5-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830603" version="1" comment="evolution-help is &lt;3.28.5-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830604" version="1" comment="evolution-langpacks is &lt;3.28.5-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830605" version="1" comment="evolution-mapi is &lt;3.28.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830606" version="1" comment="evolution-mapi-langpacks is &lt;3.28.3-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830607" version="1" comment="evolution-pst is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830608" version="1" comment="evolution-spamassassin is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830609" version="1" comment="openchange is &lt;2.3-26.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830610" version="1" comment="evolution-data-server-doc is &lt;3.28.5-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830611" version="1" comment="evolution-data-server-perl is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830612" version="1" comment="evolution-data-server-tests is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830613" version="1" comment="evolution-devel is &lt;3.28.5-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830614" version="1" comment="LibRaw is &lt;0.19.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830615" version="1" comment="LibRaw-samples is &lt;0.19.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830616" version="1" comment="LibRaw-static is &lt;0.19.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830617" version="1" comment="PackageKit is &lt;1.1.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830618" version="1" comment="PackageKit-command-not-found is &lt;1.1.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830619" version="1" comment="PackageKit-cron is &lt;1.1.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830620" version="1" comment="PackageKit-glib is &lt;1.1.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830621" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830622" version="1" comment="PackageKit-gtk3-module is &lt;1.1.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830623" version="1" comment="dleyna-renderer is &lt;0.6.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830624" version="1" comment="dleyna-renderer-devel is &lt;0.6.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830625" version="1" comment="frei0r-plugins is &lt;1.6.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830626" version="1" comment="frei0r-plugins-opencv is &lt;1.6.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830627" version="1" comment="gdm is &lt;3.28.3-34.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830628" version="1" comment="gdm-devel is &lt;3.28.3-34.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830629" version="1" comment="gdm-pam-extensions-devel is &lt;3.28.3-34.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830630" version="1" comment="gnome-classic-session is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830631" version="1" comment="gnome-control-center is &lt;3.28.2-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830632" version="1" comment="gnome-control-center-filesystem is &lt;3.28.2-22.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830633" version="1" comment="gnome-photos is &lt;3.28.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830634" version="1" comment="gnome-photos-tests is &lt;3.28.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830635" version="1" comment="gnome-remote-desktop is &lt;0.1.8-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830636" version="1" comment="gnome-session is &lt;3.28.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830637" version="1" comment="gnome-session-kiosk-session is &lt;3.28.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830638" version="1" comment="gnome-session-wayland-session is &lt;3.28.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830639" version="1" comment="gnome-session-xsession is &lt;3.28.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830640" version="1" comment="gnome-settings-daemon is &lt;3.32.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830641" version="1" comment="gnome-settings-daemon-devel is &lt;3.32.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830642" version="1" comment="gnome-shell is &lt;3.32.2-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830643" version="1" comment="gnome-shell-extension-apps-menu is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830644" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830645" version="1" comment="gnome-shell-extension-common is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830646" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830647" version="1" comment="gnome-shell-extension-desktop-icons is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830648" version="1" comment="gnome-shell-extension-disable-screenshield is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830649" version="1" comment="gnome-shell-extension-drive-menu is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830650" version="1" comment="gnome-shell-extension-horizontal-workspaces is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830651" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830652" version="1" comment="gnome-shell-extension-native-window-placement is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830653" version="1" comment="gnome-shell-extension-no-hot-corner is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830654" version="1" comment="gnome-shell-extension-panel-favorites is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830655" version="1" comment="gnome-shell-extension-places-menu is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830656" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830657" version="1" comment="gnome-shell-extension-systemMonitor is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830658" version="1" comment="gnome-shell-extension-top-icons is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830659" version="1" comment="gnome-shell-extension-updates-dialog is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830660" version="1" comment="gnome-shell-extension-user-theme is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830661" version="1" comment="gnome-shell-extension-window-grouper is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830662" version="1" comment="gnome-shell-extension-window-list is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830663" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830664" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;3.32.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830665" version="1" comment="gnome-terminal is &lt;3.28.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830666" version="1" comment="gnome-terminal-nautilus is &lt;3.28.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830667" version="1" comment="gsettings-desktop-schemas is &lt;3.32.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830668" version="1" comment="gsettings-desktop-schemas-devel is &lt;3.32.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830669" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830670" version="1" comment="gtk3 is &lt;3.22.30-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830671" version="1" comment="gtk3-devel is &lt;3.22.30-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830672" version="1" comment="gtk3-devel-docs is &lt;3.22.30-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830673" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830674" version="1" comment="gtk3-immodules is &lt;3.22.30-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830675" version="1" comment="gtk3-tests is &lt;3.22.30-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830676" version="1" comment="gvfs is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830677" version="1" comment="gvfs-afc is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830678" version="1" comment="gvfs-afp is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830679" version="1" comment="gvfs-archive is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830680" version="1" comment="gvfs-client is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830681" version="1" comment="gvfs-devel is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830682" version="1" comment="gvfs-fuse is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830683" version="1" comment="gvfs-goa is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830684" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830685" version="1" comment="gvfs-mtp is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830686" version="1" comment="gvfs-smb is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830687" version="1" comment="gvfs-tests is &lt;1.36.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830688" version="1" comment="mutter is &lt;3.32.2-48.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830689" version="1" comment="mutter-tests is &lt;3.32.2-48.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830690" version="1" comment="nautilus is &lt;3.28.1-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830691" version="1" comment="nautilus-extensions is &lt;3.28.1-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830692" version="1" comment="pipewire is &lt;0.3.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830693" version="1" comment="pipewire-alsa is &lt;0.3.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830694" version="1" comment="pipewire-devel is &lt;0.3.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830695" version="1" comment="pipewire-doc is &lt;0.3.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830696" version="1" comment="pipewire-gstreamer is &lt;0.3.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830697" version="1" comment="pipewire-libs is &lt;0.3.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830698" version="1" comment="pipewire-utils is &lt;0.3.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830699" version="1" comment="pipewire0.2-devel is &lt;0.2.7-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830700" version="1" comment="pipewire0.2-libs is &lt;0.2.7-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830701" version="1" comment="potrace is &lt;1.15-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830702" version="1" comment="potrace-devel is &lt;1.15-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830703" version="1" comment="potrace-doc is &lt;1.15-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830704" version="1" comment="tracker is &lt;2.1.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830705" version="1" comment="tracker-devel is &lt;2.1.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830706" version="1" comment="tracker-docs is &lt;2.1.5-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830707" version="1" comment="vte-profile is &lt;0.52.4-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830708" version="1" comment="vte291 is &lt;0.52.4-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830709" version="1" comment="webkit2gtk3 is &lt;2.28.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830710" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830711" version="1" comment="webkit2gtk3-doc is &lt;2.28.4-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830712" version="1" comment="webkit2gtk3-jsc is &lt;2.28.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830713" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.28.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830714" version="1" comment="webrtc-audio-processing is &lt;0.3-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830715" version="1" comment="webrtc-audio-processing-devel is &lt;0.3-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830716" version="1" comment="xdg-desktop-portal is &lt;1.6.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830717" version="1" comment="xdg-desktop-portal-devel is &lt;1.6.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830718" version="1" comment="xdg-desktop-portal-gtk is &lt;1.6.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830719" version="1" comment="LibRaw-devel is &lt;0.19.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830720" version="1" comment="PackageKit-glib-devel is &lt;1.1.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830721" version="1" comment="frei0r-devel is &lt;1.6.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830722" version="1" comment="gtk-doc is &lt;1.28-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830723" version="1" comment="mutter-devel is &lt;3.32.2-48.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830724" version="1" comment="nautilus-devel is &lt;3.28.1-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830725" version="1" comment="pygobject3-devel is &lt;3.28.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830726" version="1" comment="vte291-devel is &lt;0.52.4-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830727" version="1" comment="libsoup is &lt;2.62.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830728" version="1" comment="libsoup-devel is &lt;2.62.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830729" version="1" comment="python3-gobject is &lt;3.28.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830730" version="1" comment="python3-gobject-base is &lt;3.28.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830731" version="1" comment="hivex is &lt;1.3.18-20.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830732" version="1" comment="hivex-devel is &lt;1.3.18-20.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830733" version="1" comment="libguestfs is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830734" version="1" comment="libguestfs-bash-completion is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830735" version="1" comment="libguestfs-benchmarking is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830736" version="1" comment="libguestfs-devel is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830737" version="1" comment="libguestfs-gfs2 is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830738" version="1" comment="libguestfs-gobject is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830739" version="1" comment="libguestfs-gobject-devel is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830740" version="1" comment="libguestfs-inspect-icons is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830741" version="1" comment="libguestfs-java is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830742" version="1" comment="libguestfs-java-devel is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830743" version="1" comment="libguestfs-javadoc is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830744" version="1" comment="libguestfs-man-pages-ja is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830745" version="1" comment="libguestfs-man-pages-uk is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830746" version="1" comment="libguestfs-rescue is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830747" version="1" comment="libguestfs-rsync is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830748" version="1" comment="libguestfs-tools is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830749" version="1" comment="libguestfs-tools-c is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830750" version="1" comment="libguestfs-winsupport is &lt;8.2-1.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830751" version="1" comment="libguestfs-xfs is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830752" version="1" comment="libiscsi is &lt;1.18.0-8.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830753" version="1" comment="libiscsi-devel is &lt;1.18.0-8.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830754" version="1" comment="libiscsi-utils is &lt;1.18.0-8.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830755" version="1" comment="libnbd is &lt;1.2.2-1.module+el8.3.0+7353+9de0a3cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830756" version="1" comment="libnbd-devel is &lt;1.2.2-1.module+el8.3.0+7353+9de0a3cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830757" version="1" comment="libvirt is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830758" version="1" comment="libvirt-admin is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830759" version="1" comment="libvirt-bash-completion is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830760" version="1" comment="libvirt-client is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830761" version="1" comment="libvirt-daemon is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830762" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830763" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830764" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830765" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830766" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830767" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830768" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830769" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830770" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830771" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830772" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830773" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830774" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830775" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830776" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830777" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830778" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830779" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830780" version="1" comment="libvirt-daemon-kvm is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830781" version="1" comment="libvirt-dbus is &lt;1.3.0-2.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830782" version="1" comment="libvirt-devel is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830783" version="1" comment="libvirt-docs is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830784" version="1" comment="libvirt-libs is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830785" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830786" version="1" comment="libvirt-nss is &lt;6.0.0-28.module+el8.3.0+7827+5e65edd7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830787" version="1" comment="lua-guestfs is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830788" version="1" comment="nbdfuse is &lt;1.2.2-1.module+el8.3.0+7353+9de0a3cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830789" version="1" comment="nbdkit is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830790" version="1" comment="nbdkit-bash-completion is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830791" version="1" comment="nbdkit-basic-filters is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830792" version="1" comment="nbdkit-basic-plugins is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830793" version="1" comment="nbdkit-curl-plugin is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830794" version="1" comment="nbdkit-devel is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830795" version="1" comment="nbdkit-example-plugins is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830796" version="1" comment="nbdkit-gzip-plugin is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830797" version="1" comment="nbdkit-linuxdisk-plugin is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830798" version="1" comment="nbdkit-python-plugin is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830799" version="1" comment="nbdkit-server is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830800" version="1" comment="nbdkit-ssh-plugin is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830801" version="1" comment="nbdkit-vddk-plugin is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830802" version="1" comment="nbdkit-xz-filter is &lt;1.16.2-4.module+el8.3.0+6922+fd575af8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830803" version="1" comment="netcf is &lt;0.2.8-12.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830804" version="1" comment="netcf-devel is &lt;0.2.8-12.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830805" version="1" comment="netcf-libs is &lt;0.2.8-12.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830806" version="1" comment="perl-Sys-Guestfs is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830807" version="1" comment="perl-Sys-Virt is &lt;6.0.0-1.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830808" version="1" comment="perl-hivex is &lt;1.3.18-20.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830809" version="1" comment="python3-hivex is &lt;1.3.18-20.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830810" version="1" comment="python3-libguestfs is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830811" version="1" comment="python3-libnbd is &lt;1.2.2-1.module+el8.3.0+7353+9de0a3cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830812" version="1" comment="python3-libvirt is &lt;6.0.0-1.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830813" version="1" comment="qemu-guest-agent is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830814" version="1" comment="qemu-img is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830815" version="1" comment="qemu-kvm is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830816" version="1" comment="qemu-kvm-block-curl is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830817" version="1" comment="qemu-kvm-block-gluster is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830818" version="1" comment="qemu-kvm-block-iscsi is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830819" version="1" comment="qemu-kvm-block-rbd is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830820" version="1" comment="qemu-kvm-block-ssh is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830821" version="1" comment="qemu-kvm-common is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830822" version="1" comment="qemu-kvm-core is &lt;4.2.0-34.module+el8.3.0+7976+077be4ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830823" version="1" comment="ruby-hivex is &lt;1.3.18-20.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830824" version="1" comment="ruby-libguestfs is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830825" version="1" comment="seabios is &lt;1.13.0-2.module+el8.3.0+7353+9de0a3cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830826" version="1" comment="seabios-bin is &lt;1.13.0-2.module+el8.3.0+7353+9de0a3cc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830827" version="1" comment="seavgabios-bin is &lt;1.13.0-2.module+el8.3.0+7353+9de0a3cc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830828" version="1" comment="sgabios is &lt;0.20170427git-3.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830829" version="1" comment="sgabios-bin is &lt;0.20170427git-3.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830830" version="1" comment="supermin is &lt;5.1.19-10.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830831" version="1" comment="supermin-devel is &lt;5.1.19-10.module+el8.3.0+6423+e4cb6418 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830832" version="1" comment="virt-dib is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830833" version="1" comment="virt-v2v is &lt;1.40.2-25.module+el8.3.0+7421+642fe24f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830834" version="1" comment="Judy is &lt;1.0.5-18.module+el8+2765+cfa4f87b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830835" version="1" comment="galera is &lt;25.3.32-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830836" version="1" comment="mariadb is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830837" version="1" comment="mariadb-backup is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830838" version="1" comment="mariadb-common is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830839" version="1" comment="mariadb-devel is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830840" version="1" comment="mariadb-embedded is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830841" version="1" comment="mariadb-embedded-devel is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830842" version="1" comment="mariadb-errmsg is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830843" version="1" comment="mariadb-gssapi-server is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830844" version="1" comment="mariadb-oqgraph-engine is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830845" version="1" comment="mariadb-server is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830846" version="1" comment="mariadb-server-galera is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830847" version="1" comment="mariadb-server-utils is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830848" version="1" comment="mariadb-test is &lt;10.3.28-1.module+el8.3.0+10472+7adc332a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830849" version="1" comment="libguestfs is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830850" version="1" comment="libguestfs-bash-completion is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830851" version="1" comment="libguestfs-benchmarking is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830852" version="1" comment="libguestfs-devel is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830853" version="1" comment="libguestfs-gfs2 is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830854" version="1" comment="libguestfs-gobject is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830855" version="1" comment="libguestfs-gobject-devel is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830856" version="1" comment="libguestfs-inspect-icons is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830857" version="1" comment="libguestfs-java is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830858" version="1" comment="libguestfs-java-devel is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830859" version="1" comment="libguestfs-javadoc is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830860" version="1" comment="libguestfs-man-pages-ja is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830861" version="1" comment="libguestfs-man-pages-uk is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830862" version="1" comment="libguestfs-rescue is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830863" version="1" comment="libguestfs-rsync is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830864" version="1" comment="libguestfs-tools is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830865" version="1" comment="libguestfs-tools-c is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830866" version="1" comment="libguestfs-xfs is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830867" version="1" comment="libvirt is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830868" version="1" comment="libvirt-admin is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830869" version="1" comment="libvirt-bash-completion is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830870" version="1" comment="libvirt-client is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830871" version="1" comment="libvirt-daemon is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830872" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830873" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830874" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830875" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830876" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830877" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830878" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830879" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830880" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830881" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830882" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830883" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830884" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830885" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830886" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830887" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830888" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830889" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830890" version="1" comment="libvirt-daemon-kvm is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830891" version="1" comment="libvirt-devel is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830892" version="1" comment="libvirt-docs is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830893" version="1" comment="libvirt-libs is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830894" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830895" version="1" comment="libvirt-nss is &lt;6.0.0-35.module+el8.4.0+10230+7a9b21e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830896" version="1" comment="lua-guestfs is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830897" version="1" comment="perl-Sys-Guestfs is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830898" version="1" comment="python3-libguestfs is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830899" version="1" comment="qemu-guest-agent is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830900" version="1" comment="qemu-img is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830901" version="1" comment="qemu-kvm is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830902" version="1" comment="qemu-kvm-block-curl is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830903" version="1" comment="qemu-kvm-block-gluster is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830904" version="1" comment="qemu-kvm-block-iscsi is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830905" version="1" comment="qemu-kvm-block-rbd is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830906" version="1" comment="qemu-kvm-block-ssh is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830907" version="1" comment="qemu-kvm-common is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830908" version="1" comment="qemu-kvm-core is &lt;4.2.0-48.module+el8.4.0+10368+630e803b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830909" version="1" comment="ruby-libguestfs is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830910" version="1" comment="virt-dib is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830911" version="1" comment="virt-v2v is &lt;1.40.2-27.module+el8.4.0+9282+0bdec052 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830912" version="1" comment="shim-ia32 is &lt;15.4-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830913" version="1" comment="shim-x64 is &lt;15.4-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830914" version="1" comment="python38 is &lt;3.8.6-3.module+el8.4.0+9579+e9717e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830915" version="1" comment="python38-Cython is &lt;0.29.14-4.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830916" version="1" comment="python38-PyMySQL is &lt;0.10.1-1.module+el8.4.0+9692+8e86ab84 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830917" version="1" comment="python38-asn1crypto is &lt;1.2.0-3.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830918" version="1" comment="python38-babel is &lt;2.7.0-10.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830919" version="1" comment="python38-cffi is &lt;1.13.2-3.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830920" version="1" comment="python38-chardet is &lt;3.0.4-19.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830921" version="1" comment="python38-cryptography is &lt;2.8-3.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830922" version="1" comment="python38-debug is &lt;3.8.6-3.module+el8.4.0+9579+e9717e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830923" version="1" comment="python38-devel is &lt;3.8.6-3.module+el8.4.0+9579+e9717e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830924" version="1" comment="python38-idle is &lt;3.8.6-3.module+el8.4.0+9579+e9717e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830925" version="1" comment="python38-idna is &lt;2.8-6.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830926" version="1" comment="python38-jinja2 is &lt;2.10.3-4.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830927" version="1" comment="python38-libs is &lt;3.8.6-3.module+el8.4.0+9579+e9717e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830928" version="1" comment="python38-lxml is &lt;4.4.1-5.module+el8.4.0+9001+fc421f6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830929" version="1" comment="python38-markupsafe is &lt;1.1.1-6.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830930" version="1" comment="python38-mod_wsgi is &lt;4.6.8-3.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830931" version="1" comment="python38-numpy is &lt;1.17.3-5.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830932" version="1" comment="python38-numpy-doc is &lt;1.17.3-5.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830933" version="1" comment="python38-numpy-f2py is &lt;1.17.3-5.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830934" version="1" comment="python38-pip is &lt;19.3.1-1.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830935" version="1" comment="python38-pip-wheel is &lt;19.3.1-1.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830936" version="1" comment="python38-ply is &lt;3.11-10.module+el8.4.0+9579+e9717e18 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830937" version="1" comment="python38-psutil is &lt;5.6.4-3.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830938" version="1" comment="python38-psycopg2 is &lt;2.8.4-4.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830939" version="1" comment="python38-psycopg2-doc is &lt;2.8.4-4.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830940" version="1" comment="python38-psycopg2-tests is &lt;2.8.4-4.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830941" version="1" comment="python38-pycparser is &lt;2.19-3.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830942" version="1" comment="python38-pysocks is &lt;1.7.1-4.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830943" version="1" comment="python38-pytz is &lt;2019.3-3.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830944" version="1" comment="python38-pyyaml is &lt;5.4.1-1.module+el8.4.0+10706+5c295a3e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830945" version="1" comment="python38-requests is &lt;2.22.0-9.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830946" version="1" comment="python38-rpm-macros is &lt;3.8.6-3.module+el8.4.0+9579+e9717e18 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830947" version="1" comment="python38-scipy is &lt;1.3.1-4.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830948" version="1" comment="python38-setuptools is &lt;41.6.0-4.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830949" version="1" comment="python38-setuptools-wheel is &lt;41.6.0-4.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830950" version="1" comment="python38-six is &lt;1.12.0-10.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830951" version="1" comment="python38-test is &lt;3.8.6-3.module+el8.4.0+9579+e9717e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830952" version="1" comment="python38-tkinter is &lt;3.8.6-3.module+el8.4.0+9579+e9717e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830953" version="1" comment="python38-urllib3 is &lt;1.25.7-4.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830954" version="1" comment="python38-wheel is &lt;0.33.6-5.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830955" version="1" comment="python38-wheel-wheel is &lt;0.33.6-5.module+el8.4.0+8888+89bc7e79 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830956" version="1" comment="hivex is &lt;1.3.18-21.module+el8.4.0+10770+19c037f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830957" version="1" comment="hivex-devel is &lt;1.3.18-21.module+el8.4.0+10770+19c037f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830958" version="1" comment="libvirt is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830959" version="1" comment="libvirt-admin is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830960" version="1" comment="libvirt-bash-completion is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830961" version="1" comment="libvirt-client is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830962" version="1" comment="libvirt-daemon is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830963" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830964" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830965" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830966" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830967" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830968" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830969" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830970" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830971" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830972" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830973" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830974" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830975" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830976" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830977" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830978" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830979" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830980" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830981" version="1" comment="libvirt-daemon-kvm is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830982" version="1" comment="libvirt-devel is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830983" version="1" comment="libvirt-docs is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830984" version="1" comment="libvirt-libs is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830985" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830986" version="1" comment="libvirt-nss is &lt;6.0.0-35.1.module+el8.4.0+11273+64eb94ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830987" version="1" comment="perl-hivex is &lt;1.3.18-21.module+el8.4.0+10770+19c037f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830988" version="1" comment="python3-hivex is &lt;1.3.18-21.module+el8.4.0+10770+19c037f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830989" version="1" comment="qemu-guest-agent is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830990" version="1" comment="qemu-img is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830991" version="1" comment="qemu-kvm is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830992" version="1" comment="qemu-kvm-block-curl is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830993" version="1" comment="qemu-kvm-block-gluster is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830994" version="1" comment="qemu-kvm-block-iscsi is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830995" version="1" comment="qemu-kvm-block-rbd is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830996" version="1" comment="qemu-kvm-block-ssh is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830997" version="1" comment="qemu-kvm-common is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830998" version="1" comment="qemu-kvm-core is &lt;4.2.0-48.module+el8.4.0+11909+3300d70f.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830999" version="1" comment="ruby-hivex is &lt;1.3.18-21.module+el8.4.0+10770+19c037f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831000" version="1" comment="hivex is &lt;1.3.18-21.module+el8.5.0+10709+b3edb581 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831001" version="1" comment="hivex-devel is &lt;1.3.18-21.module+el8.5.0+10709+b3edb581 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831002" version="1" comment="libguestfs is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831003" version="1" comment="libguestfs-bash-completion is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831004" version="1" comment="libguestfs-benchmarking is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831005" version="1" comment="libguestfs-devel is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831006" version="1" comment="libguestfs-gfs2 is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831007" version="1" comment="libguestfs-gobject is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831008" version="1" comment="libguestfs-gobject-devel is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831009" version="1" comment="libguestfs-inspect-icons is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831010" version="1" comment="libguestfs-java is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831011" version="1" comment="libguestfs-java-devel is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831012" version="1" comment="libguestfs-javadoc is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831013" version="1" comment="libguestfs-man-pages-ja is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831014" version="1" comment="libguestfs-man-pages-uk is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831015" version="1" comment="libguestfs-rescue is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831016" version="1" comment="libguestfs-rsync is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831017" version="1" comment="libguestfs-tools is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831018" version="1" comment="libguestfs-tools-c is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831019" version="1" comment="libguestfs-xfs is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831020" version="1" comment="libvirt is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831021" version="1" comment="libvirt-admin is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831022" version="1" comment="libvirt-bash-completion is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831023" version="1" comment="libvirt-client is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831024" version="1" comment="libvirt-daemon is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831025" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831026" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831027" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831028" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831029" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831030" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831031" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831032" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831033" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831034" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831035" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831036" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831037" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831038" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831039" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831040" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831041" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831042" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831043" version="1" comment="libvirt-daemon-kvm is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831044" version="1" comment="libvirt-devel is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831045" version="1" comment="libvirt-docs is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831046" version="1" comment="libvirt-libs is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831047" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831048" version="1" comment="libvirt-nss is &lt;6.0.0-37.module+el8.5.0+12162+40884dd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831049" version="1" comment="lua-guestfs is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831050" version="1" comment="perl-Sys-Guestfs is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831051" version="1" comment="perl-hivex is &lt;1.3.18-21.module+el8.5.0+10709+b3edb581 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831052" version="1" comment="python3-hivex is &lt;1.3.18-21.module+el8.5.0+10709+b3edb581 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831053" version="1" comment="python3-libguestfs is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831054" version="1" comment="qemu-guest-agent is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831055" version="1" comment="qemu-img is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831056" version="1" comment="qemu-kvm is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831057" version="1" comment="qemu-kvm-block-curl is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831058" version="1" comment="qemu-kvm-block-gluster is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831059" version="1" comment="qemu-kvm-block-iscsi is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831060" version="1" comment="qemu-kvm-block-rbd is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831061" version="1" comment="qemu-kvm-block-ssh is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831062" version="1" comment="qemu-kvm-common is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831063" version="1" comment="qemu-kvm-core is &lt;4.2.0-59.module+el8.5.0+12817+cb650d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831064" version="1" comment="ruby-hivex is &lt;1.3.18-21.module+el8.5.0+10709+b3edb581 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831065" version="1" comment="ruby-libguestfs is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831066" version="1" comment="virt-dib is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831067" version="1" comment="virt-v2v is &lt;1.40.2-28.module+el8.5.0+10717+67be7ac4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831068" version="1" comment="python38 is &lt;3.8.8-4.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831069" version="1" comment="python38-babel is &lt;2.7.0-11.module+el8.5.0+11015+9c1c7c42 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831070" version="1" comment="python38-debug is &lt;3.8.8-4.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831071" version="1" comment="python38-devel is &lt;3.8.8-4.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831072" version="1" comment="python38-idle is &lt;3.8.8-4.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831073" version="1" comment="python38-jinja2 is &lt;2.10.3-5.module+el8.5.0+10542+ba057329 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831074" version="1" comment="python38-libs is &lt;3.8.8-4.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831075" version="1" comment="python38-lxml is &lt;4.4.1-6.module+el8.5.0+10542+ba057329 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831076" version="1" comment="python38-numpy is &lt;1.17.3-6.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831077" version="1" comment="python38-numpy-doc is &lt;1.17.3-6.module+el8.5.0+12205+a865257a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831078" version="1" comment="python38-numpy-f2py is &lt;1.17.3-6.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831079" version="1" comment="python38-pip is &lt;19.3.1-4.module+el8.5.0+12205+a865257a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831080" version="1" comment="python38-pip-wheel is &lt;19.3.1-4.module+el8.5.0+12205+a865257a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831081" version="1" comment="python38-psutil is &lt;5.6.4-4.module+el8.5.0+12031+10ce4870 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831082" version="1" comment="python38-pyyaml is &lt;5.4.1-1.module+el8.5.0+10721+14d8e0d5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831083" version="1" comment="python38-rpm-macros is &lt;3.8.8-4.module+el8.5.0+12205+a865257a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831084" version="1" comment="python38-setuptools is &lt;41.6.0-5.module+el8.5.0+12205+a865257a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831085" version="1" comment="python38-setuptools-wheel is &lt;41.6.0-5.module+el8.5.0+12205+a865257a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831086" version="1" comment="python38-test is &lt;3.8.8-4.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831087" version="1" comment="python38-tkinter is &lt;3.8.8-4.module+el8.5.0+12205+a865257a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831088" version="1" comment="python38-urllib3 is &lt;1.25.7-5.module+el8.5.0+11639+ea5b349d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831089" version="1" comment="python38-wheel is &lt;0.33.6-6.module+el8.5.0+12205+a865257a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831090" version="1" comment="python38-wheel-wheel is &lt;0.33.6-6.module+el8.5.0+12205+a865257a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831091" version="1" comment="python39 is &lt;3.9.6-2.module+el8.5.0+12204+54860423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831092" version="1" comment="python39-PyMySQL is &lt;0.10.1-2.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831093" version="1" comment="python39-cffi is &lt;1.14.3-2.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831094" version="1" comment="python39-chardet is &lt;3.0.4-19.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831095" version="1" comment="python39-cryptography is &lt;3.3.1-2.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831096" version="1" comment="python39-devel is &lt;3.9.6-2.module+el8.5.0+12204+54860423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831097" version="1" comment="python39-idle is &lt;3.9.6-2.module+el8.5.0+12204+54860423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831098" version="1" comment="python39-idna is &lt;2.10-3.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831099" version="1" comment="python39-libs is &lt;3.9.6-2.module+el8.5.0+12204+54860423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831100" version="1" comment="python39-lxml is &lt;4.6.2-3.module+el8.5.0+10536+a233b742 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831101" version="1" comment="python39-mod_wsgi is &lt;4.7.1-4.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831102" version="1" comment="python39-numpy is &lt;1.19.4-3.module+el8.5.0+12204+54860423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831103" version="1" comment="python39-numpy-doc is &lt;1.19.4-3.module+el8.5.0+12204+54860423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831104" version="1" comment="python39-numpy-f2py is &lt;1.19.4-3.module+el8.5.0+12204+54860423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831105" version="1" comment="python39-pip is &lt;20.2.4-6.module+el8.5.0+12204+54860423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831106" version="1" comment="python39-pip-wheel is &lt;20.2.4-6.module+el8.5.0+12204+54860423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831107" version="1" comment="python39-ply is &lt;3.11-10.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831108" version="1" comment="python39-psutil is &lt;5.8.0-4.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831109" version="1" comment="python39-psycopg2 is &lt;2.8.6-2.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831110" version="1" comment="python39-psycopg2-doc is &lt;2.8.6-2.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831111" version="1" comment="python39-psycopg2-tests is &lt;2.8.6-2.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831112" version="1" comment="python39-pycparser is &lt;2.20-3.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831113" version="1" comment="python39-pysocks is &lt;1.7.1-4.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831114" version="1" comment="python39-pyyaml is &lt;5.4.1-1.module+el8.5.0+10613+59a13ec4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831115" version="1" comment="python39-requests is &lt;2.25.0-2.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831116" version="1" comment="python39-rpm-macros is &lt;3.9.6-2.module+el8.5.0+12204+54860423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831117" version="1" comment="python39-scipy is &lt;1.5.4-3.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831118" version="1" comment="python39-setuptools is &lt;50.3.2-4.module+el8.5.0+12204+54860423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831119" version="1" comment="python39-setuptools-wheel is &lt;50.3.2-4.module+el8.5.0+12204+54860423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831120" version="1" comment="python39-six is &lt;1.15.0-3.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831121" version="1" comment="python39-test is &lt;3.9.6-2.module+el8.5.0+12204+54860423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831122" version="1" comment="python39-tkinter is &lt;3.9.6-2.module+el8.5.0+12204+54860423 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831123" version="1" comment="python39-toml is &lt;0.10.1-5.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831124" version="1" comment="python39-urllib3 is &lt;1.25.10-4.module+el8.5.0+11712+ea2d2be1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831125" version="1" comment="python39-wheel is &lt;0.35.1-4.module+el8.5.0+12204+54860423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831126" version="1" comment="python39-wheel-wheel is &lt;0.35.1-4.module+el8.5.0+12204+54860423 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831127" version="1" comment="httpd is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831128" version="1" comment="httpd-devel is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831129" version="1" comment="httpd-filesystem is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831130" version="1" comment="httpd-manual is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831131" version="1" comment="httpd-tools is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831132" version="1" comment="mod_http2 is &lt;1.15.7-3.module+el8.4.0+8625+d397f3da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831133" version="1" comment="mod_ldap is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831134" version="1" comment="mod_md is &lt;2.0.8-8.module+el8.3.0+6814+67d1e611 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831135" version="1" comment="mod_proxy_html is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831136" version="1" comment="mod_session is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831137" version="1" comment="mod_ssl is &lt;2.4.37-43.module+el8.5.0+13806+b30d9eec.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831138" version="1" comment="python38 is &lt;3.8.12-1.module+el8.6.0+12642+c3710b74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831139" version="1" comment="python38-debug is &lt;3.8.12-1.module+el8.6.0+12642+c3710b74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831140" version="1" comment="python38-devel is &lt;3.8.12-1.module+el8.6.0+12642+c3710b74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831141" version="1" comment="python38-idle is &lt;3.8.12-1.module+el8.6.0+12642+c3710b74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831142" version="1" comment="python38-libs is &lt;3.8.12-1.module+el8.6.0+12642+c3710b74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831143" version="1" comment="python38-lxml is &lt;4.4.1-7.module+el8.6.0+13958+214a5473 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831144" version="1" comment="python38-pip is &lt;19.3.1-5.module+el8.6.0+13002+70cfc74a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831145" version="1" comment="python38-pip-wheel is &lt;19.3.1-5.module+el8.6.0+13002+70cfc74a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831146" version="1" comment="python38-rpm-macros is &lt;3.8.12-1.module+el8.6.0+12642+c3710b74 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831147" version="1" comment="python38-test is &lt;3.8.12-1.module+el8.6.0+12642+c3710b74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831148" version="1" comment="python38-tkinter is &lt;3.8.12-1.module+el8.6.0+12642+c3710b74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831149" version="1" comment="python39 is &lt;3.9.7-1.module+el8.6.0+12577+62b8d0a1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831150" version="1" comment="python39-devel is &lt;3.9.7-1.module+el8.6.0+12577+62b8d0a1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831151" version="1" comment="python39-idle is &lt;3.9.7-1.module+el8.6.0+12577+62b8d0a1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831152" version="1" comment="python39-libs is &lt;3.9.7-1.module+el8.6.0+12577+62b8d0a1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831153" version="1" comment="python39-lxml is &lt;4.6.5-1.module+el8.6.0+13933+9cf0c87c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831154" version="1" comment="python39-pip is &lt;20.2.4-7.module+el8.6.0+13003+6bb2c488 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831155" version="1" comment="python39-pip-wheel is &lt;20.2.4-7.module+el8.6.0+13003+6bb2c488 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831156" version="1" comment="python39-rpm-macros is &lt;3.9.7-1.module+el8.6.0+12577+62b8d0a1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831157" version="1" comment="python39-test is &lt;3.9.7-1.module+el8.6.0+12577+62b8d0a1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831158" version="1" comment="python39-tkinter is &lt;3.9.7-1.module+el8.6.0+12577+62b8d0a1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831159" version="1" comment="aopalliance is &lt;1.0-17.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831160" version="1" comment="apache-commons-cli is &lt;1.4-4.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831161" version="1" comment="apache-commons-codec is &lt;1.11-3.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831162" version="1" comment="apache-commons-io is &lt;2.6-3.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831163" version="1" comment="apache-commons-lang3 is &lt;3.7-3.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831164" version="1" comment="apache-commons-logging is &lt;1.2-13.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831165" version="1" comment="atinject is &lt;1-28.20100611svn86.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831166" version="1" comment="cdi-api is &lt;1.2-8.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831167" version="1" comment="geronimo-annotation is &lt;1.0-23.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831168" version="1" comment="glassfish-el-api is &lt;3.0.1-0.7.b08.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831169" version="1" comment="google-guice is &lt;4.1-11.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831170" version="1" comment="guava20 is &lt;20.0-8.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831171" version="1" comment="hawtjni-runtime is &lt;1.16-2.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831172" version="1" comment="httpcomponents-client is &lt;4.5.5-5.module+el8.6.0+13298+7b5243c0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831173" version="1" comment="httpcomponents-core is &lt;4.4.10-3.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831174" version="1" comment="jansi is &lt;1.17.1-1.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831175" version="1" comment="jansi-native is &lt;1.7-7.module+el8+2452+b359bfcd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831176" version="1" comment="jboss-interceptors-1.2-api is &lt;1.0.0-8.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831177" version="1" comment="jcl-over-slf4j is &lt;1.7.25-4.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831178" version="1" comment="jsoup is &lt;1.11.3-3.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831179" version="1" comment="maven is &lt;3.5.4-5.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831180" version="1" comment="maven-lib is &lt;3.5.4-5.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831181" version="1" comment="maven-resolver-api is &lt;1.1.1-2.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831182" version="1" comment="maven-resolver-connector-basic is &lt;1.1.1-2.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831183" version="1" comment="maven-resolver-impl is &lt;1.1.1-2.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831184" version="1" comment="maven-resolver-spi is &lt;1.1.1-2.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831185" version="1" comment="maven-resolver-transport-wagon is &lt;1.1.1-2.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831186" version="1" comment="maven-resolver-util is &lt;1.1.1-2.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831187" version="1" comment="maven-shared-utils is &lt;3.2.1-0.2.module+el8.6.0+15045+b1156105 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831188" version="1" comment="maven-wagon-file is &lt;3.1.0-1.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831189" version="1" comment="maven-wagon-http is &lt;3.1.0-1.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831190" version="1" comment="maven-wagon-http-shared is &lt;3.1.0-1.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831191" version="1" comment="maven-wagon-provider-api is &lt;3.1.0-1.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831192" version="1" comment="plexus-cipher is &lt;1.7-14.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831193" version="1" comment="plexus-classworlds is &lt;2.5.2-9.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831194" version="1" comment="plexus-containers-component-annotations is &lt;1.7.1-8.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831195" version="1" comment="plexus-interpolation is &lt;1.22-9.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831196" version="1" comment="plexus-sec-dispatcher is &lt;1.4-26.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831197" version="1" comment="plexus-utils is &lt;3.1.0-3.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831198" version="1" comment="sisu-inject is &lt;0.3.3-6.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831199" version="1" comment="sisu-plexus is &lt;0.3.3-6.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831200" version="1" comment="slf4j is &lt;1.7.25-4.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831201" version="1" comment="aopalliance is &lt;1.0-20.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831202" version="1" comment="apache-commons-cli is &lt;1.4-7.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831203" version="1" comment="apache-commons-codec is &lt;1.13-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831204" version="1" comment="apache-commons-io is &lt;2.6-6.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831205" version="1" comment="apache-commons-lang3 is &lt;3.9-4.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831206" version="1" comment="atinject is &lt;1-31.20100611svn86.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831207" version="1" comment="cdi-api is &lt;2.0.1-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831208" version="1" comment="geronimo-annotation is &lt;1.0-26.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831209" version="1" comment="google-guice is &lt;4.2.2-4.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831210" version="1" comment="guava is &lt;28.1-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831211" version="1" comment="httpcomponents-client is &lt;4.5.10-4.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831212" version="1" comment="httpcomponents-core is &lt;4.4.12-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831213" version="1" comment="jansi is &lt;1.18-4.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831214" version="1" comment="jcl-over-slf4j is &lt;1.7.28-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831215" version="1" comment="jsoup is &lt;1.12.1-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831216" version="1" comment="jsr-305 is &lt;0-0.25.20130910svn.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831217" version="1" comment="maven is &lt;3.6.2-7.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831218" version="1" comment="maven-lib is &lt;3.6.2-7.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831219" version="1" comment="maven-openjdk11 is &lt;3.6.2-7.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831220" version="1" comment="maven-openjdk17 is &lt;3.6.2-7.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831221" version="1" comment="maven-openjdk8 is &lt;3.6.2-7.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831222" version="1" comment="maven-resolver is &lt;1.4.1-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831223" version="1" comment="maven-shared-utils is &lt;3.2.1-0.5.module+el8.6.0+15049+43453910 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831224" version="1" comment="maven-wagon is &lt;3.3.4-2.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831225" version="1" comment="plexus-cipher is &lt;1.7-17.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831226" version="1" comment="plexus-classworlds is &lt;2.6.0-4.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831227" version="1" comment="plexus-containers-component-annotations is &lt;2.1.0-2.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831228" version="1" comment="plexus-interpolation is &lt;1.26-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831229" version="1" comment="plexus-sec-dispatcher is &lt;1.4-29.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831230" version="1" comment="plexus-utils is &lt;3.3.0-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831231" version="1" comment="sisu is &lt;0.3.4-2.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831232" version="1" comment="slf4j is &lt;1.7.28-3.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831233" version="1" comment="python38 is &lt;3.8.13-1.module+el8.7.0+15641+2ece4388 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831234" version="1" comment="python38-debug is &lt;3.8.13-1.module+el8.7.0+15641+2ece4388 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831235" version="1" comment="python38-devel is &lt;3.8.13-1.module+el8.7.0+15641+2ece4388 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831236" version="1" comment="python38-idle is &lt;3.8.13-1.module+el8.7.0+15641+2ece4388 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831237" version="1" comment="python38-jinja2 is &lt;2.11.3-1.module+el8.7.0+15575+d005caff for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831238" version="1" comment="python38-libs is &lt;3.8.13-1.module+el8.7.0+15641+2ece4388 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831239" version="1" comment="python38-mod_wsgi is &lt;4.6.8-4.module+el8.7.0+16653+23ccaf52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831240" version="1" comment="python38-pip is &lt;19.3.1-6.module+el8.7.0+15823+8950cfa7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831241" version="1" comment="python38-pip-wheel is &lt;19.3.1-6.module+el8.7.0+15823+8950cfa7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831242" version="1" comment="python38-rpm-macros is &lt;3.8.13-1.module+el8.7.0+15641+2ece4388 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831243" version="1" comment="python38-test is &lt;3.8.13-1.module+el8.7.0+15641+2ece4388 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831244" version="1" comment="python38-tkinter is &lt;3.8.13-1.module+el8.7.0+15641+2ece4388 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831274" version="1" comment="libvirt is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831275" version="1" comment="libvirt-client is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831276" version="1" comment="libvirt-daemon is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831277" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831278" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831279" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831280" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831281" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831282" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831283" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831284" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831285" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831286" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831287" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831288" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831289" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831290" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831291" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831292" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831293" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831294" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831295" version="1" comment="libvirt-daemon-kvm is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831297" version="1" comment="libvirt-devel is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831298" version="1" comment="libvirt-docs is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831299" version="1" comment="libvirt-libs is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831300" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831301" version="1" comment="libvirt-nss is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831302" version="1" comment="libvirt-wireshark is &lt;8.0.0-10.module+el8.7.0+16689+53d59bc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831334" version="1" comment="qemu-guest-agent is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831335" version="1" comment="qemu-img is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831336" version="1" comment="qemu-kvm is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831337" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831338" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831339" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831340" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831341" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831342" version="1" comment="qemu-kvm-common is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831343" version="1" comment="qemu-kvm-core is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831344" version="1" comment="qemu-kvm-docs is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831345" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831346" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831347" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-20.module+el8.7.0+16689+53d59bc2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831367" version="1" comment="osbuild is &lt;65-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831368" version="1" comment="osbuild-luks2 is &lt;65-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831369" version="1" comment="osbuild-lvm2 is &lt;65-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831370" version="1" comment="osbuild-ostree is &lt;65-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831371" version="1" comment="osbuild-selinux is &lt;65-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831372" version="1" comment="osbuild-tools is &lt;65-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831373" version="1" comment="python3-osbuild is &lt;65-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831374" version="1" comment="weldr-client is &lt;35.5-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831375" version="1" comment="weldr-client-tests is &lt;35.5-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831376" version="1" comment="python39 is &lt;3.9.13-1.module+el8.7.0+15656+ffd4a257 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831377" version="1" comment="python39-devel is &lt;3.9.13-1.module+el8.7.0+15656+ffd4a257 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831378" version="1" comment="python39-idle is &lt;3.9.13-1.module+el8.7.0+15656+ffd4a257 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831379" version="1" comment="python39-libs is &lt;3.9.13-1.module+el8.7.0+15656+ffd4a257 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831380" version="1" comment="python39-mod_wsgi is &lt;4.7.1-5.module+el8.7.0+16654+645aad7f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831381" version="1" comment="python39-rpm-macros is &lt;3.9.13-1.module+el8.7.0+15656+ffd4a257 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831382" version="1" comment="python39-test is &lt;3.9.13-1.module+el8.7.0+15656+ffd4a257 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831383" version="1" comment="python39-tkinter is &lt;3.9.13-1.module+el8.7.0+15656+ffd4a257 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831384" version="1" comment="python38 is &lt;3.8.16-1.module+el8.8.0+17624+9a09af5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831385" version="1" comment="python38-debug is &lt;3.8.16-1.module+el8.8.0+17624+9a09af5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831386" version="1" comment="python38-devel is &lt;3.8.16-1.module+el8.8.0+17624+9a09af5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831387" version="1" comment="python38-idle is &lt;3.8.16-1.module+el8.8.0+17624+9a09af5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831388" version="1" comment="python38-libs is &lt;3.8.16-1.module+el8.8.0+17624+9a09af5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831389" version="1" comment="python38-rpm-macros is &lt;3.8.16-1.module+el8.8.0+17624+9a09af5a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831390" version="1" comment="python38-test is &lt;3.8.16-1.module+el8.8.0+17624+9a09af5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831391" version="1" comment="python38-tkinter is &lt;3.8.16-1.module+el8.8.0+17624+9a09af5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831392" version="1" comment="python38 is &lt;3.8.16-1.module+el8.8.0+18967+20d359ae.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831393" version="1" comment="python38-debug is &lt;3.8.16-1.module+el8.8.0+18967+20d359ae.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831394" version="1" comment="python38-devel is &lt;3.8.16-1.module+el8.8.0+18967+20d359ae.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831395" version="1" comment="python38-idle is &lt;3.8.16-1.module+el8.8.0+18967+20d359ae.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831396" version="1" comment="python38-libs is &lt;3.8.16-1.module+el8.8.0+18967+20d359ae.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831397" version="1" comment="python38-rpm-macros is &lt;3.8.16-1.module+el8.8.0+18967+20d359ae.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831398" version="1" comment="python38-test is &lt;3.8.16-1.module+el8.8.0+18967+20d359ae.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831399" version="1" comment="python38-tkinter is &lt;3.8.16-1.module+el8.8.0+18967+20d359ae.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831400" version="1" comment="python39 is &lt;3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831401" version="1" comment="python39-devel is &lt;3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831402" version="1" comment="python39-idle is &lt;3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831403" version="1" comment="python39-libs is &lt;3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831404" version="1" comment="python39-rpm-macros is &lt;3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831405" version="1" comment="python39-test is &lt;3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831406" version="1" comment="python39-tkinter is &lt;3.9.16-1.module+el8.8.0+18968+3d7b19f0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831407" version="1" comment="open-vm-tools is &lt;12.1.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831408" version="1" comment="open-vm-tools-desktop is &lt;12.1.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831409" version="1" comment="open-vm-tools-devel is &lt;12.1.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831410" version="1" comment="open-vm-tools-salt-minion is &lt;12.1.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831411" version="1" comment="open-vm-tools-sdmp is &lt;12.1.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831412" version="1" comment="open-vm-tools-test is &lt;12.1.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831432" version="1" comment="libguestfs-winsupport is &lt;8.8-2.module+el8.8.0+19817+dd5e62f6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831440" version="1" comment="libtpms is &lt;0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+1482ba89 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831441" version="1" comment="libtpms-devel is &lt;0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+1482ba89 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831442" version="1" comment="libvirt is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831443" version="1" comment="libvirt-client is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831444" version="1" comment="libvirt-daemon is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831445" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831446" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831447" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831448" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831449" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831450" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831451" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831452" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831453" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831454" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831455" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831456" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831457" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831458" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831459" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831460" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831461" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831462" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831463" version="1" comment="libvirt-daemon-kvm is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831465" version="1" comment="libvirt-devel is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831466" version="1" comment="libvirt-docs is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831467" version="1" comment="libvirt-libs is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831468" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831469" version="1" comment="libvirt-nss is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831470" version="1" comment="libvirt-wireshark is &lt;8.0.0-19.2.module+el8.8.0+18944+7f5acf75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831502" version="1" comment="qemu-guest-agent is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831503" version="1" comment="qemu-img is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831504" version="1" comment="qemu-kvm is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831505" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831506" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831507" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831508" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831509" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831510" version="1" comment="qemu-kvm-common is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831511" version="1" comment="qemu-kvm-core is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831512" version="1" comment="qemu-kvm-docs is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831513" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831514" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831515" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-33.module+el8.8.0+19768+98f68f21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831518" version="1" comment="seabios is &lt;1.16.0-4.module+el8.8.0+19627+2d14cb21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831519" version="1" comment="seabios-bin is &lt;1.16.0-4.module+el8.8.0+19627+2d14cb21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831520" version="1" comment="seavgabios-bin is &lt;1.16.0-4.module+el8.8.0+19627+2d14cb21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831531" version="1" comment="virt-v2v is &lt;1.42.0-22.module+el8.8.0+19067+b66cdac6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831532" version="1" comment="virt-v2v-bash-completion is &lt;1.42.0-22.module+el8.8.0+19067+b66cdac6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831533" version="1" comment="virt-v2v-man-pages-ja is &lt;1.42.0-22.module+el8.8.0+19067+b66cdac6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831534" version="1" comment="virt-v2v-man-pages-uk is &lt;1.42.0-22.module+el8.8.0+19067+b66cdac6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831535" version="1" comment="python39 is &lt;3.9.18-1.module+el8.9.0+20024+793d7211 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831536" version="1" comment="python39-PyMySQL is &lt;0.10.1-2.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831537" version="1" comment="python39-cffi is &lt;1.14.3-2.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831538" version="1" comment="python39-chardet is &lt;3.0.4-19.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831539" version="1" comment="python39-cryptography is &lt;3.3.1-2.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831540" version="1" comment="python39-devel is &lt;3.9.18-1.module+el8.9.0+20024+793d7211 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831541" version="1" comment="python39-idle is &lt;3.9.18-1.module+el8.9.0+20024+793d7211 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831542" version="1" comment="python39-idna is &lt;2.10-3.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831543" version="1" comment="python39-libs is &lt;3.9.18-1.module+el8.9.0+20024+793d7211 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831544" version="1" comment="python39-lxml is &lt;4.6.5-1.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831545" version="1" comment="python39-mod_wsgi is &lt;4.7.1-7.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831546" version="1" comment="python39-numpy is &lt;1.19.4-3.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831547" version="1" comment="python39-numpy-doc is &lt;1.19.4-3.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831548" version="1" comment="python39-numpy-f2py is &lt;1.19.4-3.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831549" version="1" comment="python39-pip is &lt;20.2.4-8.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831550" version="1" comment="python39-pip-wheel is &lt;20.2.4-8.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831551" version="1" comment="python39-ply is &lt;3.11-10.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831552" version="1" comment="python39-psutil is &lt;5.8.0-4.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831553" version="1" comment="python39-psycopg2 is &lt;2.8.6-2.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831554" version="1" comment="python39-psycopg2-doc is &lt;2.8.6-2.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831555" version="1" comment="python39-psycopg2-tests is &lt;2.8.6-2.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831556" version="1" comment="python39-pycparser is &lt;2.20-3.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831557" version="1" comment="python39-pysocks is &lt;1.7.1-4.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831558" version="1" comment="python39-pyyaml is &lt;5.4.1-1.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831559" version="1" comment="python39-requests is &lt;2.25.0-3.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831560" version="1" comment="python39-rpm-macros is &lt;3.9.18-1.module+el8.9.0+20024+793d7211 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831561" version="1" comment="python39-scipy is &lt;1.5.4-5.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831562" version="1" comment="python39-setuptools is &lt;50.3.2-4.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831563" version="1" comment="python39-setuptools-wheel is &lt;50.3.2-4.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831564" version="1" comment="python39-six is &lt;1.15.0-3.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831565" version="1" comment="python39-test is &lt;3.9.18-1.module+el8.9.0+20024+793d7211 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831566" version="1" comment="python39-tkinter is &lt;3.9.18-1.module+el8.9.0+20024+793d7211 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831567" version="1" comment="python39-toml is &lt;0.10.1-5.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831568" version="1" comment="python39-urllib3 is &lt;1.25.10-4.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831569" version="1" comment="python39-wheel is &lt;0.35.1-4.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831570" version="1" comment="python39-wheel-wheel is &lt;0.35.1-4.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831571" version="1" comment="python38 is &lt;3.8.17-2.module+el8.9.0+19642+a12b4af6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831572" version="1" comment="python38-Cython is &lt;0.29.14-4.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831573" version="1" comment="python38-PyMySQL is &lt;0.10.1-1.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831574" version="1" comment="python38-asn1crypto is &lt;1.2.0-3.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831575" version="1" comment="python38-babel is &lt;2.7.0-11.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831576" version="1" comment="python38-cffi is &lt;1.13.2-3.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831577" version="1" comment="python38-chardet is &lt;3.0.4-19.module+el8.9.0+19592+4b459c9b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831578" version="1" comment="python38-cryptography is &lt;2.8-3.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831579" version="1" comment="python38-debug is &lt;3.8.17-2.module+el8.9.0+19642+a12b4af6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831580" version="1" comment="python38-devel is &lt;3.8.17-2.module+el8.9.0+19642+a12b4af6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831581" version="1" comment="python38-idle is &lt;3.8.17-2.module+el8.9.0+19642+a12b4af6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831582" version="1" comment="python38-idna is &lt;2.8-6.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831583" version="1" comment="python38-jinja2 is &lt;2.11.3-1.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831584" version="1" comment="python38-libs is &lt;3.8.17-2.module+el8.9.0+19642+a12b4af6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831585" version="1" comment="python38-lxml is &lt;4.4.1-7.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831586" version="1" comment="python38-markupsafe is &lt;1.1.1-6.module+el8.9.0+19592+4b459c9b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831587" version="1" comment="python38-mod_wsgi is &lt;4.6.8-5.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831588" version="1" comment="python38-numpy is &lt;1.17.3-7.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831589" version="1" comment="python38-numpy-doc is &lt;1.17.3-7.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831590" version="1" comment="python38-numpy-f2py is &lt;1.17.3-7.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831591" version="1" comment="python38-pip is &lt;19.3.1-7.module+el8.9.0+19642+a12b4af6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831592" version="1" comment="python38-pip-wheel is &lt;19.3.1-7.module+el8.9.0+19642+a12b4af6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831593" version="1" comment="python38-ply is &lt;3.11-10.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831594" version="1" comment="python38-psutil is &lt;5.6.4-4.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831595" version="1" comment="python38-psycopg2 is &lt;2.8.4-4.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831596" version="1" comment="python38-psycopg2-doc is &lt;2.8.4-4.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831597" version="1" comment="python38-psycopg2-tests is &lt;2.8.4-4.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831598" version="1" comment="python38-pycparser is &lt;2.19-3.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831599" version="1" comment="python38-pysocks is &lt;1.7.1-4.module+el8.9.0+19592+4b459c9b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831600" version="1" comment="python38-pytz is &lt;2019.3-4.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831601" version="1" comment="python38-pyyaml is &lt;5.4.1-1.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831602" version="1" comment="python38-requests is &lt;2.22.0-10.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831603" version="1" comment="python38-rpm-macros is &lt;3.8.17-2.module+el8.9.0+19642+a12b4af6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831604" version="1" comment="python38-scipy is &lt;1.3.1-5.module+el8.9.0+19598+4a60c7b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831605" version="1" comment="python38-setuptools is &lt;41.6.0-5.module+el8.9.0+19592+4b459c9b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831606" version="1" comment="python38-setuptools-wheel is &lt;41.6.0-5.module+el8.9.0+19592+4b459c9b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831607" version="1" comment="python38-six is &lt;1.12.0-10.module+el8.9.0+19592+4b459c9b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831608" version="1" comment="python38-test is &lt;3.8.17-2.module+el8.9.0+19642+a12b4af6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831609" version="1" comment="python38-tkinter is &lt;3.8.17-2.module+el8.9.0+19642+a12b4af6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831610" version="1" comment="python38-urllib3 is &lt;1.25.7-5.module+el8.9.0+19598+4a60c7b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831611" version="1" comment="python38-wheel is &lt;0.33.6-6.module+el8.9.0+19592+4b459c9b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831612" version="1" comment="python38-wheel-wheel is &lt;0.33.6-6.module+el8.9.0+19592+4b459c9b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850854" version="1" comment="hivex is &lt;1.3.18-23.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850855" version="1" comment="hivex-devel is &lt;1.3.18-23.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850856" version="1" comment="libguestfs is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850857" version="1" comment="libguestfs-appliance is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850858" version="1" comment="libguestfs-bash-completion is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850859" version="1" comment="libguestfs-devel is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850860" version="1" comment="libguestfs-gfs2 is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850861" version="1" comment="libguestfs-gobject is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850862" version="1" comment="libguestfs-gobject-devel is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850863" version="1" comment="libguestfs-inspect-icons is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850864" version="1" comment="libguestfs-java is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850865" version="1" comment="libguestfs-java-devel is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850866" version="1" comment="libguestfs-javadoc is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850867" version="1" comment="libguestfs-man-pages-ja is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850868" version="1" comment="libguestfs-man-pages-uk is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850869" version="1" comment="libguestfs-rescue is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850870" version="1" comment="libguestfs-rsync is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850871" version="1" comment="libguestfs-tools is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850872" version="1" comment="libguestfs-tools-c is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850873" version="1" comment="libguestfs-winsupport is &lt;8.9-1.module+el8.9.0+19846+58c50e4e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850874" version="1" comment="libguestfs-xfs is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850875" version="1" comment="libiscsi is &lt;1.18.0-8.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850876" version="1" comment="libiscsi-devel is &lt;1.18.0-8.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850877" version="1" comment="libiscsi-utils is &lt;1.18.0-8.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850878" version="1" comment="libnbd is &lt;1.6.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850879" version="1" comment="libnbd-bash-completion is &lt;1.6.0-5.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850880" version="1" comment="libnbd-devel is &lt;1.6.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850881" version="1" comment="libtpms is &lt;0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850882" version="1" comment="libtpms-devel is &lt;0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850883" version="1" comment="libvirt is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850884" version="1" comment="libvirt-client is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850885" version="1" comment="libvirt-daemon is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850886" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850887" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850888" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850889" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850890" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850891" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850892" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850893" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850894" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850895" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850896" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850897" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850898" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850899" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850900" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850901" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850902" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850903" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850904" version="1" comment="libvirt-daemon-kvm is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850905" version="1" comment="libvirt-dbus is &lt;1.3.0-2.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850906" version="1" comment="libvirt-devel is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850907" version="1" comment="libvirt-docs is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850908" version="1" comment="libvirt-libs is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850909" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850910" version="1" comment="libvirt-nss is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850911" version="1" comment="libvirt-wireshark is &lt;8.0.0-22.module+el8.9.0+19544+b3045133 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850912" version="1" comment="lua-guestfs is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850913" version="1" comment="nbdfuse is &lt;1.6.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850914" version="1" comment="nbdkit is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850915" version="1" comment="nbdkit-bash-completion is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850916" version="1" comment="nbdkit-basic-filters is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850917" version="1" comment="nbdkit-basic-plugins is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850918" version="1" comment="nbdkit-curl-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850919" version="1" comment="nbdkit-devel is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850920" version="1" comment="nbdkit-example-plugins is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850921" version="1" comment="nbdkit-gzip-filter is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850922" version="1" comment="nbdkit-gzip-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850923" version="1" comment="nbdkit-linuxdisk-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850924" version="1" comment="nbdkit-nbd-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850925" version="1" comment="nbdkit-python-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850926" version="1" comment="nbdkit-server is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850927" version="1" comment="nbdkit-ssh-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850928" version="1" comment="nbdkit-tar-filter is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850929" version="1" comment="nbdkit-tar-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850930" version="1" comment="nbdkit-tmpdisk-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850931" version="1" comment="nbdkit-vddk-plugin is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850932" version="1" comment="nbdkit-xz-filter is &lt;1.24.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850933" version="1" comment="netcf is &lt;0.2.8-12.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850934" version="1" comment="netcf-devel is &lt;0.2.8-12.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850935" version="1" comment="netcf-libs is &lt;0.2.8-12.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850936" version="1" comment="perl-Sys-Guestfs is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850937" version="1" comment="perl-Sys-Virt is &lt;8.0.0-1.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850938" version="1" comment="perl-hivex is &lt;1.3.18-23.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850939" version="1" comment="python3-hivex is &lt;1.3.18-23.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850940" version="1" comment="python3-libguestfs is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850941" version="1" comment="python3-libnbd is &lt;1.6.0-5.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850942" version="1" comment="python3-libvirt is &lt;8.0.0-2.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850943" version="1" comment="qemu-guest-agent is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850944" version="1" comment="qemu-img is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850945" version="1" comment="qemu-kvm is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850946" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850947" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850948" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850949" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850950" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850951" version="1" comment="qemu-kvm-common is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850952" version="1" comment="qemu-kvm-core is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850953" version="1" comment="qemu-kvm-docs is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850954" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850955" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850956" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850957" version="1" comment="ruby-hivex is &lt;1.3.18-23.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850958" version="1" comment="ruby-libguestfs is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850959" version="1" comment="seabios is &lt;1.16.0-4.module+el8.9.0+19570+14a90618 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850960" version="1" comment="seabios-bin is &lt;1.16.0-4.module+el8.9.0+19570+14a90618 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850961" version="1" comment="seavgabios-bin is &lt;1.16.0-4.module+el8.9.0+19570+14a90618 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850962" version="1" comment="sgabios is &lt;0.20170427git-3.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850963" version="1" comment="sgabios-bin is &lt;0.20170427git-3.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850964" version="1" comment="supermin is &lt;5.2.1-2.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850965" version="1" comment="supermin-devel is &lt;5.2.1-2.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850966" version="1" comment="swtpm is &lt;0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850967" version="1" comment="swtpm-devel is &lt;0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850968" version="1" comment="swtpm-libs is &lt;0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850969" version="1" comment="swtpm-tools is &lt;0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850970" version="1" comment="swtpm-tools-pkcs11 is &lt;0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850971" version="1" comment="virt-dib is &lt;1.44.0-9.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850972" version="1" comment="virt-v2v is &lt;1.42.0-22.module+el8.9.0+18724+20190c23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850973" version="1" comment="virt-v2v-bash-completion is &lt;1.42.0-22.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850974" version="1" comment="virt-v2v-man-pages-ja is &lt;1.42.0-22.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850975" version="1" comment="virt-v2v-man-pages-uk is &lt;1.42.0-22.module+el8.9.0+18724+20190c23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850976" version="1" comment="qemu-guest-agent is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850977" version="1" comment="qemu-img is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850978" version="1" comment="qemu-kvm is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850979" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850980" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850981" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850982" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850983" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850984" version="1" comment="qemu-kvm-common is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850985" version="1" comment="qemu-kvm-core is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850986" version="1" comment="qemu-kvm-docs is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850987" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850988" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850989" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-40.module+el8.9.0+20867+9a6a0901.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875386" version="1" comment="libguestfs-winsupport is &lt;8.10-1.module+el8.10.0+19908+9938c7c9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875387" version="1" comment="libvirt is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875388" version="1" comment="libvirt-client is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875389" version="1" comment="libvirt-daemon is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875390" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875391" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875392" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875393" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875394" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875395" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875396" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875397" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875398" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875399" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875400" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875401" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875402" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875403" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875404" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875405" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875406" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875407" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875408" version="1" comment="libvirt-daemon-kvm is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875409" version="1" comment="libvirt-devel is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875410" version="1" comment="libvirt-docs is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875411" version="1" comment="libvirt-libs is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875412" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875413" version="1" comment="libvirt-nss is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875414" version="1" comment="libvirt-wireshark is &lt;8.0.0-23.module+el8.10.0+21023+5962ee04 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875415" version="1" comment="qemu-guest-agent is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875416" version="1" comment="qemu-img is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875417" version="1" comment="qemu-kvm is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875418" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875419" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875420" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875421" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875422" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875423" version="1" comment="qemu-kvm-common is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875424" version="1" comment="qemu-kvm-core is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875425" version="1" comment="qemu-kvm-docs is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875426" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875427" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875428" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-49.module+el8.10.0+21533+3df3c4b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874216" version="1" comment="python39 is &lt;3.9.18-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874217" version="1" comment="python39-cryptography is &lt;3.3.1-3.module+el8.10.0+21271+eccd1d86 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874218" version="1" comment="python39-devel is &lt;3.9.18-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874219" version="1" comment="python39-idle is &lt;3.9.18-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874220" version="1" comment="python39-libs is &lt;3.9.18-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874221" version="1" comment="python39-pip is &lt;20.2.4-9.module+el8.10.0+21329+8d76b841 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874222" version="1" comment="python39-pip-wheel is &lt;20.2.4-9.module+el8.10.0+21329+8d76b841 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874223" version="1" comment="python39-psycopg2 is &lt;2.8.6-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874224" version="1" comment="python39-psycopg2-doc is &lt;2.8.6-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874225" version="1" comment="python39-psycopg2-tests is &lt;2.8.6-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874226" version="1" comment="python39-rpm-macros is &lt;3.9.18-3.module+el8.10.0+21142+453d2b75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874227" version="1" comment="python39-setuptools is &lt;50.3.2-5.module+el8.10.0+20345+671a55aa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874228" version="1" comment="python39-setuptools-wheel is &lt;50.3.2-5.module+el8.10.0+20345+671a55aa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874229" version="1" comment="python39-test is &lt;3.9.18-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874230" version="1" comment="python39-tkinter is &lt;3.9.18-3.module+el8.10.0+21142+453d2b75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874231" version="1" comment="python39-urllib3 is &lt;1.25.10-5.module+el8.10.0+20443+f0a692fe for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876135" version="1" comment="libvirt is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876136" version="1" comment="libvirt-client is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876137" version="1" comment="libvirt-daemon is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876138" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876139" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876140" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876141" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876142" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876143" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876144" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876145" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876146" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876147" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876148" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876149" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876150" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876151" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876152" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876153" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876154" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876155" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876156" version="1" comment="libvirt-daemon-kvm is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876157" version="1" comment="libvirt-devel is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876158" version="1" comment="libvirt-docs is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876159" version="1" comment="libvirt-libs is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876160" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876161" version="1" comment="libvirt-nss is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876162" version="1" comment="libvirt-wireshark is &lt;8.0.0-23.2.module+el8.10.0+21972+d7867348 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876163" version="1" comment="qemu-guest-agent is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876164" version="1" comment="qemu-img is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876165" version="1" comment="qemu-kvm is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876166" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876167" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876168" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876169" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876170" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876171" version="1" comment="qemu-kvm-common is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876172" version="1" comment="qemu-kvm-core is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876173" version="1" comment="qemu-kvm-docs is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876174" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876175" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876176" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-50.module+el8.10.0+22027+db0a70a4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940492" version="1" comment="python39 is &lt;3.9.19-7.module+el8.10.0+22237+51382d7a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940493" version="1" comment="python39-devel is &lt;3.9.19-7.module+el8.10.0+22237+51382d7a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940494" version="1" comment="python39-idle is &lt;3.9.19-7.module+el8.10.0+22237+51382d7a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940495" version="1" comment="python39-idna is &lt;2.10-4.module+el8.10.0+21815+bb024982 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940496" version="1" comment="python39-libs is &lt;3.9.19-7.module+el8.10.0+22237+51382d7a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940497" version="1" comment="python39-rpm-macros is &lt;3.9.19-7.module+el8.10.0+22237+51382d7a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940498" version="1" comment="python39-setuptools is &lt;50.3.2-6.module+el8.10.0+22183+c898c0c1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940499" version="1" comment="python39-setuptools-wheel is &lt;50.3.2-6.module+el8.10.0+22183+c898c0c1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940500" version="1" comment="python39-test is &lt;3.9.19-7.module+el8.10.0+22237+51382d7a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940501" version="1" comment="python39-tkinter is &lt;3.9.19-7.module+el8.10.0+22237+51382d7a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944766" version="1" comment="libnbd is &lt;1.6.0-6.module+el8.10.0+22250+3c790083 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944767" version="1" comment="libnbd-bash-completion is &lt;1.6.0-6.module+el8.10.0+22250+3c790083 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944768" version="1" comment="libnbd-devel is &lt;1.6.0-6.module+el8.10.0+22250+3c790083 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944769" version="1" comment="nbdfuse is &lt;1.6.0-6.module+el8.10.0+22250+3c790083 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944770" version="1" comment="python3-libnbd is &lt;1.6.0-6.module+el8.10.0+22250+3c790083 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944771" version="1" comment="qemu-guest-agent is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944772" version="1" comment="qemu-img is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944773" version="1" comment="qemu-kvm is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944774" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944775" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944776" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944777" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944778" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944779" version="1" comment="qemu-kvm-common is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944780" version="1" comment="qemu-kvm-core is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944781" version="1" comment="qemu-kvm-docs is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944782" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944783" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944784" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-53.module+el8.10.0+22268+f82ccd96 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954951" version="1" comment="perl-App-cpanminus is &lt;1.7044-6.module+el8.10.0+22411+7e3d2305 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954952" version="1" comment="perl-CPAN-DistnameInfo is &lt;0.12-11.module+el8.10.0+22411+7e3d2305 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954953" version="1" comment="perl-CPAN-Meta-Check is &lt;0.014-6.module+el8.10.0+22411+7e3d2305 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954954" version="1" comment="perl-File-pushd is &lt;1.014-6.module+el8.10.0+22411+7e3d2305 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954955" version="1" comment="perl-Module-CPANfile is &lt;1.1002-7.module+el8.10.0+22411+7e3d2305 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954956" version="1" comment="perl-Parse-PMFile is &lt;0.41-7.module+el8.10.0+22411+7e3d2305 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954957" version="1" comment="perl-String-ShellQuote is &lt;1.04-24.module+el8.10.0+22411+7e3d2305 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956204" version="1" comment="perl-App-cpanminus is &lt;1.7044-6.module+el8.10.0+22411+e14e3526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956205" version="1" comment="perl-CPAN-DistnameInfo is &lt;0.12-11.module+el8.10.0+22411+e14e3526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956206" version="1" comment="perl-CPAN-Meta-Check is &lt;0.014-6.module+el8.10.0+22411+e14e3526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956207" version="1" comment="perl-File-pushd is &lt;1.014-6.module+el8.10.0+22411+e14e3526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956208" version="1" comment="perl-Module-CPANfile is &lt;1.1002-7.module+el8.10.0+22411+e14e3526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956209" version="1" comment="perl-Parse-PMFile is &lt;0.41-7.module+el8.10.0+22411+e14e3526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956210" version="1" comment="perl-String-ShellQuote is &lt;1.04-24.module+el8.10.0+22411+e14e3526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956211" version="1" comment="perl-App-cpanminus is &lt;1.7044-6.module+el8.10.0+22411+85254afd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956212" version="1" comment="perl-CPAN-Meta-Check is &lt;0.014-6.module+el8.10.0+22411+85254afd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956213" version="1" comment="perl-File-pushd is &lt;1.014-6.module+el8.10.0+22411+85254afd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956214" version="1" comment="perl-Module-CPANfile is &lt;1.1002-7.module+el8.10.0+22411+85254afd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956215" version="1" comment="perl-Parse-PMFile is &lt;0.41-7.module+el8.10.0+22411+85254afd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956216" version="1" comment="perl-String-ShellQuote is &lt;1.04-24.module+el8.10.0+22411+85254afd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956217" version="1" comment="perl-App-cpanminus is &lt;1.7044-6.module+el8.10.0+22411+409a293e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956218" version="1" comment="perl-CPAN-DistnameInfo is &lt;0.12-11.module+el8.10.0+22411+409a293e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956219" version="1" comment="perl-CPAN-Meta-Check is &lt;0.014-6.module+el8.10.0+22411+409a293e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956220" version="1" comment="perl-File-pushd is &lt;1.014-6.module+el8.10.0+22411+409a293e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956221" version="1" comment="perl-Module-CPANfile is &lt;1.1002-7.module+el8.10.0+22411+409a293e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956222" version="1" comment="perl-Parse-PMFile is &lt;0.41-7.module+el8.10.0+22411+409a293e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956223" version="1" comment="perl-String-ShellQuote is &lt;1.04-24.module+el8.10.0+22411+409a293e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964940" version="1" comment="cpp is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964941" version="1" comment="gcc is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964942" version="1" comment="gcc-c++ is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964943" version="1" comment="gcc-gdb-plugin is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964944" version="1" comment="gcc-gfortran is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964945" version="1" comment="gcc-offload-nvptx is &lt;8.5.0-23.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964946" version="1" comment="gcc-plugin-annobin is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964947" version="1" comment="gcc-plugin-devel is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964948" version="1" comment="libasan is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964949" version="1" comment="libasan-static is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964950" version="1" comment="libatomic is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964951" version="1" comment="libatomic-static is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964952" version="1" comment="libgcc is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964953" version="1" comment="libgfortran is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964954" version="1" comment="libgfortran-static is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964955" version="1" comment="libgomp is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964956" version="1" comment="libgomp-offload-nvptx is &lt;8.5.0-23.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964957" version="1" comment="libitm is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964958" version="1" comment="libitm-devel is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964959" version="1" comment="libitm-static is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964960" version="1" comment="liblsan is &lt;8.5.0-23.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964961" version="1" comment="liblsan-static is &lt;8.5.0-23.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964962" version="1" comment="libquadmath is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964963" version="1" comment="libquadmath-devel is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964964" version="1" comment="libquadmath-static is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964965" version="1" comment="libstdc++ is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964966" version="1" comment="libstdc++-devel is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964967" version="1" comment="libstdc++-docs is &lt;8.5.0-23.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964968" version="1" comment="libstdc++-static is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964969" version="1" comment="libtsan is &lt;8.5.0-23.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964970" version="1" comment="libtsan-static is &lt;8.5.0-23.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964971" version="1" comment="libubsan is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964972" version="1" comment="libubsan-static is &lt;8.5.0-23.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964973" version="1" comment="gcc-toolset-13-gcc is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964974" version="1" comment="gcc-toolset-13-gcc-c++ is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964975" version="1" comment="gcc-toolset-13-gcc-gfortran is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964976" version="1" comment="gcc-toolset-13-gcc-plugin-annobin is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964977" version="1" comment="gcc-toolset-13-gcc-plugin-devel is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964978" version="1" comment="gcc-toolset-13-libasan-devel is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964979" version="1" comment="gcc-toolset-13-libatomic-devel is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964980" version="1" comment="gcc-toolset-13-libgccjit is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964981" version="1" comment="gcc-toolset-13-libgccjit-devel is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964982" version="1" comment="gcc-toolset-13-libhwasan-devel is &lt;13.3.1-2.2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964983" version="1" comment="gcc-toolset-13-libitm-devel is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964984" version="1" comment="gcc-toolset-13-liblsan-devel is &lt;13.3.1-2.2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964985" version="1" comment="gcc-toolset-13-libquadmath-devel is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964986" version="1" comment="gcc-toolset-13-libstdc++-devel is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964987" version="1" comment="gcc-toolset-13-libstdc++-docs is &lt;13.3.1-2.2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964988" version="1" comment="gcc-toolset-13-libtsan-devel is &lt;13.3.1-2.2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964989" version="1" comment="gcc-toolset-13-libubsan-devel is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964990" version="1" comment="gcc-toolset-13-offload-nvptx is &lt;13.3.1-2.2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964991" version="1" comment="libasan8 is &lt;13.3.1-2.2.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964992" version="1" comment="libhwasan is &lt;13.3.1-2.2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964993" version="1" comment="libtsan2 is &lt;13.3.1-2.2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964994" version="1" comment="gcc-toolset-14-gcc is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964995" version="1" comment="gcc-toolset-14-gcc-c++ is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964996" version="1" comment="gcc-toolset-14-gcc-gfortran is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964997" version="1" comment="gcc-toolset-14-gcc-plugin-annobin is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964998" version="1" comment="gcc-toolset-14-gcc-plugin-devel is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964999" version="1" comment="gcc-toolset-14-libasan-devel is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965000" version="1" comment="gcc-toolset-14-libatomic-devel is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965001" version="1" comment="gcc-toolset-14-libgccjit is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965002" version="1" comment="gcc-toolset-14-libgccjit-devel is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965003" version="1" comment="gcc-toolset-14-libhwasan-devel is &lt;14.2.1-7.1.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965004" version="1" comment="gcc-toolset-14-libitm-devel is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965005" version="1" comment="gcc-toolset-14-liblsan-devel is &lt;14.2.1-7.1.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965006" version="1" comment="gcc-toolset-14-libquadmath-devel is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965007" version="1" comment="gcc-toolset-14-libstdc++-devel is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965008" version="1" comment="gcc-toolset-14-libstdc++-docs is &lt;14.2.1-7.1.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965009" version="1" comment="gcc-toolset-14-libtsan-devel is &lt;14.2.1-7.1.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965010" version="1" comment="gcc-toolset-14-libubsan-devel is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965011" version="1" comment="gcc-toolset-14-offload-nvptx is &lt;14.2.1-7.1.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965012" version="1" comment="libasan8 is &lt;14.2.1-7.1.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965013" version="1" comment="libhwasan is &lt;14.2.1-7.1.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965014" version="1" comment="libtsan2 is &lt;14.2.1-7.1.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986286" version="1" comment="perl-FCGI is &lt;0.78-12.module+el8.10.0+23147+63faba8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986287" version="1" comment="perl-FCGI is &lt;0.78-12.module+el8.10.0+23147+20b7d289 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986288" version="1" comment="perl-FCGI is &lt;0.78-12.module+el8.10.0+23147+df114ff4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986289" version="1" comment="perl-FCGI is &lt;0.78-12.module+el8.10.0+23147+95b68fad for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987271" version="1" comment="ipa-client is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987272" version="1" comment="ipa-client-common is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987273" version="1" comment="ipa-client-epn is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987274" version="1" comment="ipa-client-samba is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987275" version="1" comment="ipa-common is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987276" version="1" comment="ipa-python-compat is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987277" version="1" comment="ipa-selinux is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987278" version="1" comment="ipa-server is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987279" version="1" comment="ipa-server-common is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987280" version="1" comment="ipa-server-dns is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987281" version="1" comment="ipa-server-trust-ad is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987282" version="1" comment="python3-ipaclient is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987283" version="1" comment="python3-ipalib is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987284" version="1" comment="python3-ipaserver is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987285" version="1" comment="python3-ipatests is &lt;4.9.13-18.module+el8.10.0+23182+cbb72bb2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987286" version="1" comment="ipa-client is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987287" version="1" comment="ipa-client-common is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987288" version="1" comment="ipa-client-epn is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987289" version="1" comment="ipa-client-samba is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987290" version="1" comment="ipa-common is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987291" version="1" comment="ipa-python-compat is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987292" version="1" comment="ipa-selinux is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987293" version="1" comment="ipa-server is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987294" version="1" comment="ipa-server-common is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987295" version="1" comment="ipa-server-dns is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987296" version="1" comment="ipa-server-trust-ad is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987297" version="1" comment="python3-ipaclient is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987298" version="1" comment="python3-ipalib is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987299" version="1" comment="python3-ipaserver is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987300" version="1" comment="python3-ipatests is &lt;4.9.13-18.module+el8.10.0+23183+85190b0c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012382" version="1" comment="libtpms is &lt;0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012383" version="1" comment="libtpms-devel is &lt;0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012384" version="1" comment="libvirt is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012385" version="1" comment="libvirt-client is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012386" version="1" comment="libvirt-daemon is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012387" version="1" comment="libvirt-daemon-config-network is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012388" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012389" version="1" comment="libvirt-daemon-driver-interface is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012390" version="1" comment="libvirt-daemon-driver-network is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012391" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012392" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012393" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012394" version="1" comment="libvirt-daemon-driver-secret is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012395" version="1" comment="libvirt-daemon-driver-storage is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012396" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012397" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012398" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012399" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012400" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012401" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012402" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012403" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012404" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012405" version="1" comment="libvirt-daemon-kvm is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012406" version="1" comment="libvirt-devel is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012407" version="1" comment="libvirt-docs is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012408" version="1" comment="libvirt-libs is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012409" version="1" comment="libvirt-lock-sanlock is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012410" version="1" comment="libvirt-nss is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012411" version="1" comment="libvirt-wireshark is &lt;8.0.0-23.4.module+el8.10.0+23205+d8da55c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012412" version="1" comment="qemu-guest-agent is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012413" version="1" comment="qemu-img is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012414" version="1" comment="qemu-kvm is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012415" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012416" version="1" comment="qemu-kvm-block-gluster is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012417" version="1" comment="qemu-kvm-block-iscsi is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012418" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012419" version="1" comment="qemu-kvm-block-ssh is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012420" version="1" comment="qemu-kvm-common is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012421" version="1" comment="qemu-kvm-core is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012422" version="1" comment="qemu-kvm-docs is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012423" version="1" comment="qemu-kvm-hw-usbredir is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012424" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012425" version="1" comment="qemu-kvm-ui-spice is &lt;6.2.0-53.module+el8.10.0+23081+c18b1ee3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016836" version="1" comment="bind-dyndb-ldap is &lt;11.6-6.module+el8.10.0+23009+91fb337e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016837" version="1" comment="custodia is &lt;0.6.0-3.module+el8.9.0+18911+94941f82 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016838" version="1" comment="ipa-client is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016839" version="1" comment="ipa-client-common is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016840" version="1" comment="ipa-client-epn is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016841" version="1" comment="ipa-client-samba is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016842" version="1" comment="ipa-common is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016843" version="1" comment="ipa-healthcheck is &lt;0.12-6.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016844" version="1" comment="ipa-healthcheck-core is &lt;0.12-6.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016845" version="1" comment="ipa-python-compat is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016846" version="1" comment="ipa-selinux is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016847" version="1" comment="ipa-server is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016848" version="1" comment="ipa-server-common is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016849" version="1" comment="ipa-server-dns is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016850" version="1" comment="ipa-server-trust-ad is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016851" version="1" comment="opendnssec is &lt;2.1.7-2.module+el8.10.0+22913+7aa1a207 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016852" version="1" comment="python3-custodia is &lt;0.6.0-3.module+el8.9.0+18911+94941f82 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016853" version="1" comment="python3-ipaclient is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016854" version="1" comment="python3-ipalib is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016855" version="1" comment="python3-ipaserver is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016856" version="1" comment="python3-ipatests is &lt;4.9.13-18.module+el8.10.0+23403+cc1f9b40 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016857" version="1" comment="python3-jwcrypto is &lt;0.5.0-2.module+el8.10.0+21691+df63127d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016858" version="1" comment="python3-kdcproxy is &lt;0.4-5.module+el8.10.0+22564+098ba143.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016859" version="1" comment="python3-pyusb is &lt;1.0.0-9.1.module+el8.9.0+18911+94941f82 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016860" version="1" comment="python3-qrcode is &lt;5.3-1.module+el8.10.0+22543+0dae60ab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016861" version="1" comment="python3-qrcode-core is &lt;5.3-1.module+el8.10.0+22543+0dae60ab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016862" version="1" comment="python3-yubico is &lt;1.3.2-9.1.module+el8.9.0+18911+94941f82 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016863" version="1" comment="slapi-nis is &lt;0.60.0-4.module+el8.10.0+20723+03062ebd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016864" version="1" comment="softhsm is &lt;2.6.0-5.module+el8.9.0+18911+94941f82 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016865" version="1" comment="softhsm-devel is &lt;2.6.0-5.module+el8.9.0+18911+94941f82 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020088" version="1" comment="ipa-client is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020089" version="1" comment="ipa-client-common is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020090" version="1" comment="ipa-client-epn is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020091" version="1" comment="ipa-client-samba is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020092" version="1" comment="ipa-common is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020093" version="1" comment="ipa-python-compat is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020094" version="1" comment="ipa-selinux is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020095" version="1" comment="ipa-server is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020096" version="1" comment="ipa-server-common is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020097" version="1" comment="ipa-server-dns is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020098" version="1" comment="ipa-server-trust-ad is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020099" version="1" comment="python3-ipaclient is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020100" version="1" comment="python3-ipalib is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020101" version="1" comment="python3-ipaserver is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020102" version="1" comment="python3-ipatests is &lt;4.9.13-20.module+el8.10.0+23534+744f3864 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020103" version="1" comment="ipa-client is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020104" version="1" comment="ipa-client-common is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020105" version="1" comment="ipa-client-epn is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020106" version="1" comment="ipa-client-samba is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020107" version="1" comment="ipa-common is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020108" version="1" comment="ipa-healthcheck-core is &lt;0.12-6.module+el8.10.0+23404+f6b3454f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020109" version="1" comment="ipa-python-compat is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020110" version="1" comment="ipa-selinux is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020111" version="1" comment="python3-ipaclient is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020112" version="1" comment="python3-ipalib is &lt;4.9.13-20.module+el8.10.0+23537+32c82745 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020113" version="1" comment="python3-jwcrypto is &lt;0.5.0-2.module+el8.10.0+21692+c9b201bc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020114" version="1" comment="python3-pyusb is &lt;1.0.0-9.1.module+el8.9.0+18920+2223d05e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020115" version="1" comment="python3-qrcode is &lt;5.3-1.module+el8.10.0+22544+6a7f07c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020116" version="1" comment="python3-qrcode-core is &lt;5.3-1.module+el8.10.0+22544+6a7f07c2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020117" version="1" comment="python3-yubico is &lt;1.3.2-9.1.module+el8.9.0+18920+2223d05e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025880" version="1" comment="ipa-client is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025881" version="1" comment="ipa-client-common is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025882" version="1" comment="ipa-client-epn is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025883" version="1" comment="ipa-client-samba is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025884" version="1" comment="ipa-common is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025885" version="1" comment="ipa-python-compat is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025886" version="1" comment="ipa-selinux is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025887" version="1" comment="ipa-server is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025888" version="1" comment="ipa-server-common is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025889" version="1" comment="ipa-server-dns is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025890" version="1" comment="ipa-server-trust-ad is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025891" version="1" comment="python3-ipaclient is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025892" version="1" comment="python3-ipalib is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025893" version="1" comment="python3-ipaserver is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025894" version="1" comment="python3-ipatests is &lt;4.9.13-20.module+el8.10.0+23610+7d6e87e5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025895" version="1" comment="python3-kdcproxy is &lt;0.4-5.module+el8.10.0+23610+7d6e87e5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025896" version="1" comment="ipa-client is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025897" version="1" comment="ipa-client-common is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025898" version="1" comment="ipa-client-epn is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025899" version="1" comment="ipa-client-samba is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025900" version="1" comment="ipa-common is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025901" version="1" comment="ipa-python-compat is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025902" version="1" comment="ipa-selinux is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025903" version="1" comment="python3-ipaclient is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025904" version="1" comment="python3-ipalib is &lt;4.9.13-20.module+el8.10.0+23617+3e211261 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030164" version="1" comment="cloud-init is &lt;23.4-7.el8_10.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056361" version="1" comment="microcode_ctl is &lt;20200609-2.20210216.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056362" version="1" comment="opencryptoki is &lt;3.15.1-6.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056363" version="1" comment="opencryptoki-devel is &lt;3.15.1-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056364" version="1" comment="opencryptoki-icsftok is &lt;3.15.1-6.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056365" version="1" comment="opencryptoki-libs is &lt;3.15.1-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056366" version="1" comment="opencryptoki-swtok is &lt;3.15.1-6.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056367" version="1" comment="opencryptoki-tpmtok is &lt;3.15.1-6.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838129" version="1" comment="buildah is &lt;1.19.9-1.module+el8.5.0+12236+c988d830 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838130" version="1" comment="buildah-tests is &lt;1.19.9-1.module+el8.5.0+12236+c988d830 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838131" version="1" comment="cockpit-podman is &lt;29-2.module+el8.5.0+10306+3f72d66d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838132" version="1" comment="conmon is &lt;2.0.26-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838133" version="1" comment="container-selinux is &lt;2.167.0-1.module+el8.5.0+12609+beaa716d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838134" version="1" comment="containernetworking-plugins is &lt;0.9.1-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053513" version="1" comment="containers-common is &lt;1.2.4-1.module+el8.5.0+13605+73abf821 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838136" version="1" comment="crit is &lt;3.15-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838137" version="1" comment="criu is &lt;3.15-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838138" version="1" comment="crun is &lt;0.18-2.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838139" version="1" comment="fuse-overlayfs is &lt;1.4.0-2.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838140" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838141" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838142" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-3.module+el8.5.0+11073+ba5c6d09 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053514" version="1" comment="podman is &lt;3.0.1-7.module+el8.5.0+12960+5b7d72b5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053515" version="1" comment="podman-catatonit is &lt;3.0.1-7.module+el8.5.0+12960+5b7d72b5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053516" version="1" comment="podman-docker is &lt;3.0.1-7.module+el8.5.0+12960+5b7d72b5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053517" version="1" comment="podman-plugins is &lt;3.0.1-7.module+el8.5.0+12960+5b7d72b5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053518" version="1" comment="podman-remote is &lt;3.0.1-7.module+el8.5.0+12960+5b7d72b5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053519" version="1" comment="podman-tests is &lt;3.0.1-7.module+el8.5.0+12960+5b7d72b5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838149" version="1" comment="python3-criu is &lt;3.15-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838150" version="1" comment="runc is &lt;1.0.0-72.rc92.module+el8.5.0+12236+c988d830 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053520" version="1" comment="skopeo is &lt;1.2.4-1.module+el8.5.0+13605+73abf821 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053521" version="1" comment="skopeo-tests is &lt;1.2.4-1.module+el8.5.0+13605+73abf821 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838153" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053522" version="1" comment="toolbox is &lt;0.0.99.3-1.module+el8.5.0+13746+87221ce8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053523" version="1" comment="toolbox-tests is &lt;0.0.99.3-1.module+el8.5.0+13746+87221ce8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838156" version="1" comment="udica is &lt;0.2.4-1.module+el8.5.0+10306+3f72d66d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053524" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.24-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053525" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.24-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053526" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.24-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053527" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.24-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053528" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.24-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053529" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.418-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053530" version="1" comment="dotnet-sdk-3.1-source-built-artifacts is &lt;3.1.418-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053531" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.24-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053532" version="1" comment="dotnet-templates-3.1 is &lt;3.1.418-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053533" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.7-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053534" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.7-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053535" version="1" comment="dotnet is &lt;6.0.107-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053536" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.7-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053537" version="1" comment="dotnet-host is &lt;6.0.7-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053538" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.7-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053539" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.7-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053540" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.107-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053541" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.107-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053542" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.7-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053543" version="1" comment="dotnet-templates-6.0 is &lt;6.0.107-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053544" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.107-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053545" version="1" comment="qatzip is &lt;1.0.9-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053546" version="1" comment="qatzip-devel is &lt;1.0.9-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053547" version="1" comment="qatzip-libs is &lt;1.0.9-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053548" version="1" comment="iwl100-firmware is &lt;39.31.5.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053549" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053550" version="1" comment="iwl105-firmware is &lt;18.168.6.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053551" version="1" comment="iwl135-firmware is &lt;18.168.6.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053552" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053553" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053554" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053555" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053556" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053557" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053558" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053559" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053560" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053561" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053562" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053563" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-114.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053564" version="1" comment="libertas-sd8686-firmware is &lt;20230404-114.git2e92a49f.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053565" version="1" comment="libertas-sd8787-firmware is &lt;20230404-114.git2e92a49f.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053566" version="1" comment="libertas-usb8388-firmware is &lt;20230404-114.git2e92a49f.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053567" version="1" comment="libertas-usb8388-olpc-firmware is &lt;20230404-114.git2e92a49f.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053568" version="1" comment="linux-firmware is &lt;20230404-114.git2e92a49f.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053569" version="1" comment="cifs-utils is &lt;7.0-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053570" version="1" comment="cifs-utils-devel is &lt;7.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053571" version="1" comment="pam_cifscreds is &lt;7.0-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848852" version="1" comment="delve is &lt;1.20.2-1.module+el8.9.0+18926+5193682d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053572" version="1" comment="go-toolset is &lt;1.20.10-1.module+el8.9.0+20382+04f7fe80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053573" version="1" comment="golang is &lt;1.20.10-1.module+el8.9.0+20382+04f7fe80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053574" version="1" comment="golang-bin is &lt;1.20.10-1.module+el8.9.0+20382+04f7fe80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053575" version="1" comment="golang-docs is &lt;1.20.10-1.module+el8.9.0+20382+04f7fe80 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053576" version="1" comment="golang-misc is &lt;1.20.10-1.module+el8.9.0+20382+04f7fe80 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053577" version="1" comment="golang-src is &lt;1.20.10-1.module+el8.9.0+20382+04f7fe80 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053578" version="1" comment="golang-tests is &lt;1.20.10-1.module+el8.9.0+20382+04f7fe80 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053579" version="1" comment="iwl100-firmware is &lt;39.31.5.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053580" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053581" version="1" comment="iwl105-firmware is &lt;18.168.6.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053582" version="1" comment="iwl135-firmware is &lt;18.168.6.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053583" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053584" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053585" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053586" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053587" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053588" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053589" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053590" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053591" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053592" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053593" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053594" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-120.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053595" version="1" comment="libertas-sd8686-firmware is &lt;20230824-120.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053596" version="1" comment="libertas-sd8787-firmware is &lt;20230824-120.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053597" version="1" comment="libertas-usb8388-firmware is &lt;20230824-120.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053598" version="1" comment="libertas-usb8388-olpc-firmware is &lt;20230824-120.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053599" version="1" comment="linux-firmware is &lt;20230824-120.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029760" version="1" comment="ca-certificates is &lt;2024.2.69_v8.0.303-80.0.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041194" version="1" comment="open-vm-tools is &lt;12.3.5-2.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041195" version="1" comment="open-vm-tools-desktop is &lt;12.3.5-2.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041196" version="1" comment="open-vm-tools-salt-minion is &lt;12.3.5-2.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041197" version="1" comment="open-vm-tools-sdmp is &lt;12.3.5-2.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056368" version="1" comment="bsdtar is &lt;3.3.3-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056369" version="1" comment="libarchive is &lt;3.3.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056370" version="1" comment="libarchive-devel is &lt;3.3.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056371" version="1" comment="libyang is &lt;1.0.184-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053600" version="1" comment="nodejs is &lt;12.22.12-1.module+el8.6.0+15324+1f2c5d8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053601" version="1" comment="nodejs-devel is &lt;12.22.12-1.module+el8.6.0+15324+1f2c5d8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053602" version="1" comment="nodejs-docs is &lt;12.22.12-1.module+el8.6.0+15324+1f2c5d8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053603" version="1" comment="nodejs-full-i18n is &lt;12.22.12-1.module+el8.6.0+15324+1f2c5d8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837544" version="1" comment="nodejs-nodemon is &lt;2.0.3-1.module+el8.4.0+11732+c668cc9f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833604" version="1" comment="nodejs-packaging is &lt;17-3.module+el8.1.0+3369+37ae6a45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053604" version="1" comment="npm is &lt;6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053605" version="1" comment="krb5-devel is &lt;1.18.2-25.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053606" version="1" comment="krb5-libs is &lt;1.18.2-25.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053607" version="1" comment="krb5-pkinit is &lt;1.18.2-25.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053608" version="1" comment="krb5-server is &lt;1.18.2-25.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053609" version="1" comment="krb5-server-ldap is &lt;1.18.2-25.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053610" version="1" comment="krb5-workstation is &lt;1.18.2-25.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053611" version="1" comment="libkadm5 is &lt;1.18.2-25.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053612" version="1" comment="microcode_ctl is &lt;20230808-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053613" version="1" comment="microcode_ctl is &lt;20250211-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831613" version="1" comment="firefox is &lt;60.6.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831614" version="1" comment="edk2-ovmf is &lt;20180508gitee3198e672e2-9.el8_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831615" version="1" comment="ghostscript is &lt;9.25-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831616" version="1" comment="ghostscript-doc is &lt;9.25-2.el8_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831617" version="1" comment="ghostscript-tools-dvipdf is &lt;9.25-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831618" version="1" comment="ghostscript-tools-fonts is &lt;9.25-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831619" version="1" comment="ghostscript-tools-printing is &lt;9.25-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831620" version="1" comment="ghostscript-x11 is &lt;9.25-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831621" version="1" comment="libgs is &lt;9.25-2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831622" version="1" comment="libgs-devel is &lt;9.25-2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831623" version="1" comment="libwsman-devel is &lt;2.6.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831624" version="1" comment="libwsman1 is &lt;2.6.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831625" version="1" comment="openwsman-client is &lt;2.6.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831626" version="1" comment="openwsman-python3 is &lt;2.6.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831627" version="1" comment="openwsman-server is &lt;2.6.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831628" version="1" comment="buildah is &lt;1.5-3.gite94b4f9.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831629" version="1" comment="container-selinux is &lt;2.94-1.git1e99f1d.module+el8.0.0+2958+4e823551 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831630" version="1" comment="containernetworking-plugins is &lt;0.7.4-3.git9ebe139.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831631" version="1" comment="containers-common is &lt;0.1.32-3.git1715c90.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831632" version="1" comment="fuse-overlayfs is &lt;0.3-2.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831633" version="1" comment="oci-systemd-hook is &lt;0.1.15-2.git2d0b8a3.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831634" version="1" comment="oci-umount is &lt;2.3.4-2.git87f9237.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831635" version="1" comment="podman is &lt;1.0.0-2.git921f98f.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831636" version="1" comment="podman-docker is &lt;1.0.0-2.git921f98f.module+el8.0.0+2958+4e823551 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831637" version="1" comment="runc is &lt;1.0.0-55.rc5.dev.git2abd837.module+el8.0.0+3049+59fd2bba for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831638" version="1" comment="skopeo is &lt;0.1.32-3.git1715c90.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831639" version="1" comment="slirp4netns is &lt;0.1-2.dev.gitc4e1bc5.module+el8.0.0+2958+4e823551 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831640" version="1" comment="httpd is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831641" version="1" comment="httpd-devel is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831642" version="1" comment="httpd-filesystem is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831643" version="1" comment="httpd-manual is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831644" version="1" comment="httpd-tools is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831645" version="1" comment="mod_http2 is &lt;1.11.3-2.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831646" version="1" comment="mod_ldap is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831647" version="1" comment="mod_md is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831648" version="1" comment="mod_proxy_html is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831649" version="1" comment="mod_session is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831650" version="1" comment="mod_ssl is &lt;2.4.37-11.module+el8.0.0+2969+90015743 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831651" version="1" comment="babel is &lt;2.5.1-9.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831652" version="1" comment="python-nose-docs is &lt;1.3.7-30.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831653" version="1" comment="python-psycopg2-doc is &lt;2.7.5-7.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831654" version="1" comment="python-sqlalchemy-doc is &lt;1.3.2-1.module+el8.0.0+2974+76d21d2e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831655" version="1" comment="python2 is &lt;2.7.15-22.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831656" version="1" comment="python2-Cython is &lt;0.28.1-7.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831657" version="1" comment="python2-PyMySQL is &lt;0.8.0-10.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831658" version="1" comment="python2-attrs is &lt;17.4.0-10.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831659" version="1" comment="python2-babel is &lt;2.5.1-9.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831660" version="1" comment="python2-backports is &lt;1.0-15.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831661" version="1" comment="python2-backports-ssl_match_hostname is &lt;3.5.0.1-11.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831662" version="1" comment="python2-bson is &lt;3.6.1-9.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831663" version="1" comment="python2-chardet is &lt;3.0.4-10.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831664" version="1" comment="python2-coverage is &lt;4.5.1-4.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831665" version="1" comment="python2-debug is &lt;2.7.15-22.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831666" version="1" comment="python2-devel is &lt;2.7.15-22.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831667" version="1" comment="python2-dns is &lt;1.15.0-9.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831668" version="1" comment="python2-docs is &lt;2.7.15-4.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831669" version="1" comment="python2-docs-info is &lt;2.7.15-4.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831670" version="1" comment="python2-docutils is &lt;0.14-12.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831671" version="1" comment="python2-funcsigs is &lt;1.0.2-13.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831672" version="1" comment="python2-idna is &lt;2.5-7.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831673" version="1" comment="python2-ipaddress is &lt;1.0.18-6.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831674" version="1" comment="python2-jinja2 is &lt;2.10-8.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831675" version="1" comment="python2-libs is &lt;2.7.15-22.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831676" version="1" comment="python2-lxml is &lt;4.2.3-3.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831677" version="1" comment="python2-markupsafe is &lt;0.23-19.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831678" version="1" comment="python2-mock is &lt;2.0.0-13.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831679" version="1" comment="python2-nose is &lt;1.3.7-30.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831680" version="1" comment="python2-numpy is &lt;1.14.2-10.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831681" version="1" comment="python2-numpy-doc is &lt;1.14.2-10.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831682" version="1" comment="python2-numpy-f2py is &lt;1.14.2-10.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831683" version="1" comment="python2-pip is &lt;9.0.3-13.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831684" version="1" comment="python2-pluggy is &lt;0.6.0-8.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831685" version="1" comment="python2-psycopg2 is &lt;2.7.5-7.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831686" version="1" comment="python2-psycopg2-debug is &lt;2.7.5-7.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831687" version="1" comment="python2-psycopg2-tests is &lt;2.7.5-7.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831688" version="1" comment="python2-py is &lt;1.5.3-6.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831689" version="1" comment="python2-pygments is &lt;2.2.0-20.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831690" version="1" comment="python2-pymongo is &lt;3.6.1-9.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831691" version="1" comment="python2-pymongo-gridfs is &lt;3.6.1-9.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831692" version="1" comment="python2-pysocks is &lt;1.6.8-6.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831693" version="1" comment="python2-pytest is &lt;3.4.2-13.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831694" version="1" comment="python2-pytest-mock is &lt;1.9.0-4.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831695" version="1" comment="python2-pytz is &lt;2017.2-12.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831696" version="1" comment="python2-pyyaml is &lt;3.12-16.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831697" version="1" comment="python2-requests is &lt;2.20.0-2.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831698" version="1" comment="python2-rpm-macros is &lt;3-38.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831699" version="1" comment="python2-scipy is &lt;1.0.0-19.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831700" version="1" comment="python2-setuptools is &lt;39.0.1-11.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831701" version="1" comment="python2-setuptools_scm is &lt;1.15.7-6.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831702" version="1" comment="python2-six is &lt;1.11.0-5.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831703" version="1" comment="python2-sqlalchemy is &lt;1.3.2-1.module+el8.0.0+2974+76d21d2e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831704" version="1" comment="python2-test is &lt;2.7.15-22.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831705" version="1" comment="python2-tkinter is &lt;2.7.15-22.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831706" version="1" comment="python2-tools is &lt;2.7.15-22.module+el8.0.0+2961+596d0223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831707" version="1" comment="python2-urllib3 is &lt;1.23-7.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831708" version="1" comment="python2-virtualenv is &lt;15.1.0-18.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831709" version="1" comment="python2-wheel is &lt;0.30.0-13.module+el8.0.0+2961+596d0223 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831710" version="1" comment="wget is &lt;1.19.5-7.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831711" version="1" comment="python-nose-docs is &lt;1.3.7-30.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831712" version="1" comment="python-pymongo-doc is &lt;3.6.1-9.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831713" version="1" comment="python-sqlalchemy-doc is &lt;1.3.2-1.module+el8.0.0+2975+e0f02136 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831714" version="1" comment="python-virtualenv-doc is &lt;15.1.0-18.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831715" version="1" comment="python3-PyMySQL is &lt;0.8.0-10.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831716" version="1" comment="python3-bson is &lt;3.6.1-9.module+el8.0.0+2966+d39a1df3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831717" version="1" comment="python3-docs is &lt;3.6.7-2.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831718" version="1" comment="python3-docutils is &lt;0.14-12.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831719" version="1" comment="python3-nose is &lt;1.3.7-30.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831720" version="1" comment="python3-pygments is &lt;2.2.0-20.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831721" version="1" comment="python3-pymongo is &lt;3.6.1-9.module+el8.0.0+2966+d39a1df3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831722" version="1" comment="python3-pymongo-gridfs is &lt;3.6.1-9.module+el8.0.0+2966+d39a1df3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831723" version="1" comment="python3-scipy is &lt;1.0.0-19.module+el8.0.0+2966+d39a1df3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831724" version="1" comment="python3-sqlalchemy is &lt;1.3.2-1.module+el8.0.0+2975+e0f02136 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831725" version="1" comment="python3-virtualenv is &lt;15.1.0-18.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831726" version="1" comment="python3-wheel is &lt;0.30.0-13.module+el8.0.0+2966+d39a1df3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831727" version="1" comment="python36 is &lt;3.6.8-2.module+el8.0.0+2975+e0f02136 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831728" version="1" comment="python36-debug is &lt;3.6.8-2.module+el8.0.0+2975+e0f02136 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831729" version="1" comment="python36-devel is &lt;3.6.8-2.module+el8.0.0+2975+e0f02136 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831730" version="1" comment="python36-rpm-macros is &lt;3.6.8-2.module+el8.0.0+2975+e0f02136 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831731" version="1" comment="mod_auth_mellon is &lt;0.14.0-3.el8_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831732" version="1" comment="systemd is &lt;239-13.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831733" version="1" comment="systemd-container is &lt;239-13.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831734" version="1" comment="systemd-devel is &lt;239-13.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831735" version="1" comment="systemd-journal-remote is &lt;239-13.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831736" version="1" comment="systemd-libs is &lt;239-13.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831737" version="1" comment="systemd-pam is &lt;239-13.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831738" version="1" comment="systemd-tests is &lt;239-13.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831739" version="1" comment="systemd-udev is &lt;239-13.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831740" version="1" comment="platform-python is &lt;3.6.8-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831741" version="1" comment="platform-python-debug is &lt;3.6.8-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831742" version="1" comment="platform-python-devel is &lt;3.6.8-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831743" version="1" comment="python3-idle is &lt;3.6.8-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831744" version="1" comment="python3-libs is &lt;3.6.8-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831745" version="1" comment="python3-test is &lt;3.6.8-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831746" version="1" comment="python3-tkinter is &lt;3.6.8-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831747" version="1" comment="freeradius is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831748" version="1" comment="freeradius-devel is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831749" version="1" comment="freeradius-doc is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831750" version="1" comment="freeradius-krb5 is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831751" version="1" comment="freeradius-ldap is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831752" version="1" comment="freeradius-mysql is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831753" version="1" comment="freeradius-perl is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831754" version="1" comment="freeradius-postgresql is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831755" version="1" comment="freeradius-rest is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831756" version="1" comment="freeradius-sqlite is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831757" version="1" comment="freeradius-unixODBC is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831758" version="1" comment="freeradius-utils is &lt;3.0.17-4.module+el8.0.0+3108+851cb559 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831759" version="1" comment="flatpak is &lt;1.0.6-3.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831760" version="1" comment="flatpak-libs is &lt;1.0.6-3.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831761" version="1" comment="thunderbird is &lt;60.6.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831762" version="1" comment="bind is &lt;9.11.4-17.P2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831763" version="1" comment="bind-chroot is &lt;9.11.4-17.P2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831764" version="1" comment="bind-devel is &lt;9.11.4-17.P2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831765" version="1" comment="bind-export-devel is &lt;9.11.4-17.P2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831766" version="1" comment="bind-export-libs is &lt;9.11.4-17.P2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831767" version="1" comment="bind-libs is &lt;9.11.4-17.P2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831768" version="1" comment="bind-libs-lite is &lt;9.11.4-17.P2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831769" version="1" comment="bind-license is &lt;9.11.4-17.P2.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831770" version="1" comment="bind-lite-devel is &lt;9.11.4-17.P2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831771" version="1" comment="bind-pkcs11 is &lt;9.11.4-17.P2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831772" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-17.P2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831773" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-17.P2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831774" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-17.P2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831775" version="1" comment="bind-sdb is &lt;9.11.4-17.P2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831776" version="1" comment="bind-sdb-chroot is &lt;9.11.4-17.P2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831777" version="1" comment="bind-utils is &lt;9.11.4-17.P2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831778" version="1" comment="python3-bind is &lt;9.11.4-17.P2.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831779" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.212.b04-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831780" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.212.b04-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831781" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.212.b04-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831782" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.212.b04-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831783" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.212.b04-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831784" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.212.b04-1.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831785" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.212.b04-1.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831786" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.212.b04-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831787" version="1" comment="python3-jinja2 is &lt;2.10.1-2.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831788" version="1" comment="bpftool is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831789" version="1" comment="kernel is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831790" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-80.1.2.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831791" version="1" comment="kernel-core is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831792" version="1" comment="kernel-cross-headers is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831793" version="1" comment="kernel-debug is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831794" version="1" comment="kernel-debug-core is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831796" version="1" comment="kernel-debug-modules is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831797" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831799" version="1" comment="kernel-doc is &lt;4.18.0-80.1.2.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831800" version="1" comment="kernel-headers is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831801" version="1" comment="kernel-modules is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831802" version="1" comment="kernel-modules-extra is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831803" version="1" comment="kernel-tools is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831804" version="1" comment="kernel-tools-libs is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831806" version="1" comment="perf is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831807" version="1" comment="python3-perf is &lt;4.18.0-80.1.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831808" version="1" comment="hivex is &lt;1.3.15-6.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831809" version="1" comment="hivex-devel is &lt;1.3.15-6.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831810" version="1" comment="libguestfs is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831811" version="1" comment="libguestfs-bash-completion is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831812" version="1" comment="libguestfs-benchmarking is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831813" version="1" comment="libguestfs-devel is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831814" version="1" comment="libguestfs-gfs2 is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831815" version="1" comment="libguestfs-gobject is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831816" version="1" comment="libguestfs-gobject-devel is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831817" version="1" comment="libguestfs-inspect-icons is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831818" version="1" comment="libguestfs-java is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831819" version="1" comment="libguestfs-java-devel is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831820" version="1" comment="libguestfs-javadoc is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831821" version="1" comment="libguestfs-man-pages-ja is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831822" version="1" comment="libguestfs-man-pages-uk is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831823" version="1" comment="libguestfs-rescue is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831824" version="1" comment="libguestfs-rsync is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831825" version="1" comment="libguestfs-tools is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831826" version="1" comment="libguestfs-tools-c is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831827" version="1" comment="libguestfs-winsupport is &lt;8.0-2.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831828" version="1" comment="libguestfs-xfs is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831829" version="1" comment="libiscsi is &lt;1.18.0-6.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831830" version="1" comment="libiscsi-devel is &lt;1.18.0-6.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831831" version="1" comment="libiscsi-utils is &lt;1.18.0-6.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831832" version="1" comment="libssh2 is &lt;1.8.0-7.module+el8.0.0+3075+09be6b65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831833" version="1" comment="libvirt is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831834" version="1" comment="libvirt-admin is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831835" version="1" comment="libvirt-bash-completion is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831836" version="1" comment="libvirt-client is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831837" version="1" comment="libvirt-daemon is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831838" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831839" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831840" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831841" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831842" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831843" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831844" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831845" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831846" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831847" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831848" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831849" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831850" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831851" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831852" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831853" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831854" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831855" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831856" version="1" comment="libvirt-dbus is &lt;1.2.0-2.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831857" version="1" comment="libvirt-devel is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831858" version="1" comment="libvirt-docs is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831859" version="1" comment="libvirt-libs is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831860" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831861" version="1" comment="libvirt-nss is &lt;4.5.0-23.1.module+el8.0.0+3151+3ba813f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831862" version="1" comment="lua-guestfs is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831863" version="1" comment="nbdkit is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831864" version="1" comment="nbdkit-bash-completion is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831865" version="1" comment="nbdkit-basic-plugins is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831866" version="1" comment="nbdkit-devel is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831867" version="1" comment="nbdkit-example-plugins is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831868" version="1" comment="nbdkit-plugin-gzip is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831869" version="1" comment="nbdkit-plugin-python-common is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831870" version="1" comment="nbdkit-plugin-python3 is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831871" version="1" comment="nbdkit-plugin-vddk is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831872" version="1" comment="nbdkit-plugin-xz is &lt;1.4.2-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831873" version="1" comment="netcf is &lt;0.2.8-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831874" version="1" comment="netcf-devel is &lt;0.2.8-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831875" version="1" comment="netcf-libs is &lt;0.2.8-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831876" version="1" comment="perl-Sys-Guestfs is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831877" version="1" comment="perl-Sys-Virt is &lt;4.5.0-4.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831878" version="1" comment="perl-hivex is &lt;1.3.15-6.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831879" version="1" comment="python3-hivex is &lt;1.3.15-6.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831880" version="1" comment="python3-libguestfs is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831881" version="1" comment="python3-libvirt is &lt;4.5.0-1.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831882" version="1" comment="qemu-guest-agent is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831883" version="1" comment="qemu-img is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831884" version="1" comment="qemu-kvm is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831885" version="1" comment="qemu-kvm-block-curl is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831886" version="1" comment="qemu-kvm-block-gluster is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831887" version="1" comment="qemu-kvm-block-iscsi is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831888" version="1" comment="qemu-kvm-block-rbd is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831889" version="1" comment="qemu-kvm-block-ssh is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831890" version="1" comment="qemu-kvm-common is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831891" version="1" comment="qemu-kvm-core is &lt;2.12.0-64.module+el8.0.0+3180+d6a3561d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831892" version="1" comment="ruby-hivex is &lt;1.3.15-6.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831893" version="1" comment="ruby-libguestfs is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831894" version="1" comment="seabios is &lt;1.11.1-3.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831895" version="1" comment="seabios-bin is &lt;1.11.1-3.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831896" version="1" comment="seavgabios-bin is &lt;1.11.1-3.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831897" version="1" comment="sgabios is &lt;0.20170427git-2.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831898" version="1" comment="sgabios-bin is &lt;0.20170427git-2.module+el8.0.0+3075+09be6b65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831899" version="1" comment="supermin is &lt;5.1.19-8.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831900" version="1" comment="supermin-devel is &lt;5.1.19-8.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831901" version="1" comment="virt-dib is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831902" version="1" comment="virt-p2v-maker is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831903" version="1" comment="virt-v2v is &lt;1.38.4-10.module+el8.0.0+3075+09be6b65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831904" version="1" comment="dotnet is &lt;2.1.507-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831905" version="1" comment="dotnet-host is &lt;2.1.11-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831906" version="1" comment="dotnet-host-fxr-2.1 is &lt;2.1.11-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831907" version="1" comment="dotnet-runtime-2.1 is &lt;2.1.11-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831908" version="1" comment="dotnet-sdk-2.1 is &lt;2.1.507-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831909" version="1" comment="dotnet-sdk-2.1.5xx is &lt;2.1.507-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831910" version="1" comment="libvirt is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831911" version="1" comment="libvirt-admin is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831912" version="1" comment="libvirt-bash-completion is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831913" version="1" comment="libvirt-client is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831914" version="1" comment="libvirt-daemon is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831915" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831916" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831917" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831918" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831919" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831920" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831921" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831922" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831923" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831924" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831925" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831926" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831927" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831928" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831929" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831930" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831931" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831932" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831933" version="1" comment="libvirt-devel is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831934" version="1" comment="libvirt-docs is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831935" version="1" comment="libvirt-libs is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831936" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831937" version="1" comment="libvirt-nss is &lt;4.5.0-23.2.module+el8.0.0+3213+f56c86d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831938" version="1" comment="firefox is &lt;60.7.0-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831939" version="1" comment="pacemaker is &lt;2.0.1-4.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831940" version="1" comment="pacemaker-cli is &lt;2.0.1-4.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831941" version="1" comment="pacemaker-cluster-libs is &lt;2.0.1-4.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831942" version="1" comment="pacemaker-cts is &lt;2.0.1-4.el8_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831943" version="1" comment="pacemaker-doc is &lt;2.0.1-4.el8_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831944" version="1" comment="pacemaker-libs is &lt;2.0.1-4.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831945" version="1" comment="pacemaker-libs-devel is &lt;2.0.1-4.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831946" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;2.0.1-4.el8_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831947" version="1" comment="pacemaker-remote is &lt;2.0.1-4.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831948" version="1" comment="pacemaker-schemas is &lt;2.0.1-4.el8_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831949" version="1" comment="thunderbird is &lt;60.7.0-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831950" version="1" comment="bpftool is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831951" version="1" comment="kernel is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831952" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-80.4.2.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831953" version="1" comment="kernel-core is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831954" version="1" comment="kernel-cross-headers is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831955" version="1" comment="kernel-debug is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831956" version="1" comment="kernel-debug-core is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831958" version="1" comment="kernel-debug-modules is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831959" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831961" version="1" comment="kernel-doc is &lt;4.18.0-80.4.2.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831962" version="1" comment="kernel-headers is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831963" version="1" comment="kernel-modules is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831964" version="1" comment="kernel-modules-extra is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831965" version="1" comment="kernel-tools is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831966" version="1" comment="kernel-tools-libs is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831968" version="1" comment="perf is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831969" version="1" comment="python3-perf is &lt;4.18.0-80.4.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831970" version="1" comment="gvfs is &lt;1.36.2-2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831971" version="1" comment="gvfs-afc is &lt;1.36.2-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831972" version="1" comment="gvfs-afp is &lt;1.36.2-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831973" version="1" comment="gvfs-archive is &lt;1.36.2-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831974" version="1" comment="gvfs-client is &lt;1.36.2-2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831975" version="1" comment="gvfs-devel is &lt;1.36.2-2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831976" version="1" comment="gvfs-fuse is &lt;1.36.2-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831977" version="1" comment="gvfs-goa is &lt;1.36.2-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831978" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831979" version="1" comment="gvfs-mtp is &lt;1.36.2-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831980" version="1" comment="gvfs-smb is &lt;1.36.2-2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831981" version="1" comment="java-11-openjdk is &lt;11.0.3.7-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831982" version="1" comment="java-11-openjdk-demo is &lt;11.0.3.7-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831983" version="1" comment="java-11-openjdk-devel is &lt;11.0.3.7-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831984" version="1" comment="java-11-openjdk-headless is &lt;11.0.3.7-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831985" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.3.7-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831986" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.3.7-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831987" version="1" comment="java-11-openjdk-jmods is &lt;11.0.3.7-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831988" version="1" comment="java-11-openjdk-src is &lt;11.0.3.7-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831989" version="1" comment="go-toolset is &lt;1.11.5-2.module+el8.0.0+3175+261ae921 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831990" version="1" comment="golang is &lt;1.11.5-2.module+el8.0.0+3175+261ae921 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831991" version="1" comment="golang-bin is &lt;1.11.5-2.module+el8.0.0+3175+261ae921 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831992" version="1" comment="golang-docs is &lt;1.11.5-2.module+el8.0.0+3175+261ae921 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831993" version="1" comment="golang-misc is &lt;1.11.5-2.module+el8.0.0+3175+261ae921 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831994" version="1" comment="golang-race is &lt;1.11.5-2.module+el8.0.0+3175+261ae921 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831995" version="1" comment="golang-src is &lt;1.11.5-2.module+el8.0.0+3175+261ae921 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831996" version="1" comment="golang-tests is &lt;1.11.5-2.module+el8.0.0+3175+261ae921 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831997" version="1" comment="apache-commons-collections is &lt;3.2.2-10.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831998" version="1" comment="apache-commons-lang is &lt;2.6-21.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009831999" version="1" comment="bea-stax-api is &lt;1.2.0-16.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832000" version="1" comment="glassfish-fastinfoset is &lt;1.2.13-9.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832001" version="1" comment="glassfish-jaxb-api is &lt;2.2.12-8.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832002" version="1" comment="glassfish-jaxb-core is &lt;2.2.11-11.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832003" version="1" comment="glassfish-jaxb-runtime is &lt;2.2.11-11.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832004" version="1" comment="glassfish-jaxb-txw2 is &lt;2.2.11-11.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832005" version="1" comment="jackson-annotations is &lt;2.9.8-1.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832006" version="1" comment="jackson-core is &lt;2.9.8-1.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832007" version="1" comment="jackson-databind is &lt;2.9.8-1.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832008" version="1" comment="jackson-jaxrs-json-provider is &lt;2.9.8-1.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832009" version="1" comment="jackson-jaxrs-providers is &lt;2.9.8-1.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832010" version="1" comment="jackson-module-jaxb-annotations is &lt;2.7.6-4.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832011" version="1" comment="jakarta-commons-httpclient is &lt;3.1-28.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832012" version="1" comment="javassist is &lt;3.18.1-8.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832013" version="1" comment="javassist-javadoc is &lt;3.18.1-8.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832014" version="1" comment="pki-servlet-4.0-api is &lt;9.0.7-14.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832015" version="1" comment="pki-servlet-container is &lt;9.0.7-14.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832016" version="1" comment="python-nss-doc is &lt;1.0.1-10.module+el8.0.0+3248+9d514f3b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832017" version="1" comment="python3-nss is &lt;1.0.1-10.module+el8.0.0+3248+9d514f3b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832018" version="1" comment="relaxngDatatype is &lt;2011.1-7.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832019" version="1" comment="resteasy is &lt;3.0.26-3.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832020" version="1" comment="slf4j is &lt;1.7.25-4.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832021" version="1" comment="slf4j-jdk14 is &lt;1.7.25-4.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832022" version="1" comment="stax-ex is &lt;1.7.7-8.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832023" version="1" comment="velocity is &lt;1.7-24.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832024" version="1" comment="xalan-j2 is &lt;2.7.1-38.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832025" version="1" comment="xerces-j2 is &lt;2.11.0-34.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832026" version="1" comment="xml-commons-apis is &lt;1.4.01-25.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832027" version="1" comment="xml-commons-resolver is &lt;1.2-26.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832028" version="1" comment="xmlstreambuffer is &lt;1.5.4-8.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832029" version="1" comment="xsom is &lt;0-19.20110809svn.module+el8.0.0+3248+9d514f3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832030" version="1" comment="hivex is &lt;1.3.15-6.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832031" version="1" comment="hivex-devel is &lt;1.3.15-6.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832032" version="1" comment="libguestfs is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832033" version="1" comment="libguestfs-bash-completion is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832034" version="1" comment="libguestfs-benchmarking is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832035" version="1" comment="libguestfs-devel is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832036" version="1" comment="libguestfs-gfs2 is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832037" version="1" comment="libguestfs-gobject is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832038" version="1" comment="libguestfs-gobject-devel is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832039" version="1" comment="libguestfs-inspect-icons is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832040" version="1" comment="libguestfs-java is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832041" version="1" comment="libguestfs-java-devel is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832042" version="1" comment="libguestfs-javadoc is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832043" version="1" comment="libguestfs-man-pages-ja is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832044" version="1" comment="libguestfs-man-pages-uk is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832045" version="1" comment="libguestfs-rescue is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832046" version="1" comment="libguestfs-rsync is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832047" version="1" comment="libguestfs-tools is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832048" version="1" comment="libguestfs-tools-c is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832049" version="1" comment="libguestfs-winsupport is &lt;8.0-2.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832050" version="1" comment="libguestfs-xfs is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832051" version="1" comment="libiscsi is &lt;1.18.0-6.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832052" version="1" comment="libiscsi-devel is &lt;1.18.0-6.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832053" version="1" comment="libiscsi-utils is &lt;1.18.0-6.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832054" version="1" comment="libssh2 is &lt;1.8.0-7.module+el8.0.0.z+3418+a72cf898.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832055" version="1" comment="libvirt is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832056" version="1" comment="libvirt-admin is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832057" version="1" comment="libvirt-bash-completion is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832058" version="1" comment="libvirt-client is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832059" version="1" comment="libvirt-daemon is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832060" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832061" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832062" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832063" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832064" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832065" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832066" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832067" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832068" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832069" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832070" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832071" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832072" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832073" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832074" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832075" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832076" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832077" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832078" version="1" comment="libvirt-dbus is &lt;1.2.0-2.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832079" version="1" comment="libvirt-devel is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832080" version="1" comment="libvirt-docs is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832081" version="1" comment="libvirt-libs is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832082" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832083" version="1" comment="libvirt-nss is &lt;4.5.0-23.3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832084" version="1" comment="lua-guestfs is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832085" version="1" comment="nbdkit is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832086" version="1" comment="nbdkit-bash-completion is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832087" version="1" comment="nbdkit-basic-plugins is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832088" version="1" comment="nbdkit-devel is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832089" version="1" comment="nbdkit-example-plugins is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832090" version="1" comment="nbdkit-plugin-gzip is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832091" version="1" comment="nbdkit-plugin-python-common is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832092" version="1" comment="nbdkit-plugin-python3 is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832093" version="1" comment="nbdkit-plugin-vddk is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832094" version="1" comment="nbdkit-plugin-xz is &lt;1.4.2-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832095" version="1" comment="netcf is &lt;0.2.8-10.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832096" version="1" comment="netcf-devel is &lt;0.2.8-10.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832097" version="1" comment="netcf-libs is &lt;0.2.8-10.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832098" version="1" comment="perl-Sys-Guestfs is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832099" version="1" comment="perl-Sys-Virt is &lt;4.5.0-4.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832100" version="1" comment="perl-hivex is &lt;1.3.15-6.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832101" version="1" comment="python3-hivex is &lt;1.3.15-6.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832102" version="1" comment="python3-libguestfs is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832103" version="1" comment="python3-libvirt is &lt;4.5.0-1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832104" version="1" comment="qemu-guest-agent is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832105" version="1" comment="qemu-img is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832106" version="1" comment="qemu-kvm is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832107" version="1" comment="qemu-kvm-block-curl is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832108" version="1" comment="qemu-kvm-block-gluster is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832109" version="1" comment="qemu-kvm-block-iscsi is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832110" version="1" comment="qemu-kvm-block-rbd is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832111" version="1" comment="qemu-kvm-block-ssh is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832112" version="1" comment="qemu-kvm-common is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832113" version="1" comment="qemu-kvm-core is &lt;2.12.0-64.module+el8.0.0.z+3418+a72cf898.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832114" version="1" comment="ruby-hivex is &lt;1.3.15-6.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832115" version="1" comment="ruby-libguestfs is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832116" version="1" comment="seabios is &lt;1.11.1-3.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832117" version="1" comment="seabios-bin is &lt;1.11.1-3.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832118" version="1" comment="seavgabios-bin is &lt;1.11.1-3.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832119" version="1" comment="sgabios is &lt;0.20170427git-2.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832120" version="1" comment="sgabios-bin is &lt;0.20170427git-2.module+el8.0.0.z+3418+a72cf898 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832121" version="1" comment="supermin is &lt;5.1.19-8.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832122" version="1" comment="supermin-devel is &lt;5.1.19-8.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832123" version="1" comment="virt-dib is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832124" version="1" comment="virt-p2v-maker is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832125" version="1" comment="virt-v2v is &lt;1.38.4-10.1.module+el8.0.0.z+3418+a72cf898 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825885" version="1" comment="vim-X11 is &lt;8.0.1763-11.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825886" version="1" comment="vim-common is &lt;8.0.1763-11.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825887" version="1" comment="vim-enhanced is &lt;8.0.1763-11.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825888" version="1" comment="vim-filesystem is &lt;8.0.1763-11.el8_0 for noarch,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825889" version="1" comment="vim-minimal is &lt;8.0.1763-11.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832126" version="1" comment="thunderbird is &lt;60.7.2-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832127" version="1" comment="firefox is &lt;60.7.2-3.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832128" version="1" comment="bind is &lt;9.11.4-17.P2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832129" version="1" comment="bind-chroot is &lt;9.11.4-17.P2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832130" version="1" comment="bind-devel is &lt;9.11.4-17.P2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832131" version="1" comment="bind-export-devel is &lt;9.11.4-17.P2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832132" version="1" comment="bind-export-libs is &lt;9.11.4-17.P2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832133" version="1" comment="bind-libs is &lt;9.11.4-17.P2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832134" version="1" comment="bind-libs-lite is &lt;9.11.4-17.P2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832135" version="1" comment="bind-license is &lt;9.11.4-17.P2.el8_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832136" version="1" comment="bind-lite-devel is &lt;9.11.4-17.P2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832137" version="1" comment="bind-pkcs11 is &lt;9.11.4-17.P2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832138" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-17.P2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832139" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-17.P2.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832140" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-17.P2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832141" version="1" comment="bind-sdb is &lt;9.11.4-17.P2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832142" version="1" comment="bind-sdb-chroot is &lt;9.11.4-17.P2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832143" version="1" comment="bind-utils is &lt;9.11.4-17.P2.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832144" version="1" comment="python3-bind is &lt;9.11.4-17.P2.el8_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832145" version="1" comment="firefox is &lt;60.8.0-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832146" version="1" comment="cyrus-imapd is &lt;3.0.7-15.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832147" version="1" comment="cyrus-imapd-utils is &lt;3.0.7-15.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832148" version="1" comment="cyrus-imapd-vzic is &lt;3.0.7-15.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832149" version="1" comment="thunderbird is &lt;60.8.0-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832150" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.222.b10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832151" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.222.b10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832152" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.222.b10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832153" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.222.b10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832154" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.222.b10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832155" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.222.b10-0.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832156" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.222.b10-0.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832157" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.222.b10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832158" version="1" comment="java-11-openjdk is &lt;11.0.4.11-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832159" version="1" comment="java-11-openjdk-demo is &lt;11.0.4.11-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832160" version="1" comment="java-11-openjdk-devel is &lt;11.0.4.11-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832161" version="1" comment="java-11-openjdk-headless is &lt;11.0.4.11-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832162" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.4.11-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832163" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.4.11-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832164" version="1" comment="java-11-openjdk-jmods is &lt;11.0.4.11-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832165" version="1" comment="java-11-openjdk-src is &lt;11.0.4.11-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832166" version="1" comment="nspr is &lt;4.21.0-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832167" version="1" comment="nspr-devel is &lt;4.21.0-2.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832168" version="1" comment="nss is &lt;3.44.0-7.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832169" version="1" comment="nss-devel is &lt;3.44.0-7.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832170" version="1" comment="nss-softokn is &lt;3.44.0-7.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832171" version="1" comment="nss-softokn-devel is &lt;3.44.0-7.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832172" version="1" comment="nss-softokn-freebl is &lt;3.44.0-7.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832173" version="1" comment="nss-softokn-freebl-devel is &lt;3.44.0-7.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832174" version="1" comment="nss-sysinit is &lt;3.44.0-7.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832175" version="1" comment="nss-tools is &lt;3.44.0-7.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832176" version="1" comment="nss-util is &lt;3.44.0-7.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832177" version="1" comment="nss-util-devel is &lt;3.44.0-7.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832178" version="1" comment="bpftool is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832179" version="1" comment="kernel is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832180" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-80.7.1.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832181" version="1" comment="kernel-core is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832182" version="1" comment="kernel-cross-headers is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832183" version="1" comment="kernel-debug is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832184" version="1" comment="kernel-debug-core is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832186" version="1" comment="kernel-debug-modules is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832187" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832189" version="1" comment="kernel-doc is &lt;4.18.0-80.7.1.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832190" version="1" comment="kernel-headers is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832191" version="1" comment="kernel-modules is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832192" version="1" comment="kernel-modules-extra is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832193" version="1" comment="kernel-tools is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832194" version="1" comment="kernel-tools-libs is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832196" version="1" comment="perf is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832197" version="1" comment="python3-perf is &lt;4.18.0-80.7.1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832198" version="1" comment="ruby is &lt;2.5.3-104.module+el8.0.0+3250+4b7d6d43 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832199" version="1" comment="ruby-devel is &lt;2.5.3-104.module+el8.0.0+3250+4b7d6d43 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832200" version="1" comment="ruby-doc is &lt;2.5.3-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832201" version="1" comment="ruby-irb is &lt;2.5.3-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832202" version="1" comment="ruby-libs is &lt;2.5.3-104.module+el8.0.0+3250+4b7d6d43 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832203" version="1" comment="rubygem-abrt is &lt;0.3.0-4.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832204" version="1" comment="rubygem-abrt-doc is &lt;0.3.0-4.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832205" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-104.module+el8.0.0+3250+4b7d6d43 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832206" version="1" comment="rubygem-bson is &lt;4.3.0-2.module+el8.0.0+3250+4b7d6d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832207" version="1" comment="rubygem-bson-doc is &lt;4.3.0-2.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832208" version="1" comment="rubygem-bundler is &lt;1.16.1-3.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832209" version="1" comment="rubygem-bundler-doc is &lt;1.16.1-3.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832210" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832211" version="1" comment="rubygem-io-console is &lt;0.4.6-104.module+el8.0.0+3250+4b7d6d43 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832212" version="1" comment="rubygem-json is &lt;2.1.0-104.module+el8.0.0+3250+4b7d6d43 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832213" version="1" comment="rubygem-minitest is &lt;5.10.3-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832214" version="1" comment="rubygem-mongo is &lt;2.5.1-2.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832215" version="1" comment="rubygem-mongo-doc is &lt;2.5.1-2.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832216" version="1" comment="rubygem-mysql2 is &lt;0.4.10-4.module+el8.0.0+3250+4b7d6d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832217" version="1" comment="rubygem-mysql2-doc is &lt;0.4.10-4.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832218" version="1" comment="rubygem-net-telnet is &lt;0.1.1-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832219" version="1" comment="rubygem-openssl is &lt;2.1.2-104.module+el8.0.0+3250+4b7d6d43 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832220" version="1" comment="rubygem-pg is &lt;1.0.0-2.module+el8.0.0+3250+4b7d6d43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832221" version="1" comment="rubygem-pg-doc is &lt;1.0.0-2.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832222" version="1" comment="rubygem-power_assert is &lt;1.1.1-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832223" version="1" comment="rubygem-psych is &lt;3.0.2-104.module+el8.0.0+3250+4b7d6d43 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832224" version="1" comment="rubygem-rake is &lt;12.3.0-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832225" version="1" comment="rubygem-rdoc is &lt;6.0.1-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832226" version="1" comment="rubygem-test-unit is &lt;3.2.7-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832227" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832228" version="1" comment="rubygems is &lt;2.7.6-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832229" version="1" comment="rubygems-devel is &lt;2.7.6-104.module+el8.0.0+3250+4b7d6d43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832230" version="1" comment="redis is &lt;5.0.3-2.module+el8.0.0.z+3657+acb471dc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832231" version="1" comment="redis-devel is &lt;5.0.3-2.module+el8.0.0.z+3657+acb471dc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832232" version="1" comment="redis-doc is &lt;5.0.3-2.module+el8.0.0.z+3657+acb471dc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832233" version="1" comment="icedtea-web is &lt;1.7.1-17.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832234" version="1" comment="icedtea-web-javadoc is &lt;1.7.1-17.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832235" version="1" comment="bpftool is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832236" version="1" comment="kernel is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832237" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-80.7.2.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832238" version="1" comment="kernel-core is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832239" version="1" comment="kernel-cross-headers is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832240" version="1" comment="kernel-debug is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832241" version="1" comment="kernel-debug-core is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832243" version="1" comment="kernel-debug-modules is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832244" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832246" version="1" comment="kernel-doc is &lt;4.18.0-80.7.2.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832247" version="1" comment="kernel-headers is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832248" version="1" comment="kernel-modules is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832249" version="1" comment="kernel-modules-extra is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832250" version="1" comment="kernel-tools is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832251" version="1" comment="kernel-tools-libs is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832253" version="1" comment="perf is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832254" version="1" comment="python3-perf is &lt;4.18.0-80.7.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832255" version="1" comment="ghostscript is &lt;9.25-2.el8_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832256" version="1" comment="ghostscript-doc is &lt;9.25-2.el8_0.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832257" version="1" comment="ghostscript-tools-dvipdf is &lt;9.25-2.el8_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832258" version="1" comment="ghostscript-tools-fonts is &lt;9.25-2.el8_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832259" version="1" comment="ghostscript-tools-printing is &lt;9.25-2.el8_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832260" version="1" comment="ghostscript-x11 is &lt;9.25-2.el8_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832261" version="1" comment="libgs is &lt;9.25-2.el8_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832262" version="1" comment="libgs-devel is &lt;9.25-2.el8_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832263" version="1" comment="mecab is &lt;0.996-1.module+el8.0.0+3898+e09bb8de.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832264" version="1" comment="mecab-ipadic is &lt;2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832265" version="1" comment="mecab-ipadic-EUCJP is &lt;2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832266" version="1" comment="mysql is &lt;8.0.17-3.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832267" version="1" comment="mysql-common is &lt;8.0.17-3.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832268" version="1" comment="mysql-devel is &lt;8.0.17-3.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832269" version="1" comment="mysql-errmsg is &lt;8.0.17-3.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832270" version="1" comment="mysql-libs is &lt;8.0.17-3.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832271" version="1" comment="mysql-server is &lt;8.0.17-3.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832272" version="1" comment="mysql-test is &lt;8.0.17-3.module+el8.0.0+3898+e09bb8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832273" version="1" comment="libserf is &lt;1.3.9-9.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832274" version="1" comment="mod_dav_svn is &lt;1.10.2-2.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832275" version="1" comment="subversion is &lt;1.10.2-2.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832276" version="1" comment="subversion-devel is &lt;1.10.2-2.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832277" version="1" comment="subversion-gnome is &lt;1.10.2-2.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832278" version="1" comment="subversion-javahl is &lt;1.10.2-2.module+el8.0.0+3900+919b6753 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832279" version="1" comment="subversion-libs is &lt;1.10.2-2.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832280" version="1" comment="subversion-perl is &lt;1.10.2-2.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832281" version="1" comment="subversion-tools is &lt;1.10.2-2.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832282" version="1" comment="utf8proc is &lt;2.1.1-5.module+el8.0.0+3900+919b6753 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832283" version="1" comment="pango is &lt;1.42.4-5.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832284" version="1" comment="pango-devel is &lt;1.42.4-5.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832285" version="1" comment="ghostscript is &lt;9.25-2.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832286" version="1" comment="ghostscript-doc is &lt;9.25-2.el8_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832287" version="1" comment="ghostscript-tools-dvipdf is &lt;9.25-2.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832288" version="1" comment="ghostscript-tools-fonts is &lt;9.25-2.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832289" version="1" comment="ghostscript-tools-printing is &lt;9.25-2.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832290" version="1" comment="ghostscript-x11 is &lt;9.25-2.el8_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832291" version="1" comment="libgs is &lt;9.25-2.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832292" version="1" comment="libgs-devel is &lt;9.25-2.el8_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832293" version="1" comment="libecap is &lt;1.0.1-2.module+el8.0.0+4045+70edde92 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832294" version="1" comment="libecap-devel is &lt;1.0.1-2.module+el8.0.0+4045+70edde92 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832295" version="1" comment="squid is &lt;4.4-5.module+el8.0.0+4045+70edde92 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832296" version="1" comment="firefox is &lt;68.1.0-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832297" version="1" comment="libnghttp2 is &lt;1.33.0-1.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832298" version="1" comment="libnghttp2-devel is &lt;1.33.0-1.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832299" version="1" comment="nghttp2 is &lt;1.33.0-1.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832300" version="1" comment="bpftool is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832301" version="1" comment="kernel is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832302" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-80.11.1.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832303" version="1" comment="kernel-core is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832304" version="1" comment="kernel-cross-headers is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832305" version="1" comment="kernel-debug is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832306" version="1" comment="kernel-debug-core is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832308" version="1" comment="kernel-debug-modules is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832309" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832311" version="1" comment="kernel-doc is &lt;4.18.0-80.11.1.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832312" version="1" comment="kernel-headers is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832313" version="1" comment="kernel-modules is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832314" version="1" comment="kernel-modules-extra is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832315" version="1" comment="kernel-tools is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832316" version="1" comment="kernel-tools-libs is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832318" version="1" comment="perf is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832319" version="1" comment="python3-perf is &lt;4.18.0-80.11.1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832320" version="1" comment="poppler is &lt;0.66.0-11.el8_0.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832321" version="1" comment="poppler-cpp is &lt;0.66.0-11.el8_0.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832322" version="1" comment="poppler-cpp-devel is &lt;0.66.0-11.el8_0.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832323" version="1" comment="poppler-devel is &lt;0.66.0-11.el8_0.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832324" version="1" comment="poppler-glib is &lt;0.66.0-11.el8_0.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832325" version="1" comment="poppler-glib-devel is &lt;0.66.0-11.el8_0.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832326" version="1" comment="poppler-qt5 is &lt;0.66.0-11.el8_0.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832327" version="1" comment="poppler-qt5-devel is &lt;0.66.0-11.el8_0.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832328" version="1" comment="poppler-utils is &lt;0.66.0-11.el8_0.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832329" version="1" comment="apache-commons-collections is &lt;3.2.2-10.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832330" version="1" comment="apache-commons-lang is &lt;2.6-21.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832331" version="1" comment="bea-stax-api is &lt;1.2.0-16.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832332" version="1" comment="glassfish-fastinfoset is &lt;1.2.13-9.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832333" version="1" comment="glassfish-jaxb-api is &lt;2.2.12-8.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832334" version="1" comment="glassfish-jaxb-core is &lt;2.2.11-11.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832335" version="1" comment="glassfish-jaxb-runtime is &lt;2.2.11-11.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832336" version="1" comment="glassfish-jaxb-txw2 is &lt;2.2.11-11.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832337" version="1" comment="jackson-annotations is &lt;2.9.9-1.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832338" version="1" comment="jackson-core is &lt;2.9.9-1.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832339" version="1" comment="jackson-databind is &lt;2.9.9.2-1.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832340" version="1" comment="jackson-jaxrs-json-provider is &lt;2.9.9-1.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832341" version="1" comment="jackson-jaxrs-providers is &lt;2.9.9-1.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832342" version="1" comment="jackson-module-jaxb-annotations is &lt;2.7.6-4.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832343" version="1" comment="jakarta-commons-httpclient is &lt;3.1-28.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832344" version="1" comment="javassist is &lt;3.18.1-8.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832345" version="1" comment="javassist-javadoc is &lt;3.18.1-8.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832346" version="1" comment="pki-servlet-4.0-api is &lt;9.0.7-14.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832347" version="1" comment="pki-servlet-container is &lt;9.0.7-14.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832348" version="1" comment="python-nss-doc is &lt;1.0.1-10.module+el8.0.0+3892+c903d3f0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832349" version="1" comment="python3-nss is &lt;1.0.1-10.module+el8.0.0+3892+c903d3f0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832350" version="1" comment="relaxngDatatype is &lt;2011.1-7.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832351" version="1" comment="resteasy is &lt;3.0.26-3.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832352" version="1" comment="slf4j is &lt;1.7.25-4.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832353" version="1" comment="slf4j-jdk14 is &lt;1.7.25-4.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832354" version="1" comment="stax-ex is &lt;1.7.7-8.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832355" version="1" comment="velocity is &lt;1.7-24.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832356" version="1" comment="xalan-j2 is &lt;2.7.1-38.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832357" version="1" comment="xerces-j2 is &lt;2.11.0-34.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832358" version="1" comment="xml-commons-apis is &lt;1.4.01-25.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832359" version="1" comment="xml-commons-resolver is &lt;1.2-26.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832360" version="1" comment="xmlstreambuffer is &lt;1.5.4-8.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832361" version="1" comment="xsom is &lt;0-19.20110809svn.module+el8.0.0+3892+c903d3f0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832362" version="1" comment="libwmf is &lt;0.2.9-8.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832363" version="1" comment="libwmf-devel is &lt;0.2.9-8.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832364" version="1" comment="libwmf-lite is &lt;0.2.9-8.el8_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832365" version="1" comment="go-toolset is &lt;1.11.13-1.module+el8.0.1+4087+d8180914 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832366" version="1" comment="golang is &lt;1.11.13-2.module+el8.0.1+4087+d8180914 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832367" version="1" comment="golang-bin is &lt;1.11.13-2.module+el8.0.1+4087+d8180914 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832368" version="1" comment="golang-docs is &lt;1.11.13-2.module+el8.0.1+4087+d8180914 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832369" version="1" comment="golang-misc is &lt;1.11.13-2.module+el8.0.1+4087+d8180914 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832370" version="1" comment="golang-race is &lt;1.11.13-2.module+el8.0.1+4087+d8180914 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832371" version="1" comment="golang-src is &lt;1.11.13-2.module+el8.0.1+4087+d8180914 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832372" version="1" comment="golang-tests is &lt;1.11.13-2.module+el8.0.1+4087+d8180914 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832373" version="1" comment="dotnet is &lt;2.1.509-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832374" version="1" comment="dotnet-host is &lt;2.1.13-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832375" version="1" comment="dotnet-host-fxr-2.1 is &lt;2.1.13-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832376" version="1" comment="dotnet-runtime-2.1 is &lt;2.1.13-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832377" version="1" comment="dotnet-sdk-2.1 is &lt;2.1.509-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832378" version="1" comment="dotnet-sdk-2.1.5xx is &lt;2.1.509-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832379" version="1" comment="thunderbird is &lt;60.9.0-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832380" version="1" comment="patch is &lt;2.7.6-9.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832381" version="1" comment="nginx is &lt;1.14.1-9.module+el8.0.0+4108+af250afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832382" version="1" comment="nginx-all-modules is &lt;1.14.1-9.module+el8.0.0+4108+af250afe for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832383" version="1" comment="nginx-filesystem is &lt;1.14.1-9.module+el8.0.0+4108+af250afe for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832384" version="1" comment="nginx-mod-http-image-filter is &lt;1.14.1-9.module+el8.0.0+4108+af250afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832385" version="1" comment="nginx-mod-http-perl is &lt;1.14.1-9.module+el8.0.0+4108+af250afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832386" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.14.1-9.module+el8.0.0+4108+af250afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832387" version="1" comment="nginx-mod-mail is &lt;1.14.1-9.module+el8.0.0+4108+af250afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832388" version="1" comment="nginx-mod-stream is &lt;1.14.1-9.module+el8.0.0+4108+af250afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832389" version="1" comment="dovecot is &lt;2.2.36-5.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832390" version="1" comment="dovecot-devel is &lt;2.2.36-5.el8_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832391" version="1" comment="dovecot-mysql is &lt;2.2.36-5.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832392" version="1" comment="dovecot-pgsql is &lt;2.2.36-5.el8_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832393" version="1" comment="bpftool is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832394" version="1" comment="kernel is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832395" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-80.11.2.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832396" version="1" comment="kernel-core is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832397" version="1" comment="kernel-cross-headers is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832398" version="1" comment="kernel-debug is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832399" version="1" comment="kernel-debug-core is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832401" version="1" comment="kernel-debug-modules is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832402" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832404" version="1" comment="kernel-doc is &lt;4.18.0-80.11.2.el8_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832405" version="1" comment="kernel-headers is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832406" version="1" comment="kernel-modules is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832407" version="1" comment="kernel-modules-extra is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832408" version="1" comment="kernel-tools is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832409" version="1" comment="kernel-tools-libs is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832411" version="1" comment="perf is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832412" version="1" comment="python3-perf is &lt;4.18.0-80.11.2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832413" version="1" comment="httpd is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832414" version="1" comment="httpd-devel is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832415" version="1" comment="httpd-filesystem is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832416" version="1" comment="httpd-manual is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832417" version="1" comment="httpd-tools is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832418" version="1" comment="mod_http2 is &lt;1.11.3-3.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832419" version="1" comment="mod_ldap is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832420" version="1" comment="mod_md is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832421" version="1" comment="mod_proxy_html is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832422" version="1" comment="mod_session is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832423" version="1" comment="mod_ssl is &lt;2.4.37-12.module+el8.0.0+4096+eb40e6da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832424" version="1" comment="nodejs is &lt;10.16.3-2.module+el8.0.0+4214+49953fda for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832425" version="1" comment="nodejs-devel is &lt;10.16.3-2.module+el8.0.0+4214+49953fda for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832426" version="1" comment="nodejs-docs is &lt;10.16.3-2.module+el8.0.0+4214+49953fda for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832427" version="1" comment="nodejs-nodemon is &lt;1.18.3-1.module+el8+2632+6c5111ed for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832428" version="1" comment="nodejs-packaging is &lt;17-3.module+el8+2873+aa7dfd9a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832429" version="1" comment="npm is &lt;6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832430" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.232.b09-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832431" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.232.b09-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832432" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.232.b09-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832433" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.232.b09-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832434" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.232.b09-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832435" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.232.b09-0.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832436" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.232.b09-0.el8_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832437" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.232.b09-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832438" version="1" comment="java-11-openjdk is &lt;11.0.5.10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832439" version="1" comment="java-11-openjdk-demo is &lt;11.0.5.10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832440" version="1" comment="java-11-openjdk-devel is &lt;11.0.5.10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832441" version="1" comment="java-11-openjdk-headless is &lt;11.0.5.10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832442" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.5.10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832443" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.5.10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832444" version="1" comment="java-11-openjdk-jmods is &lt;11.0.5.10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832445" version="1" comment="java-11-openjdk-src is &lt;11.0.5.10-0.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832446" version="1" comment="firefox is &lt;68.2.0-2.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832447" version="1" comment="thunderbird is &lt;68.2.0-1.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832448" version="1" comment="babel is &lt;2.5.1-9.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832449" version="1" comment="python-nose-docs is &lt;1.3.7-30.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832450" version="1" comment="python-psycopg2-doc is &lt;2.7.5-7.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832451" version="1" comment="python-sqlalchemy-doc is &lt;1.3.2-1.module+el8.1.0+2994+98e054d6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832452" version="1" comment="python2 is &lt;2.7.16-12.module+el8.1.0+4148+33a50073 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832453" version="1" comment="python2-Cython is &lt;0.28.1-7.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832454" version="1" comment="python2-PyMySQL is &lt;0.8.0-10.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832455" version="1" comment="python2-attrs is &lt;17.4.0-10.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832456" version="1" comment="python2-babel is &lt;2.5.1-9.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832457" version="1" comment="python2-backports is &lt;1.0-15.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832458" version="1" comment="python2-backports-ssl_match_hostname is &lt;3.5.0.1-11.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832459" version="1" comment="python2-bson is &lt;3.6.1-11.module+el8.1.0+3446+c3d52da3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832460" version="1" comment="python2-chardet is &lt;3.0.4-10.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832461" version="1" comment="python2-coverage is &lt;4.5.1-4.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832462" version="1" comment="python2-debug is &lt;2.7.16-12.module+el8.1.0+4148+33a50073 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832463" version="1" comment="python2-devel is &lt;2.7.16-12.module+el8.1.0+4148+33a50073 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832464" version="1" comment="python2-dns is &lt;1.15.0-10.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832465" version="1" comment="python2-docs is &lt;2.7.16-2.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832466" version="1" comment="python2-docs-info is &lt;2.7.16-2.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832467" version="1" comment="python2-docutils is &lt;0.14-12.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832468" version="1" comment="python2-funcsigs is &lt;1.0.2-13.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832469" version="1" comment="python2-idna is &lt;2.5-7.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832470" version="1" comment="python2-ipaddress is &lt;1.0.18-6.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832471" version="1" comment="python2-jinja2 is &lt;2.10-8.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832472" version="1" comment="python2-libs is &lt;2.7.16-12.module+el8.1.0+4148+33a50073 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832473" version="1" comment="python2-lxml is &lt;4.2.3-3.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832474" version="1" comment="python2-markupsafe is &lt;0.23-19.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832475" version="1" comment="python2-mock is &lt;2.0.0-13.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832476" version="1" comment="python2-nose is &lt;1.3.7-30.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832477" version="1" comment="python2-numpy is &lt;1.14.2-13.module+el8.1.0+3323+7ac3e00f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832478" version="1" comment="python2-numpy-doc is &lt;1.14.2-13.module+el8.1.0+3323+7ac3e00f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832479" version="1" comment="python2-numpy-f2py is &lt;1.14.2-13.module+el8.1.0+3323+7ac3e00f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832480" version="1" comment="python2-pip is &lt;9.0.3-14.module+el8.1.0+3446+c3d52da3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832481" version="1" comment="python2-pip-wheel is &lt;9.0.3-14.module+el8.1.0+3446+c3d52da3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832482" version="1" comment="python2-pluggy is &lt;0.6.0-8.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832483" version="1" comment="python2-psycopg2 is &lt;2.7.5-7.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832484" version="1" comment="python2-psycopg2-debug is &lt;2.7.5-7.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832485" version="1" comment="python2-psycopg2-tests is &lt;2.7.5-7.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832486" version="1" comment="python2-py is &lt;1.5.3-6.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832487" version="1" comment="python2-pygments is &lt;2.2.0-20.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832488" version="1" comment="python2-pymongo is &lt;3.6.1-11.module+el8.1.0+3446+c3d52da3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832489" version="1" comment="python2-pymongo-gridfs is &lt;3.6.1-11.module+el8.1.0+3446+c3d52da3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832490" version="1" comment="python2-pysocks is &lt;1.6.8-6.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832491" version="1" comment="python2-pytest is &lt;3.4.2-13.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832492" version="1" comment="python2-pytest-mock is &lt;1.9.0-4.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832493" version="1" comment="python2-pytz is &lt;2017.2-12.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832494" version="1" comment="python2-pyyaml is &lt;3.12-16.module+el8.1.0+3111+de3f2d8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832495" version="1" comment="python2-requests is &lt;2.20.0-2.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832496" version="1" comment="python2-rpm-macros is &lt;3-38.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832497" version="1" comment="python2-scipy is &lt;1.0.0-20.module+el8.1.0+3323+7ac3e00f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832498" version="1" comment="python2-setuptools is &lt;39.0.1-11.module+el8.1.0+3446+c3d52da3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832499" version="1" comment="python2-setuptools-wheel is &lt;39.0.1-11.module+el8.1.0+3446+c3d52da3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832500" version="1" comment="python2-setuptools_scm is &lt;1.15.7-6.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832501" version="1" comment="python2-six is &lt;1.11.0-5.module+el8.1.0+3111+de3f2d8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832502" version="1" comment="python2-sqlalchemy is &lt;1.3.2-1.module+el8.1.0+2994+98e054d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832503" version="1" comment="python2-test is &lt;2.7.16-12.module+el8.1.0+4148+33a50073 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832504" version="1" comment="python2-tkinter is &lt;2.7.16-12.module+el8.1.0+4148+33a50073 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832505" version="1" comment="python2-tools is &lt;2.7.16-12.module+el8.1.0+4148+33a50073 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832506" version="1" comment="python2-urllib3 is &lt;1.24.2-1.module+el8.1.0+3280+19512f10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832507" version="1" comment="python2-virtualenv is &lt;15.1.0-19.module+el8.1.0+3507+d69c168d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832508" version="1" comment="python2-wheel is &lt;0.31.1-2.module+el8.1.0+3725+aac5cd17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832509" version="1" comment="python2-wheel-wheel is &lt;0.31.1-2.module+el8.1.0+3725+aac5cd17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832510" version="1" comment="edk2-ovmf is &lt;20190308git89910a39dcfd-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832511" version="1" comment="hivex is &lt;1.3.15-7.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832512" version="1" comment="hivex-devel is &lt;1.3.15-7.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832513" version="1" comment="libguestfs is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832514" version="1" comment="libguestfs-bash-completion is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832515" version="1" comment="libguestfs-benchmarking is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832516" version="1" comment="libguestfs-devel is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832517" version="1" comment="libguestfs-gfs2 is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832518" version="1" comment="libguestfs-gobject is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832519" version="1" comment="libguestfs-gobject-devel is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832520" version="1" comment="libguestfs-inspect-icons is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832521" version="1" comment="libguestfs-java is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832522" version="1" comment="libguestfs-java-devel is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832523" version="1" comment="libguestfs-javadoc is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832524" version="1" comment="libguestfs-man-pages-ja is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832525" version="1" comment="libguestfs-man-pages-uk is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832526" version="1" comment="libguestfs-rescue is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832527" version="1" comment="libguestfs-rsync is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832528" version="1" comment="libguestfs-tools is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832529" version="1" comment="libguestfs-tools-c is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832530" version="1" comment="libguestfs-winsupport is &lt;8.0-4.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832531" version="1" comment="libguestfs-xfs is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832532" version="1" comment="libiscsi is &lt;1.18.0-8.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832533" version="1" comment="libiscsi-devel is &lt;1.18.0-8.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832534" version="1" comment="libiscsi-utils is &lt;1.18.0-8.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832535" version="1" comment="libvirt is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832536" version="1" comment="libvirt-admin is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832537" version="1" comment="libvirt-bash-completion is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832538" version="1" comment="libvirt-client is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832539" version="1" comment="libvirt-daemon is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832540" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832541" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832542" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832543" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832544" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832545" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832546" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832547" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832548" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832549" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832550" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832551" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832552" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832553" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832554" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832555" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832556" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832557" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832558" version="1" comment="libvirt-dbus is &lt;1.2.0-3.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832559" version="1" comment="libvirt-devel is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832560" version="1" comment="libvirt-docs is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832561" version="1" comment="libvirt-libs is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832562" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832563" version="1" comment="libvirt-nss is &lt;4.5.0-35.module+el8.1.0+4227+b2722cb3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832564" version="1" comment="lua-guestfs is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832565" version="1" comment="nbdkit is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832566" version="1" comment="nbdkit-bash-completion is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832567" version="1" comment="nbdkit-basic-plugins is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832568" version="1" comment="nbdkit-devel is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832569" version="1" comment="nbdkit-example-plugins is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832570" version="1" comment="nbdkit-plugin-gzip is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832571" version="1" comment="nbdkit-plugin-python-common is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832572" version="1" comment="nbdkit-plugin-python3 is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832573" version="1" comment="nbdkit-plugin-vddk is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832574" version="1" comment="nbdkit-plugin-xz is &lt;1.4.2-5.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832575" version="1" comment="netcf is &lt;0.2.8-12.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832576" version="1" comment="netcf-devel is &lt;0.2.8-12.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832577" version="1" comment="netcf-libs is &lt;0.2.8-12.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832578" version="1" comment="ocaml-hivex is &lt;1.3.15-7.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832579" version="1" comment="ocaml-hivex-devel is &lt;1.3.15-7.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832580" version="1" comment="ocaml-libguestfs is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832581" version="1" comment="ocaml-libguestfs-devel is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832582" version="1" comment="perl-Sys-Guestfs is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832583" version="1" comment="perl-Sys-Virt is &lt;4.5.0-5.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832584" version="1" comment="perl-hivex is &lt;1.3.15-7.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832585" version="1" comment="python3-hivex is &lt;1.3.15-7.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832586" version="1" comment="python3-libguestfs is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832587" version="1" comment="python3-libvirt is &lt;4.5.0-2.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832588" version="1" comment="qemu-guest-agent is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832589" version="1" comment="qemu-img is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832590" version="1" comment="qemu-kvm is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832591" version="1" comment="qemu-kvm-block-curl is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832592" version="1" comment="qemu-kvm-block-gluster is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832593" version="1" comment="qemu-kvm-block-iscsi is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832594" version="1" comment="qemu-kvm-block-rbd is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832595" version="1" comment="qemu-kvm-block-ssh is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832596" version="1" comment="qemu-kvm-common is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832597" version="1" comment="qemu-kvm-core is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832598" version="1" comment="qemu-kvm-tests is &lt;2.12.0-88.module+el8.1.0+4233+bc44be3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832599" version="1" comment="ruby-hivex is &lt;1.3.15-7.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832600" version="1" comment="ruby-libguestfs is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832601" version="1" comment="seabios is &lt;1.11.1-4.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832602" version="1" comment="seabios-bin is &lt;1.11.1-4.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832603" version="1" comment="seavgabios-bin is &lt;1.11.1-4.module+el8.1.0+4066+0f1aadab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832604" version="1" comment="sgabios is &lt;0.20170427git-3.module+el8.1.0+4066+0f1aadab for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832605" version="1" comment="supermin is &lt;5.1.19-9.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832606" version="1" comment="supermin-devel is &lt;5.1.19-9.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832607" version="1" comment="virt-dib is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832608" version="1" comment="virt-p2v-maker is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832609" version="1" comment="virt-v2v is &lt;1.38.4-14.module+el8.1.0+4066+0f1aadab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832610" version="1" comment="gdb is &lt;8.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832611" version="1" comment="gdb-doc is &lt;8.2-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832612" version="1" comment="gdb-gdbserver is &lt;8.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832613" version="1" comment="gdb-headless is &lt;8.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832614" version="1" comment="freeradius is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832615" version="1" comment="freeradius-devel is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832616" version="1" comment="freeradius-doc is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832617" version="1" comment="freeradius-krb5 is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832618" version="1" comment="freeradius-ldap is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832619" version="1" comment="freeradius-mysql is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832620" version="1" comment="freeradius-perl is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832621" version="1" comment="freeradius-postgresql is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832622" version="1" comment="freeradius-rest is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832623" version="1" comment="freeradius-sqlite is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832624" version="1" comment="freeradius-unixODBC is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832625" version="1" comment="freeradius-utils is &lt;3.0.17-6.module+el8.1.0+3392+9bd8939b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832626" version="1" comment="gnome-boxes is &lt;3.28.5-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832627" version="1" comment="libosinfo is &lt;1.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832628" version="1" comment="osinfo-db is &lt;20190611-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832629" version="1" comment="osinfo-db-tools is &lt;1.5.0-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832630" version="1" comment="qt5-assistant is &lt;5.11.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832631" version="1" comment="qt5-designer is &lt;5.11.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832632" version="1" comment="qt5-doctools is &lt;5.11.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832633" version="1" comment="qt5-linguist is &lt;5.11.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832634" version="1" comment="qt5-qdbusviewer is &lt;5.11.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832635" version="1" comment="qt5-qtbase is &lt;5.11.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832636" version="1" comment="qt5-qtbase-common is &lt;5.11.1-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832637" version="1" comment="qt5-qtbase-devel is &lt;5.11.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832638" version="1" comment="qt5-qtbase-examples is &lt;5.11.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832639" version="1" comment="qt5-qtbase-gui is &lt;5.11.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832640" version="1" comment="qt5-qtbase-mysql is &lt;5.11.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832641" version="1" comment="qt5-qtbase-odbc is &lt;5.11.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832642" version="1" comment="qt5-qtbase-postgresql is &lt;5.11.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832643" version="1" comment="qt5-qtbase-static is &lt;5.11.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832644" version="1" comment="qt5-qttools is &lt;5.11.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832645" version="1" comment="qt5-qttools-common is &lt;5.11.1-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832646" version="1" comment="qt5-qttools-devel is &lt;5.11.1-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832647" version="1" comment="qt5-qttools-examples is &lt;5.11.1-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832648" version="1" comment="qt5-qttools-libs-designer is &lt;5.11.1-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832649" version="1" comment="qt5-qttools-libs-designercomponents is &lt;5.11.1-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832650" version="1" comment="qt5-qttools-libs-help is &lt;5.11.1-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832651" version="1" comment="qt5-qttools-static is &lt;5.11.1-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832652" version="1" comment="libreswan is &lt;3.29-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832653" version="1" comment="389-ds-base is &lt;1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832654" version="1" comment="389-ds-base-devel is &lt;1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832655" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832656" version="1" comment="389-ds-base-libs is &lt;1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832657" version="1" comment="389-ds-base-snmp is &lt;1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832658" version="1" comment="python3-lib389 is &lt;1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832659" version="1" comment="buildah is &lt;1.9.0-5.module+el8.1.0+4240+893c1ab8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832660" version="1" comment="buildah-tests is &lt;1.9.0-5.module+el8.1.0+4240+893c1ab8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832661" version="1" comment="cockpit-podman is &lt;4-1.module+el8.1.0+4081+b29780af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832662" version="1" comment="container-selinux is &lt;2.107-2.module+el8.1.0+4081+b29780af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832663" version="1" comment="containernetworking-plugins is &lt;0.8.1-2.module+el8.1.0+4081+b29780af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832664" version="1" comment="containers-common is &lt;0.1.37-5.module+el8.1.0+4240+893c1ab8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832665" version="1" comment="fuse-overlayfs is &lt;0.4.1-1.module+el8.1.0+4081+b29780af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832666" version="1" comment="oci-systemd-hook is &lt;0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832667" version="1" comment="oci-umount is &lt;2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832668" version="1" comment="podman is &lt;1.4.2-5.module+el8.1.0+4240+893c1ab8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832669" version="1" comment="podman-docker is &lt;1.4.2-5.module+el8.1.0+4240+893c1ab8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832670" version="1" comment="podman-manpages is &lt;1.4.2-5.module+el8.1.0+4240+893c1ab8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832671" version="1" comment="podman-remote is &lt;1.4.2-5.module+el8.1.0+4240+893c1ab8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832672" version="1" comment="podman-tests is &lt;1.4.2-5.module+el8.1.0+4240+893c1ab8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832673" version="1" comment="python-podman-api is &lt;1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832674" version="1" comment="runc is &lt;1.0.0-60.rc8.module+el8.1.0+4081+b29780af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832675" version="1" comment="skopeo is &lt;0.1.37-5.module+el8.1.0+4240+893c1ab8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832676" version="1" comment="skopeo-tests is &lt;0.1.37-5.module+el8.1.0+4240+893c1ab8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832677" version="1" comment="slirp4netns is &lt;0.3.0-4.module+el8.1.0+4306+1d917805 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832678" version="1" comment="toolbox is &lt;0.0.4-1.module+el8.1.0+4081+b29780af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832679" version="1" comment="libtiff is &lt;4.0.9-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832680" version="1" comment="libtiff-devel is &lt;4.0.9-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832681" version="1" comment="libtiff-tools is &lt;4.0.9-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832682" version="1" comment="mod_auth_mellon is &lt;0.14.0-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832683" version="1" comment="mod_auth_mellon-diagnostics is &lt;0.14.0-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832684" version="1" comment="go-toolset is &lt;1.12.8-1.module+el8.1.0+4089+be929cf8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832685" version="1" comment="golang is &lt;1.12.8-2.module+el8.1.0+4089+be929cf8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832686" version="1" comment="golang-bin is &lt;1.12.8-2.module+el8.1.0+4089+be929cf8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832687" version="1" comment="golang-docs is &lt;1.12.8-2.module+el8.1.0+4089+be929cf8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832688" version="1" comment="golang-misc is &lt;1.12.8-2.module+el8.1.0+4089+be929cf8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832689" version="1" comment="golang-race is &lt;1.12.8-2.module+el8.1.0+4089+be929cf8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832690" version="1" comment="golang-src is &lt;1.12.8-2.module+el8.1.0+4089+be929cf8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832691" version="1" comment="golang-tests is &lt;1.12.8-2.module+el8.1.0+4089+be929cf8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832692" version="1" comment="httpd is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832693" version="1" comment="httpd-devel is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832694" version="1" comment="httpd-filesystem is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832695" version="1" comment="httpd-manual is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832696" version="1" comment="httpd-tools is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832697" version="1" comment="mod_http2 is &lt;1.11.3-3.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832698" version="1" comment="mod_ldap is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832699" version="1" comment="mod_md is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832700" version="1" comment="mod_proxy_html is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832701" version="1" comment="mod_session is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832702" version="1" comment="mod_ssl is &lt;2.4.37-16.module+el8.1.0+4134+e6bad0ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832703" version="1" comment="virt-install is &lt;2.2.1-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832704" version="1" comment="virt-manager is &lt;2.2.1-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832705" version="1" comment="virt-manager-common is &lt;2.2.1-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832706" version="1" comment="dovecot is &lt;2.2.36-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832707" version="1" comment="dovecot-devel is &lt;2.2.36-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832708" version="1" comment="dovecot-mysql is &lt;2.2.36-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832709" version="1" comment="dovecot-pgsql is &lt;2.2.36-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832710" version="1" comment="dovecot-pigeonhole is &lt;2.2.36-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832711" version="1" comment="libecap is &lt;1.0.1-2.module+el8.1.0+4044+36416a77 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832712" version="1" comment="libecap-devel is &lt;1.0.1-2.module+el8.1.0+4044+36416a77 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832713" version="1" comment="squid is &lt;4.4-8.module+el8.1.0+4044+36416a77 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832714" version="1" comment="buildah is &lt;1.5-5.gite94b4f9.module+el8.1.0+4241+a7060183 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832715" version="1" comment="container-selinux is &lt;2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832716" version="1" comment="containernetworking-plugins is &lt;0.7.4-3.git9ebe139.module+el8.1.0+3468+011f0ab0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832717" version="1" comment="containers-common is &lt;0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832718" version="1" comment="fuse-overlayfs is &lt;0.3-5.module+el8.1.0+3468+011f0ab0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832719" version="1" comment="oci-systemd-hook is &lt;0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832720" version="1" comment="oci-umount is &lt;2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832721" version="1" comment="podman is &lt;1.0.0-3.git921f98f.module+el8.1.0+4241+a7060183 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832722" version="1" comment="podman-docker is &lt;1.0.0-3.git921f98f.module+el8.1.0+4241+a7060183 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832723" version="1" comment="runc is &lt;1.0.0-55.rc5.dev.git2abd837.module+el8.1.0+3468+011f0ab0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832724" version="1" comment="skopeo is &lt;0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832725" version="1" comment="slirp4netns is &lt;0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832726" version="1" comment="http-parser is &lt;2.8.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832727" version="1" comment="compat-libpthread-nonshared is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832728" version="1" comment="glibc is &lt;2.28-72.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832729" version="1" comment="glibc-all-langpacks is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832730" version="1" comment="glibc-benchtests is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832731" version="1" comment="glibc-common is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832732" version="1" comment="glibc-devel is &lt;2.28-72.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832733" version="1" comment="glibc-headers is &lt;2.28-72.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832734" version="1" comment="glibc-langpack-aa is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832735" version="1" comment="glibc-langpack-af is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832736" version="1" comment="glibc-langpack-agr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832737" version="1" comment="glibc-langpack-ak is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832738" version="1" comment="glibc-langpack-am is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832739" version="1" comment="glibc-langpack-an is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832740" version="1" comment="glibc-langpack-anp is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832741" version="1" comment="glibc-langpack-ar is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832742" version="1" comment="glibc-langpack-as is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832743" version="1" comment="glibc-langpack-ast is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832744" version="1" comment="glibc-langpack-ayc is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832745" version="1" comment="glibc-langpack-az is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832746" version="1" comment="glibc-langpack-be is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832747" version="1" comment="glibc-langpack-bem is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832748" version="1" comment="glibc-langpack-ber is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832749" version="1" comment="glibc-langpack-bg is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832750" version="1" comment="glibc-langpack-bhb is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832751" version="1" comment="glibc-langpack-bho is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832752" version="1" comment="glibc-langpack-bi is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832753" version="1" comment="glibc-langpack-bn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832754" version="1" comment="glibc-langpack-bo is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832755" version="1" comment="glibc-langpack-br is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832756" version="1" comment="glibc-langpack-brx is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832757" version="1" comment="glibc-langpack-bs is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832758" version="1" comment="glibc-langpack-byn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832759" version="1" comment="glibc-langpack-ca is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832760" version="1" comment="glibc-langpack-ce is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832761" version="1" comment="glibc-langpack-chr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832762" version="1" comment="glibc-langpack-cmn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832763" version="1" comment="glibc-langpack-crh is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832764" version="1" comment="glibc-langpack-cs is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832765" version="1" comment="glibc-langpack-csb is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832766" version="1" comment="glibc-langpack-cv is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832767" version="1" comment="glibc-langpack-cy is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832768" version="1" comment="glibc-langpack-da is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832769" version="1" comment="glibc-langpack-de is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832770" version="1" comment="glibc-langpack-doi is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832771" version="1" comment="glibc-langpack-dsb is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832772" version="1" comment="glibc-langpack-dv is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832773" version="1" comment="glibc-langpack-dz is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832774" version="1" comment="glibc-langpack-el is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832775" version="1" comment="glibc-langpack-en is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832776" version="1" comment="glibc-langpack-eo is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832777" version="1" comment="glibc-langpack-es is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832778" version="1" comment="glibc-langpack-et is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832779" version="1" comment="glibc-langpack-eu is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832780" version="1" comment="glibc-langpack-fa is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832781" version="1" comment="glibc-langpack-ff is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832782" version="1" comment="glibc-langpack-fi is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832783" version="1" comment="glibc-langpack-fil is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832784" version="1" comment="glibc-langpack-fo is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832785" version="1" comment="glibc-langpack-fr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832786" version="1" comment="glibc-langpack-fur is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832787" version="1" comment="glibc-langpack-fy is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832788" version="1" comment="glibc-langpack-ga is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832789" version="1" comment="glibc-langpack-gd is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832790" version="1" comment="glibc-langpack-gez is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832791" version="1" comment="glibc-langpack-gl is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832792" version="1" comment="glibc-langpack-gu is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832793" version="1" comment="glibc-langpack-gv is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832794" version="1" comment="glibc-langpack-ha is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832795" version="1" comment="glibc-langpack-hak is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832796" version="1" comment="glibc-langpack-he is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832797" version="1" comment="glibc-langpack-hi is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832798" version="1" comment="glibc-langpack-hif is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832799" version="1" comment="glibc-langpack-hne is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832800" version="1" comment="glibc-langpack-hr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832801" version="1" comment="glibc-langpack-hsb is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832802" version="1" comment="glibc-langpack-ht is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832803" version="1" comment="glibc-langpack-hu is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832804" version="1" comment="glibc-langpack-hy is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832805" version="1" comment="glibc-langpack-ia is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832806" version="1" comment="glibc-langpack-id is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832807" version="1" comment="glibc-langpack-ig is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832808" version="1" comment="glibc-langpack-ik is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832809" version="1" comment="glibc-langpack-is is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832810" version="1" comment="glibc-langpack-it is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832811" version="1" comment="glibc-langpack-iu is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832812" version="1" comment="glibc-langpack-ja is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832813" version="1" comment="glibc-langpack-ka is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832814" version="1" comment="glibc-langpack-kab is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832815" version="1" comment="glibc-langpack-kk is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832816" version="1" comment="glibc-langpack-kl is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832817" version="1" comment="glibc-langpack-km is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832818" version="1" comment="glibc-langpack-kn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832819" version="1" comment="glibc-langpack-ko is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832820" version="1" comment="glibc-langpack-kok is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832821" version="1" comment="glibc-langpack-ks is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832822" version="1" comment="glibc-langpack-ku is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832823" version="1" comment="glibc-langpack-kw is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832824" version="1" comment="glibc-langpack-ky is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832825" version="1" comment="glibc-langpack-lb is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832826" version="1" comment="glibc-langpack-lg is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832827" version="1" comment="glibc-langpack-li is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832828" version="1" comment="glibc-langpack-lij is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832829" version="1" comment="glibc-langpack-ln is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832830" version="1" comment="glibc-langpack-lo is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832831" version="1" comment="glibc-langpack-lt is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832832" version="1" comment="glibc-langpack-lv is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832833" version="1" comment="glibc-langpack-lzh is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832834" version="1" comment="glibc-langpack-mag is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832835" version="1" comment="glibc-langpack-mai is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832836" version="1" comment="glibc-langpack-mfe is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832837" version="1" comment="glibc-langpack-mg is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832838" version="1" comment="glibc-langpack-mhr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832839" version="1" comment="glibc-langpack-mi is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832840" version="1" comment="glibc-langpack-miq is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832841" version="1" comment="glibc-langpack-mjw is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832842" version="1" comment="glibc-langpack-mk is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832843" version="1" comment="glibc-langpack-ml is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832844" version="1" comment="glibc-langpack-mn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832845" version="1" comment="glibc-langpack-mni is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832846" version="1" comment="glibc-langpack-mr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832847" version="1" comment="glibc-langpack-ms is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832848" version="1" comment="glibc-langpack-mt is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832849" version="1" comment="glibc-langpack-my is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832850" version="1" comment="glibc-langpack-nan is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832851" version="1" comment="glibc-langpack-nb is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832852" version="1" comment="glibc-langpack-nds is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832853" version="1" comment="glibc-langpack-ne is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832854" version="1" comment="glibc-langpack-nhn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832855" version="1" comment="glibc-langpack-niu is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832856" version="1" comment="glibc-langpack-nl is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832857" version="1" comment="glibc-langpack-nn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832858" version="1" comment="glibc-langpack-nr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832859" version="1" comment="glibc-langpack-nso is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832860" version="1" comment="glibc-langpack-oc is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832861" version="1" comment="glibc-langpack-om is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832862" version="1" comment="glibc-langpack-or is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832863" version="1" comment="glibc-langpack-os is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832864" version="1" comment="glibc-langpack-pa is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832865" version="1" comment="glibc-langpack-pap is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832866" version="1" comment="glibc-langpack-pl is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832867" version="1" comment="glibc-langpack-ps is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832868" version="1" comment="glibc-langpack-pt is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832869" version="1" comment="glibc-langpack-quz is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832870" version="1" comment="glibc-langpack-raj is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832871" version="1" comment="glibc-langpack-ro is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832872" version="1" comment="glibc-langpack-ru is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832873" version="1" comment="glibc-langpack-rw is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832874" version="1" comment="glibc-langpack-sa is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832875" version="1" comment="glibc-langpack-sah is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832876" version="1" comment="glibc-langpack-sat is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832877" version="1" comment="glibc-langpack-sc is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832878" version="1" comment="glibc-langpack-sd is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832879" version="1" comment="glibc-langpack-se is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832880" version="1" comment="glibc-langpack-sgs is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832881" version="1" comment="glibc-langpack-shn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832882" version="1" comment="glibc-langpack-shs is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832883" version="1" comment="glibc-langpack-si is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832884" version="1" comment="glibc-langpack-sid is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832885" version="1" comment="glibc-langpack-sk is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832886" version="1" comment="glibc-langpack-sl is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832887" version="1" comment="glibc-langpack-sm is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832888" version="1" comment="glibc-langpack-so is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832889" version="1" comment="glibc-langpack-sq is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832890" version="1" comment="glibc-langpack-sr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832891" version="1" comment="glibc-langpack-ss is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832892" version="1" comment="glibc-langpack-st is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832893" version="1" comment="glibc-langpack-sv is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832894" version="1" comment="glibc-langpack-sw is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832895" version="1" comment="glibc-langpack-szl is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832896" version="1" comment="glibc-langpack-ta is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832897" version="1" comment="glibc-langpack-tcy is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832898" version="1" comment="glibc-langpack-te is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832899" version="1" comment="glibc-langpack-tg is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832900" version="1" comment="glibc-langpack-th is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832901" version="1" comment="glibc-langpack-the is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832902" version="1" comment="glibc-langpack-ti is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832903" version="1" comment="glibc-langpack-tig is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832904" version="1" comment="glibc-langpack-tk is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832905" version="1" comment="glibc-langpack-tl is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832906" version="1" comment="glibc-langpack-tn is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832907" version="1" comment="glibc-langpack-to is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832908" version="1" comment="glibc-langpack-tpi is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832909" version="1" comment="glibc-langpack-tr is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832910" version="1" comment="glibc-langpack-ts is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832911" version="1" comment="glibc-langpack-tt is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832912" version="1" comment="glibc-langpack-ug is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832913" version="1" comment="glibc-langpack-uk is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832914" version="1" comment="glibc-langpack-unm is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832915" version="1" comment="glibc-langpack-ur is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832916" version="1" comment="glibc-langpack-uz is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832917" version="1" comment="glibc-langpack-ve is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832918" version="1" comment="glibc-langpack-vi is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832919" version="1" comment="glibc-langpack-wa is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832920" version="1" comment="glibc-langpack-wae is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832921" version="1" comment="glibc-langpack-wal is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832922" version="1" comment="glibc-langpack-wo is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832923" version="1" comment="glibc-langpack-xh is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832924" version="1" comment="glibc-langpack-yi is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832925" version="1" comment="glibc-langpack-yo is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832926" version="1" comment="glibc-langpack-yue is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832927" version="1" comment="glibc-langpack-yuw is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832928" version="1" comment="glibc-langpack-zh is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832929" version="1" comment="glibc-langpack-zu is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832930" version="1" comment="glibc-locale-source is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832931" version="1" comment="glibc-minimal-langpack is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832932" version="1" comment="glibc-nss-devel is &lt;2.28-72.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832933" version="1" comment="glibc-static is &lt;2.28-72.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832934" version="1" comment="glibc-utils is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832935" version="1" comment="libnsl is &lt;2.28-72.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832936" version="1" comment="nscd is &lt;2.28-72.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832937" version="1" comment="nss_db is &lt;2.28-72.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832938" version="1" comment="nss_hesiod is &lt;2.28-72.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832939" version="1" comment="bpftool is &lt;4.18.0-147.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832940" version="1" comment="kernel is &lt;4.18.0-147.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832941" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-147.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832942" version="1" comment="kernel-core is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832943" version="1" comment="kernel-cross-headers is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832944" version="1" comment="kernel-debug is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832945" version="1" comment="kernel-debug-core is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832947" version="1" comment="kernel-debug-modules is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832948" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832950" version="1" comment="kernel-doc is &lt;4.18.0-147.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832951" version="1" comment="kernel-headers is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832952" version="1" comment="kernel-modules is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832953" version="1" comment="kernel-modules-extra is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832954" version="1" comment="kernel-tools is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832955" version="1" comment="kernel-tools-libs is &lt;4.18.0-147.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832957" version="1" comment="perf is &lt;4.18.0-147.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832958" version="1" comment="python3-perf is &lt;4.18.0-147.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832959" version="1" comment="platform-python is &lt;3.6.8-15.1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832960" version="1" comment="platform-python-debug is &lt;3.6.8-15.1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832961" version="1" comment="platform-python-devel is &lt;3.6.8-15.1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832962" version="1" comment="python3-idle is &lt;3.6.8-15.1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832963" version="1" comment="python3-libs is &lt;3.6.8-15.1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832964" version="1" comment="python3-test is &lt;3.6.8-15.1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832965" version="1" comment="python3-tkinter is &lt;3.6.8-15.1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832966" version="1" comment="dhcp-client is &lt;4.3.6-34.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832967" version="1" comment="dhcp-common is &lt;4.3.6-34.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832968" version="1" comment="dhcp-libs is &lt;4.3.6-34.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832969" version="1" comment="dhcp-relay is &lt;4.3.6-34.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832970" version="1" comment="dhcp-server is &lt;4.3.6-34.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832971" version="1" comment="glib2 is &lt;2.56.4-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832972" version="1" comment="glib2-devel is &lt;2.56.4-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832973" version="1" comment="glib2-doc is &lt;2.56.4-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832974" version="1" comment="glib2-fam is &lt;2.56.4-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832975" version="1" comment="glib2-static is &lt;2.56.4-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832976" version="1" comment="glib2-tests is &lt;2.56.4-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832977" version="1" comment="bind is &lt;9.11.4-26.P2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832978" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832979" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832980" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832981" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832982" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832983" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832984" version="1" comment="bind-license is &lt;9.11.4-26.P2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832985" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832986" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832987" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832988" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832989" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832990" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832991" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832992" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832993" version="1" comment="python3-bind is &lt;9.11.4-26.P2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832994" version="1" comment="SDL is &lt;1.2.15-35.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832995" version="1" comment="SDL-devel is &lt;1.2.15-35.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832996" version="1" comment="accountsservice is &lt;0.6.50-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832997" version="1" comment="accountsservice-devel is &lt;0.6.50-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832998" version="1" comment="accountsservice-libs is &lt;0.6.50-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009832999" version="1" comment="appstream-data is &lt;8-20190805.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833000" version="1" comment="baobab is &lt;3.28.0-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833001" version="1" comment="chrome-gnome-shell is &lt;10.1-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833002" version="1" comment="evince is &lt;3.28.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833003" version="1" comment="evince-browser-plugin is &lt;3.28.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833004" version="1" comment="evince-libs is &lt;3.28.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833005" version="1" comment="evince-nautilus is &lt;3.28.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833006" version="1" comment="file-roller is &lt;3.28.1-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833007" version="1" comment="gdk-pixbuf2 is &lt;2.36.12-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833008" version="1" comment="gdk-pixbuf2-devel is &lt;2.36.12-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833009" version="1" comment="gdk-pixbuf2-modules is &lt;2.36.12-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833010" version="1" comment="gdk-pixbuf2-xlib is &lt;2.36.12-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833011" version="1" comment="gdk-pixbuf2-xlib-devel is &lt;2.36.12-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833012" version="1" comment="gdm is &lt;3.28.3-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833013" version="1" comment="gjs is &lt;1.56.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833014" version="1" comment="gjs-devel is &lt;1.56.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833015" version="1" comment="gnome-classic-session is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833016" version="1" comment="gnome-control-center is &lt;3.28.2-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833017" version="1" comment="gnome-control-center-filesystem is &lt;3.28.2-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833018" version="1" comment="gnome-desktop3 is &lt;3.32.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833019" version="1" comment="gnome-desktop3-devel is &lt;3.32.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833020" version="1" comment="gnome-remote-desktop is &lt;0.1.6-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833021" version="1" comment="gnome-settings-daemon is &lt;3.32.0-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833022" version="1" comment="gnome-shell is &lt;3.32.2-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833023" version="1" comment="gnome-shell-extension-apps-menu is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833024" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833025" version="1" comment="gnome-shell-extension-common is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833026" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833027" version="1" comment="gnome-shell-extension-desktop-icons is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833028" version="1" comment="gnome-shell-extension-disable-screenshield is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833029" version="1" comment="gnome-shell-extension-drive-menu is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833030" version="1" comment="gnome-shell-extension-horizontal-workspaces is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833031" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833032" version="1" comment="gnome-shell-extension-native-window-placement is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833033" version="1" comment="gnome-shell-extension-no-hot-corner is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833034" version="1" comment="gnome-shell-extension-panel-favorites is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833035" version="1" comment="gnome-shell-extension-places-menu is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833036" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833037" version="1" comment="gnome-shell-extension-systemMonitor is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833038" version="1" comment="gnome-shell-extension-top-icons is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833039" version="1" comment="gnome-shell-extension-updates-dialog is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833040" version="1" comment="gnome-shell-extension-user-theme is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833041" version="1" comment="gnome-shell-extension-window-grouper is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833042" version="1" comment="gnome-shell-extension-window-list is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833043" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833044" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;3.32.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833045" version="1" comment="gnome-software is &lt;3.30.6-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833046" version="1" comment="gnome-software-editor is &lt;3.30.6-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833047" version="1" comment="gnome-tweaks is &lt;3.28.1-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833048" version="1" comment="gsettings-desktop-schemas is &lt;3.32.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833049" version="1" comment="gsettings-desktop-schemas-devel is &lt;3.32.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833050" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833051" version="1" comment="gtk3 is &lt;3.22.30-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833052" version="1" comment="gtk3-devel is &lt;3.22.30-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833053" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833054" version="1" comment="gvfs is &lt;1.36.2-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833055" version="1" comment="gvfs-afc is &lt;1.36.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833056" version="1" comment="gvfs-afp is &lt;1.36.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833057" version="1" comment="gvfs-archive is &lt;1.36.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833058" version="1" comment="gvfs-client is &lt;1.36.2-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833059" version="1" comment="gvfs-devel is &lt;1.36.2-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833060" version="1" comment="gvfs-fuse is &lt;1.36.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833061" version="1" comment="gvfs-goa is &lt;1.36.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833062" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833063" version="1" comment="gvfs-mtp is &lt;1.36.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833064" version="1" comment="gvfs-smb is &lt;1.36.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833065" version="1" comment="libpurple is &lt;2.13.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833066" version="1" comment="libpurple-devel is &lt;2.13.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833067" version="1" comment="mozjs60 is &lt;60.9.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833068" version="1" comment="mozjs60-devel is &lt;60.9.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833069" version="1" comment="mutter is &lt;3.32.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833070" version="1" comment="mutter-devel is &lt;3.32.2-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833071" version="1" comment="nautilus is &lt;3.28.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833072" version="1" comment="nautilus-devel is &lt;3.28.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833073" version="1" comment="nautilus-extensions is &lt;3.28.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833074" version="1" comment="pango is &lt;1.42.4-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833075" version="1" comment="pango-devel is &lt;1.42.4-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833076" version="1" comment="pidgin is &lt;2.13.0-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833077" version="1" comment="pidgin-devel is &lt;2.13.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833078" version="1" comment="plymouth is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833079" version="1" comment="plymouth-core-libs is &lt;0.9.3-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833080" version="1" comment="plymouth-graphics-libs is &lt;0.9.3-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833081" version="1" comment="plymouth-plugin-fade-throbber is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833082" version="1" comment="plymouth-plugin-label is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833083" version="1" comment="plymouth-plugin-script is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833084" version="1" comment="plymouth-plugin-space-flares is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833085" version="1" comment="plymouth-plugin-throbgress is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833086" version="1" comment="plymouth-plugin-two-step is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833087" version="1" comment="plymouth-scripts is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833088" version="1" comment="plymouth-system-theme is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833089" version="1" comment="plymouth-theme-charge is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833090" version="1" comment="plymouth-theme-fade-in is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833091" version="1" comment="plymouth-theme-script is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833092" version="1" comment="plymouth-theme-solar is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833093" version="1" comment="plymouth-theme-spinfinity is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833094" version="1" comment="plymouth-theme-spinner is &lt;0.9.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833095" version="1" comment="wayland-protocols-devel is &lt;1.17-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833096" version="1" comment="webkit2gtk3 is &lt;2.24.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833097" version="1" comment="webkit2gtk3-devel is &lt;2.24.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833098" version="1" comment="webkit2gtk3-jsc is &lt;2.24.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833099" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.24.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833100" version="1" comment="webkit2gtk3-plugin-process-gtk2 is &lt;2.24.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833101" version="1" comment="elfutils is &lt;0.176-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833102" version="1" comment="elfutils-default-yama-scope is &lt;0.176-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833103" version="1" comment="elfutils-devel is &lt;0.176-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833104" version="1" comment="elfutils-devel-static is &lt;0.176-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833105" version="1" comment="elfutils-libelf is &lt;0.176-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833106" version="1" comment="elfutils-libelf-devel is &lt;0.176-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833107" version="1" comment="elfutils-libelf-devel-static is &lt;0.176-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833108" version="1" comment="elfutils-libs is &lt;0.176-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833109" version="1" comment="ctdb is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833110" version="1" comment="ctdb-tests is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833111" version="1" comment="libsmbclient is &lt;4.10.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833112" version="1" comment="libsmbclient-devel is &lt;4.10.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833113" version="1" comment="libwbclient is &lt;4.10.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833114" version="1" comment="libwbclient-devel is &lt;4.10.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833115" version="1" comment="python3-samba is &lt;4.10.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833116" version="1" comment="python3-samba-test is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833117" version="1" comment="samba is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833118" version="1" comment="samba-client is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833119" version="1" comment="samba-client-libs is &lt;4.10.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833120" version="1" comment="samba-common is &lt;4.10.4-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833121" version="1" comment="samba-common-libs is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833122" version="1" comment="samba-common-tools is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833123" version="1" comment="samba-krb5-printing is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833124" version="1" comment="samba-libs is &lt;4.10.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833125" version="1" comment="samba-pidl is &lt;4.10.4-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833126" version="1" comment="samba-test is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833127" version="1" comment="samba-test-libs is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833128" version="1" comment="samba-winbind is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833129" version="1" comment="samba-winbind-clients is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833130" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.4-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833131" version="1" comment="samba-winbind-modules is &lt;4.10.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833132" version="1" comment="createrepo_c is &lt;0.11.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833133" version="1" comment="createrepo_c-devel is &lt;0.11.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833134" version="1" comment="createrepo_c-libs is &lt;0.11.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833135" version="1" comment="dnf is &lt;4.2.7-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833136" version="1" comment="dnf-automatic is &lt;4.2.7-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833137" version="1" comment="dnf-data is &lt;4.2.7-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833138" version="1" comment="dnf-plugins-core is &lt;4.0.8-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833139" version="1" comment="libcomps is &lt;0.1.11-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833140" version="1" comment="libcomps-devel is &lt;0.1.11-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833141" version="1" comment="libdnf is &lt;0.35.1-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833142" version="1" comment="librepo is &lt;1.10.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833143" version="1" comment="libsolv is &lt;0.7.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833144" version="1" comment="microdnf is &lt;3.0.1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833145" version="1" comment="python3-createrepo_c is &lt;0.11.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833146" version="1" comment="python3-dnf is &lt;4.2.7-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833147" version="1" comment="python3-dnf-plugin-versionlock is &lt;4.0.8-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833148" version="1" comment="python3-dnf-plugins-core is &lt;4.0.8-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833149" version="1" comment="python3-hawkey is &lt;0.35.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833150" version="1" comment="python3-libcomps is &lt;0.1.11-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833151" version="1" comment="python3-libdnf is &lt;0.35.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833152" version="1" comment="python3-librepo is &lt;1.10.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833153" version="1" comment="yum is &lt;4.2.7-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833154" version="1" comment="yum-utils is &lt;4.0.8-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833155" version="1" comment="python3-urllib3 is &lt;1.24.2-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833156" version="1" comment="systemd is &lt;239-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833157" version="1" comment="systemd-container is &lt;239-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833158" version="1" comment="systemd-devel is &lt;239-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833159" version="1" comment="systemd-journal-remote is &lt;239-18.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833160" version="1" comment="systemd-libs is &lt;239-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833161" version="1" comment="systemd-pam is &lt;239-18.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833162" version="1" comment="systemd-tests is &lt;239-18.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833163" version="1" comment="systemd-udev is &lt;239-18.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833164" version="1" comment="gnutls is &lt;3.6.8-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833165" version="1" comment="gnutls-c++ is &lt;3.6.8-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833166" version="1" comment="gnutls-dane is &lt;3.6.8-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833167" version="1" comment="gnutls-devel is &lt;3.6.8-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833168" version="1" comment="gnutls-utils is &lt;3.6.8-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833169" version="1" comment="libqb is &lt;1.0.3-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833170" version="1" comment="libqb-devel is &lt;1.0.3-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833171" version="1" comment="libseccomp is &lt;2.4.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833172" version="1" comment="libseccomp-devel is &lt;2.4.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833173" version="1" comment="gettext is &lt;0.19.8.1-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833174" version="1" comment="gettext-common-devel is &lt;0.19.8.1-17.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833175" version="1" comment="gettext-devel is &lt;0.19.8.1-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833176" version="1" comment="gettext-libs is &lt;0.19.8.1-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833177" version="1" comment="libipa_hbac is &lt;2.2.0-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833178" version="1" comment="libsss_autofs is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833179" version="1" comment="libsss_certmap is &lt;2.2.0-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833180" version="1" comment="libsss_idmap is &lt;2.2.0-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833181" version="1" comment="libsss_nss_idmap is &lt;2.2.0-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833182" version="1" comment="libsss_nss_idmap-devel is &lt;2.2.0-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833183" version="1" comment="libsss_simpleifp is &lt;2.2.0-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833184" version="1" comment="libsss_sudo is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833185" version="1" comment="python3-libipa_hbac is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833186" version="1" comment="python3-libsss_nss_idmap is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833187" version="1" comment="python3-sss is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833188" version="1" comment="python3-sss-murmur is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833189" version="1" comment="python3-sssdconfig is &lt;2.2.0-19.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833190" version="1" comment="sssd is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833191" version="1" comment="sssd-ad is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833192" version="1" comment="sssd-client is &lt;2.2.0-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833193" version="1" comment="sssd-common is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833194" version="1" comment="sssd-common-pac is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833195" version="1" comment="sssd-dbus is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833196" version="1" comment="sssd-ipa is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833197" version="1" comment="sssd-kcm is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833198" version="1" comment="sssd-krb5 is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833199" version="1" comment="sssd-krb5-common is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833200" version="1" comment="sssd-ldap is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833201" version="1" comment="sssd-libwbclient is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833202" version="1" comment="sssd-nfs-idmap is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833203" version="1" comment="sssd-polkit-rules is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833204" version="1" comment="sssd-proxy is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833205" version="1" comment="sssd-tools is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833206" version="1" comment="sssd-winbind-idmap is &lt;2.2.0-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833207" version="1" comment="lldpad is &lt;1.0.1-13.git036e314.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833208" version="1" comment="sudo is &lt;1.8.25p1-8.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833209" version="1" comment="bsdtar is &lt;3.3.2-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833210" version="1" comment="libarchive is &lt;3.3.2-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833211" version="1" comment="libarchive-devel is &lt;3.3.2-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833212" version="1" comment="evolution is &lt;3.28.5-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833213" version="1" comment="evolution-bogofilter is &lt;3.28.5-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833214" version="1" comment="evolution-data-server is &lt;3.28.5-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833215" version="1" comment="evolution-data-server-devel is &lt;3.28.5-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833216" version="1" comment="evolution-data-server-doc is &lt;3.28.5-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833217" version="1" comment="evolution-data-server-langpacks is &lt;3.28.5-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833218" version="1" comment="evolution-data-server-perl is &lt;3.28.5-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833219" version="1" comment="evolution-data-server-tests is &lt;3.28.5-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833220" version="1" comment="evolution-devel is &lt;3.28.5-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833221" version="1" comment="evolution-ews is &lt;3.28.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833222" version="1" comment="evolution-ews-langpacks is &lt;3.28.5-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833223" version="1" comment="evolution-help is &lt;3.28.5-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833224" version="1" comment="evolution-langpacks is &lt;3.28.5-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833225" version="1" comment="evolution-pst is &lt;3.28.5-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833226" version="1" comment="evolution-spamassassin is &lt;3.28.5-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833227" version="1" comment="openssl is &lt;1.1.1c-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833228" version="1" comment="openssl-devel is &lt;1.1.1c-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833229" version="1" comment="openssl-libs is &lt;1.1.1c-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833230" version="1" comment="openssl-perl is &lt;1.1.1c-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833231" version="1" comment="curl is &lt;7.61.1-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833232" version="1" comment="libcurl is &lt;7.61.1-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833233" version="1" comment="libcurl-devel is &lt;7.61.1-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833234" version="1" comment="libcurl-minimal is &lt;7.61.1-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833235" version="1" comment="openssh is &lt;8.0p1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833236" version="1" comment="openssh-askpass is &lt;8.0p1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833237" version="1" comment="openssh-cavs is &lt;8.0p1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833238" version="1" comment="openssh-clients is &lt;8.0p1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833239" version="1" comment="openssh-keycat is &lt;8.0p1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833240" version="1" comment="openssh-ldap is &lt;8.0p1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833241" version="1" comment="openssh-server is &lt;8.0p1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833242" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833243" version="1" comment="libvorbis is &lt;1.3.6-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833244" version="1" comment="libvorbis-devel is &lt;1.3.6-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833245" version="1" comment="libvorbis-devel-docs is &lt;1.3.6-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833246" version="1" comment="python3-numpy is &lt;1.14.3-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833247" version="1" comment="python3-numpy-f2py is &lt;1.14.3-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833248" version="1" comment="libjpeg-turbo is &lt;1.5.3-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833249" version="1" comment="libjpeg-turbo-devel is &lt;1.5.3-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833250" version="1" comment="libjpeg-turbo-utils is &lt;1.5.3-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833251" version="1" comment="turbojpeg is &lt;1.5.3-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833252" version="1" comment="turbojpeg-devel is &lt;1.5.3-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833253" version="1" comment="lua is &lt;5.3.4-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833254" version="1" comment="lua-devel is &lt;5.3.4-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833255" version="1" comment="lua-libs is &lt;5.3.4-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833256" version="1" comment="dbus is &lt;1.12.8-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833257" version="1" comment="dbus-common is &lt;1.12.8-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833258" version="1" comment="dbus-daemon is &lt;1.12.8-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833259" version="1" comment="dbus-devel is &lt;1.12.8-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833260" version="1" comment="dbus-libs is &lt;1.12.8-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833261" version="1" comment="dbus-tools is &lt;1.12.8-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833262" version="1" comment="dbus-x11 is &lt;1.12.8-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833263" version="1" comment="Judy is &lt;1.0.5-18.module+el8+2765+cfa4f87b for i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833264" version="1" comment="Judy-devel is &lt;1.0.5-18.module+el8+2765+cfa4f87b for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833265" version="1" comment="asio-devel is &lt;1.10.8-7.module+el8+2765+cfa4f87b for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833266" version="1" comment="galera is &lt;25.3.26-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833267" version="1" comment="mariadb is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833268" version="1" comment="mariadb-backup is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833269" version="1" comment="mariadb-common is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833270" version="1" comment="mariadb-devel is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833271" version="1" comment="mariadb-embedded is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833272" version="1" comment="mariadb-embedded-devel is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833273" version="1" comment="mariadb-errmsg is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833274" version="1" comment="mariadb-gssapi-server is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833275" version="1" comment="mariadb-oqgraph-engine is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833276" version="1" comment="mariadb-server is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833277" version="1" comment="mariadb-server-galera is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833278" version="1" comment="mariadb-server-utils is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833279" version="1" comment="mariadb-test is &lt;10.3.17-1.module+el8.1.0+3974+90eded84 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833280" version="1" comment="php is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833281" version="1" comment="php-bcmath is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833282" version="1" comment="php-cli is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833283" version="1" comment="php-common is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833284" version="1" comment="php-dba is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833285" version="1" comment="php-dbg is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833286" version="1" comment="php-devel is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833287" version="1" comment="php-embedded is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833288" version="1" comment="php-enchant is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833289" version="1" comment="php-fpm is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833290" version="1" comment="php-gd is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833291" version="1" comment="php-gmp is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833292" version="1" comment="php-intl is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833293" version="1" comment="php-json is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833294" version="1" comment="php-ldap is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833295" version="1" comment="php-mbstring is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833296" version="1" comment="php-mysqlnd is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833297" version="1" comment="php-odbc is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833298" version="1" comment="php-opcache is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833299" version="1" comment="php-pdo is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833300" version="1" comment="php-pgsql is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833301" version="1" comment="php-process is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833302" version="1" comment="php-recode is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833303" version="1" comment="php-snmp is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833304" version="1" comment="php-soap is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833305" version="1" comment="php-xml is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833306" version="1" comment="php-xmlrpc is &lt;7.2.11-4.module+el8.1.0+4555+f5cb8e18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833307" version="1" comment="apcu-panel is &lt;5.1.17-1.module+el8.1.0+3189+a1bff096 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833308" version="1" comment="libzip is &lt;1.5.2-1.module+el8.1.0+3189+a1bff096 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833309" version="1" comment="libzip-devel is &lt;1.5.2-1.module+el8.1.0+3189+a1bff096 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833310" version="1" comment="libzip-tools is &lt;1.5.2-1.module+el8.1.0+3189+a1bff096 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833311" version="1" comment="php is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833312" version="1" comment="php-bcmath is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833313" version="1" comment="php-cli is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833314" version="1" comment="php-common is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833315" version="1" comment="php-dba is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833316" version="1" comment="php-dbg is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833317" version="1" comment="php-devel is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833318" version="1" comment="php-embedded is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833319" version="1" comment="php-enchant is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833320" version="1" comment="php-fpm is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833321" version="1" comment="php-gd is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833322" version="1" comment="php-gmp is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833323" version="1" comment="php-intl is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833324" version="1" comment="php-json is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833325" version="1" comment="php-ldap is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833326" version="1" comment="php-mbstring is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833327" version="1" comment="php-mysqlnd is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833328" version="1" comment="php-odbc is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833329" version="1" comment="php-opcache is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833330" version="1" comment="php-pdo is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833331" version="1" comment="php-pear is &lt;1.10.9-1.module+el8.1.0+3189+a1bff096 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833332" version="1" comment="php-pecl-apcu is &lt;5.1.17-1.module+el8.1.0+3189+a1bff096 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833333" version="1" comment="php-pecl-apcu-devel is &lt;5.1.17-1.module+el8.1.0+3189+a1bff096 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833334" version="1" comment="php-pecl-zip is &lt;1.15.4-1.module+el8.1.0+3189+a1bff096 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833335" version="1" comment="php-pgsql is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833336" version="1" comment="php-process is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833337" version="1" comment="php-recode is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833338" version="1" comment="php-snmp is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833339" version="1" comment="php-soap is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833340" version="1" comment="php-xml is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833341" version="1" comment="php-xmlrpc is &lt;7.3.5-5.module+el8.1.0+4560+e0eee7d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833342" version="1" comment="bpftool is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833343" version="1" comment="kernel is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833344" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-147.0.2.el8_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833345" version="1" comment="kernel-core is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833346" version="1" comment="kernel-cross-headers is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833347" version="1" comment="kernel-debug is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833348" version="1" comment="kernel-debug-core is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833350" version="1" comment="kernel-debug-modules is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833351" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833353" version="1" comment="kernel-doc is &lt;4.18.0-147.0.2.el8_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833354" version="1" comment="kernel-headers is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833355" version="1" comment="kernel-modules is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833356" version="1" comment="kernel-modules-extra is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833357" version="1" comment="kernel-tools is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833358" version="1" comment="kernel-tools-libs is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833360" version="1" comment="perf is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833361" version="1" comment="python3-perf is &lt;4.18.0-147.0.2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833362" version="1" comment="bpftool is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833363" version="1" comment="kernel is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833364" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-147.0.3.el8_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833365" version="1" comment="kernel-core is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833366" version="1" comment="kernel-cross-headers is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833367" version="1" comment="kernel-debug is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833368" version="1" comment="kernel-debug-core is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833370" version="1" comment="kernel-debug-modules is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833371" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833373" version="1" comment="kernel-doc is &lt;4.18.0-147.0.3.el8_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833374" version="1" comment="kernel-headers is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833375" version="1" comment="kernel-modules is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833376" version="1" comment="kernel-modules-extra is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833377" version="1" comment="kernel-tools is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833378" version="1" comment="kernel-tools-libs is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833380" version="1" comment="perf is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833381" version="1" comment="python3-perf is &lt;4.18.0-147.0.3.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833382" version="1" comment="ghostscript is &lt;9.25-5.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833383" version="1" comment="ghostscript-doc is &lt;9.25-5.el8_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833384" version="1" comment="ghostscript-tools-dvipdf is &lt;9.25-5.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833385" version="1" comment="ghostscript-tools-fonts is &lt;9.25-5.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833386" version="1" comment="ghostscript-tools-printing is &lt;9.25-5.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833387" version="1" comment="ghostscript-x11 is &lt;9.25-5.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833388" version="1" comment="libgs is &lt;9.25-5.el8_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833389" version="1" comment="libgs-devel is &lt;9.25-5.el8_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833390" version="1" comment="SDL is &lt;1.2.15-36.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833391" version="1" comment="SDL-devel is &lt;1.2.15-36.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833392" version="1" comment="firefox is &lt;68.3.0-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833393" version="1" comment="nss is &lt;3.44.0-9.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833394" version="1" comment="nss-devel is &lt;3.44.0-9.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833395" version="1" comment="nss-softokn is &lt;3.44.0-9.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833396" version="1" comment="nss-softokn-devel is &lt;3.44.0-9.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833397" version="1" comment="nss-softokn-freebl is &lt;3.44.0-9.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833398" version="1" comment="nss-softokn-freebl-devel is &lt;3.44.0-9.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833399" version="1" comment="nss-sysinit is &lt;3.44.0-9.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833400" version="1" comment="nss-tools is &lt;3.44.0-9.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833401" version="1" comment="nss-util is &lt;3.44.0-9.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833402" version="1" comment="nss-util-devel is &lt;3.44.0-9.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833403" version="1" comment="thunderbird is &lt;68.3.0-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833404" version="1" comment="container-selinux is &lt;2.123.0-2.module+el8.1.0+4900+9d7326b8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833405" version="1" comment="containernetworking-plugins is &lt;0.8.1-3.module+el8.1.0+4881+045289ee for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833406" version="1" comment="containers-common is &lt;0.1.37-6.module+el8.1.0+4876+e678a192 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833407" version="1" comment="podman is &lt;1.4.2-6.module+el8.1.0+4830+f49150d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833408" version="1" comment="podman-docker is &lt;1.4.2-6.module+el8.1.0+4830+f49150d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833409" version="1" comment="podman-manpages is &lt;1.4.2-6.module+el8.1.0+4830+f49150d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833410" version="1" comment="podman-remote is &lt;1.4.2-6.module+el8.1.0+4830+f49150d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833411" version="1" comment="runc is &lt;1.0.0-61.rc8.module+el8.1.0+4873+4a24e241 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833412" version="1" comment="skopeo is &lt;0.1.37-6.module+el8.1.0+4876+e678a192 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833413" version="1" comment="buildah is &lt;1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833414" version="1" comment="containernetworking-plugins is &lt;0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833415" version="1" comment="containers-common is &lt;0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833416" version="1" comment="podman is &lt;1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833417" version="1" comment="podman-docker is &lt;1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833418" version="1" comment="runc is &lt;1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833419" version="1" comment="skopeo is &lt;0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833420" version="1" comment="git is &lt;2.18.2-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833421" version="1" comment="git-all is &lt;2.18.2-1.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833422" version="1" comment="git-core is &lt;2.18.2-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833423" version="1" comment="git-core-doc is &lt;2.18.2-1.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833424" version="1" comment="git-daemon is &lt;2.18.2-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833425" version="1" comment="git-email is &lt;2.18.2-1.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833426" version="1" comment="git-gui is &lt;2.18.2-1.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833427" version="1" comment="git-instaweb is &lt;2.18.2-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833428" version="1" comment="git-subtree is &lt;2.18.2-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833429" version="1" comment="git-svn is &lt;2.18.2-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833430" version="1" comment="gitk is &lt;2.18.2-1.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833431" version="1" comment="gitweb is &lt;2.18.2-1.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833432" version="1" comment="perl-Git is &lt;2.18.2-1.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833433" version="1" comment="perl-Git-SVN is &lt;2.18.2-1.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833434" version="1" comment="libyang is &lt;0.16.105-3.el8_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833435" version="1" comment="fribidi is &lt;1.0.4-7.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833436" version="1" comment="fribidi-devel is &lt;1.0.4-7.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833437" version="1" comment="firefox is &lt;68.4.1-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833438" version="1" comment="thunderbird is &lt;68.4.1-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833439" version="1" comment="java-11-openjdk is &lt;11.0.6.10-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833440" version="1" comment="java-11-openjdk-demo is &lt;11.0.6.10-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833441" version="1" comment="java-11-openjdk-devel is &lt;11.0.6.10-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833442" version="1" comment="java-11-openjdk-headless is &lt;11.0.6.10-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833443" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.6.10-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833444" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.6.10-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833445" version="1" comment="java-11-openjdk-jmods is &lt;11.0.6.10-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833446" version="1" comment="java-11-openjdk-src is &lt;11.0.6.10-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833447" version="1" comment="aspnetcore-runtime-3.0 is &lt;3.0.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833448" version="1" comment="aspnetcore-targeting-pack-3.0 is &lt;3.0.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833449" version="1" comment="dotnet is &lt;3.0.102-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833450" version="1" comment="dotnet-apphost-pack-3.0 is &lt;3.0.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833451" version="1" comment="dotnet-host is &lt;3.0.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833452" version="1" comment="dotnet-hostfxr-3.0 is &lt;3.0.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833453" version="1" comment="dotnet-runtime-3.0 is &lt;3.0.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833454" version="1" comment="dotnet-sdk-3.0 is &lt;3.0.102-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833455" version="1" comment="dotnet-targeting-pack-3.0 is &lt;3.0.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833456" version="1" comment="dotnet-templates-3.0 is &lt;3.0.102-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833457" version="1" comment="netstandard-targeting-pack-2.1 is &lt;3.0.102-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833458" version="1" comment="python3-reportlab is &lt;3.4.0-6.el8_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833459" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.242.b08-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833460" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.242.b08-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833461" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.242.b08-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833462" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.242.b08-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833463" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.242.b08-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833464" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.242.b08-0.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833465" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.242.b08-0.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833466" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.242.b08-0.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833467" version="1" comment="bsdtar is &lt;3.3.2-8.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833468" version="1" comment="libarchive is &lt;3.3.2-8.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833469" version="1" comment="libarchive-devel is &lt;3.3.2-8.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833470" version="1" comment="lemon is &lt;3.26.0-4.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833471" version="1" comment="sqlite is &lt;3.26.0-4.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833472" version="1" comment="sqlite-devel is &lt;3.26.0-4.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833473" version="1" comment="sqlite-doc is &lt;3.26.0-4.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833474" version="1" comment="sqlite-libs is &lt;3.26.0-4.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833475" version="1" comment="openjpeg2 is &lt;2.3.1-2.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833476" version="1" comment="openjpeg2-devel is &lt;2.3.1-2.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833477" version="1" comment="openjpeg2-devel-docs is &lt;2.3.1-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833478" version="1" comment="openjpeg2-tools is &lt;2.3.1-2.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833479" version="1" comment="libvirt is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833480" version="1" comment="libvirt-admin is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833481" version="1" comment="libvirt-bash-completion is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833482" version="1" comment="libvirt-client is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833483" version="1" comment="libvirt-daemon is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833484" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833485" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833486" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833487" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833488" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833489" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833490" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833491" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833492" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833493" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833494" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833495" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833496" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833497" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833498" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833499" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833500" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833501" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833502" version="1" comment="libvirt-devel is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833503" version="1" comment="libvirt-docs is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833504" version="1" comment="libvirt-libs is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833505" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833506" version="1" comment="libvirt-nss is &lt;4.5.0-35.2.module+el8.1.0+5256+4b9ab730 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833507" version="1" comment="qemu-guest-agent is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833508" version="1" comment="qemu-img is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833509" version="1" comment="qemu-kvm is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833510" version="1" comment="qemu-kvm-block-curl is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833511" version="1" comment="qemu-kvm-block-gluster is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833512" version="1" comment="qemu-kvm-block-iscsi is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833513" version="1" comment="qemu-kvm-block-rbd is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833514" version="1" comment="qemu-kvm-block-ssh is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833515" version="1" comment="qemu-kvm-common is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833516" version="1" comment="qemu-kvm-core is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833517" version="1" comment="qemu-kvm-tests is &lt;2.12.0-88.module+el8.1.0+5149+3ff2765e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833518" version="1" comment="go-toolset is &lt;1.12.12-2.module+el8.1.0+5317+8a49ffbb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833519" version="1" comment="golang is &lt;1.12.12-4.module+el8.1.0+5317+8a49ffbb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833520" version="1" comment="golang-bin is &lt;1.12.12-4.module+el8.1.0+5317+8a49ffbb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833521" version="1" comment="golang-docs is &lt;1.12.12-4.module+el8.1.0+5317+8a49ffbb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833522" version="1" comment="golang-misc is &lt;1.12.12-4.module+el8.1.0+5317+8a49ffbb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833523" version="1" comment="golang-race is &lt;1.12.12-4.module+el8.1.0+5317+8a49ffbb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833524" version="1" comment="golang-src is &lt;1.12.12-4.module+el8.1.0+5317+8a49ffbb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833525" version="1" comment="golang-tests is &lt;1.12.12-4.module+el8.1.0+5317+8a49ffbb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833526" version="1" comment="grub2-common is &lt;2.02-78.el8_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833527" version="1" comment="grub2-efi-ia32 is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833528" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833529" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-78.el8_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833530" version="1" comment="grub2-efi-x64 is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833531" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833532" version="1" comment="grub2-efi-x64-modules is &lt;2.02-78.el8_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833533" version="1" comment="grub2-pc is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833534" version="1" comment="grub2-pc-modules is &lt;2.02-78.el8_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833535" version="1" comment="grub2-tools is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833536" version="1" comment="grub2-tools-efi is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833537" version="1" comment="grub2-tools-extra is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833538" version="1" comment="grub2-tools-minimal is &lt;2.02-78.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833539" version="1" comment="bpftool is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833540" version="1" comment="kernel is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833541" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-147.5.1.el8_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833542" version="1" comment="kernel-core is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833543" version="1" comment="kernel-cross-headers is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833544" version="1" comment="kernel-debug is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833545" version="1" comment="kernel-debug-core is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833547" version="1" comment="kernel-debug-modules is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833548" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833550" version="1" comment="kernel-doc is &lt;4.18.0-147.5.1.el8_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833551" version="1" comment="kernel-headers is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833552" version="1" comment="kernel-modules is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833553" version="1" comment="kernel-modules-extra is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833554" version="1" comment="kernel-tools is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833555" version="1" comment="kernel-tools-libs is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833557" version="1" comment="perf is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833558" version="1" comment="python3-perf is &lt;4.18.0-147.5.1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833559" version="1" comment="buildah is &lt;1.11.6-4.module+el8.1.1+5259+bcdd613a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833560" version="1" comment="buildah-tests is &lt;1.11.6-4.module+el8.1.1+5259+bcdd613a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833561" version="1" comment="cockpit-podman is &lt;11-1.module+el8.1.1+5259+bcdd613a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833562" version="1" comment="conmon is &lt;2.0.6-1.module+el8.1.1+5259+bcdd613a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833563" version="1" comment="container-selinux is &lt;2.124.0-1.module+el8.1.1+5259+bcdd613a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833564" version="1" comment="containernetworking-plugins is &lt;0.8.3-4.module+el8.1.1+5259+bcdd613a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833565" version="1" comment="containers-common is &lt;0.1.40-8.module+el8.1.1+5351+506397b0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833566" version="1" comment="fuse-overlayfs is &lt;0.7.2-1.module+el8.1.1+5259+bcdd613a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833567" version="1" comment="podman is &lt;1.6.4-2.module+el8.1.1+5363+bf8ff1af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833568" version="1" comment="podman-docker is &lt;1.6.4-2.module+el8.1.1+5363+bf8ff1af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833569" version="1" comment="podman-manpages is &lt;1.6.4-2.module+el8.1.1+5363+bf8ff1af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833570" version="1" comment="podman-remote is &lt;1.6.4-2.module+el8.1.1+5363+bf8ff1af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833571" version="1" comment="podman-tests is &lt;1.6.4-2.module+el8.1.1+5363+bf8ff1af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833572" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.1.1+5259+bcdd613a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833573" version="1" comment="runc is &lt;1.0.0-64.rc9.module+el8.1.1+5259+bcdd613a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833574" version="1" comment="skopeo is &lt;0.1.40-8.module+el8.1.1+5351+506397b0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833575" version="1" comment="skopeo-tests is &lt;0.1.40-8.module+el8.1.1+5351+506397b0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833576" version="1" comment="slirp4netns is &lt;0.4.2-2.git21fdece.module+el8.1.1+5460+3ac089c3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833577" version="1" comment="toolbox is &lt;0.0.4-1.module+el8.1.1+4407+ac444e5d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833578" version="1" comment="udica is &lt;0.2.1-2.module+el8.1.1+4975+482d6f5d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833579" version="1" comment="sudo is &lt;1.8.25p1-8.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833580" version="1" comment="firefox is &lt;68.5.0-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833581" version="1" comment="ksh is &lt;20120801-253.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833582" version="1" comment="openjpeg2 is &lt;2.3.1-3.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833583" version="1" comment="openjpeg2-devel is &lt;2.3.1-3.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833584" version="1" comment="openjpeg2-devel-docs is &lt;2.3.1-3.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833585" version="1" comment="openjpeg2-tools is &lt;2.3.1-3.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833586" version="1" comment="systemd is &lt;239-18.el8_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833587" version="1" comment="systemd-container is &lt;239-18.el8_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833588" version="1" comment="systemd-devel is &lt;239-18.el8_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833589" version="1" comment="systemd-journal-remote is &lt;239-18.el8_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833590" version="1" comment="systemd-libs is &lt;239-18.el8_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833591" version="1" comment="systemd-pam is &lt;239-18.el8_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833592" version="1" comment="systemd-tests is &lt;239-18.el8_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833593" version="1" comment="systemd-udev is &lt;239-18.el8_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833594" version="1" comment="thunderbird is &lt;68.5.0-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833595" version="1" comment="nodejs is &lt;10.19.0-1.module+el8.1.0+5726+6ed65f8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833596" version="1" comment="nodejs-devel is &lt;10.19.0-1.module+el8.1.0+5726+6ed65f8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833597" version="1" comment="nodejs-docs is &lt;10.19.0-1.module+el8.1.0+5726+6ed65f8c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833598" version="1" comment="npm is &lt;6.13.4-1.10.19.0.1.module+el8.1.0+5726+6ed65f8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833599" version="1" comment="python3-pillow is &lt;5.1.1-10.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833600" version="1" comment="nodejs is &lt;12.16.1-1.module+el8.1.0+5811+44509afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833601" version="1" comment="nodejs-devel is &lt;12.16.1-1.module+el8.1.0+5811+44509afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833602" version="1" comment="nodejs-docs is &lt;12.16.1-1.module+el8.1.0+5811+44509afe for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833603" version="1" comment="nodejs-nodemon is &lt;1.18.3-1.module+el8.1.0+3369+37ae6a45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833605" version="1" comment="npm is &lt;6.13.4-1.12.16.1.1.module+el8.1.0+5811+44509afe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833606" version="1" comment="ppp is &lt;2.4.7-26.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833607" version="1" comment="ppp-devel is &lt;2.4.7-26.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833608" version="1" comment="http-parser is &lt;2.8.0-5.el8_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833609" version="1" comment="firefox is &lt;68.6.0-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833610" version="1" comment="icu is &lt;60.3-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833611" version="1" comment="libicu is &lt;60.3-2.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833612" version="1" comment="libicu-devel is &lt;60.3-2.el8_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833613" version="1" comment="libicu-doc is &lt;60.3-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833614" version="1" comment="zsh is &lt;5.5.1-6.el8_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833615" version="1" comment="thunderbird is &lt;68.6.0-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833616" version="1" comment="libvncserver is &lt;0.9.11-9.el8_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833617" version="1" comment="libvncserver-devel is &lt;0.9.11-9.el8_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833618" version="1" comment="exchange-bmc-os-info is &lt;1.8.18-12.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833619" version="1" comment="ipmievd is &lt;1.8.18-12.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833620" version="1" comment="ipmitool is &lt;1.8.18-12.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833621" version="1" comment="haproxy is &lt;1.8.15-6.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833622" version="1" comment="nodejs is &lt;12.16.1-2.module+el8.1.0+6117+b25a342c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833623" version="1" comment="nodejs-devel is &lt;12.16.1-2.module+el8.1.0+6117+b25a342c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833624" version="1" comment="nodejs-docs is &lt;12.16.1-2.module+el8.1.0+6117+b25a342c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833625" version="1" comment="npm is &lt;6.13.4-1.12.16.1.2.module+el8.1.0+6117+b25a342c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833626" version="1" comment="nodejs is &lt;10.19.0-2.module+el8.1.0+6118+5aaa808b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833627" version="1" comment="nodejs-devel is &lt;10.19.0-2.module+el8.1.0+6118+5aaa808b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833628" version="1" comment="nodejs-docs is &lt;10.19.0-2.module+el8.1.0+6118+5aaa808b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833629" version="1" comment="npm is &lt;6.13.4-1.10.19.0.2.module+el8.1.0+6118+5aaa808b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833630" version="1" comment="telnet is &lt;0.17-73.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833631" version="1" comment="telnet-server is &lt;0.17-73.el8_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833632" version="1" comment="firefox is &lt;68.6.1-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833633" version="1" comment="libvirt is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833634" version="1" comment="libvirt-admin is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833635" version="1" comment="libvirt-bash-completion is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833636" version="1" comment="libvirt-client is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833637" version="1" comment="libvirt-daemon is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833638" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833639" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833640" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833641" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833642" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833643" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833644" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833645" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833646" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833647" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833648" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833649" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833650" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833651" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833652" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833653" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833654" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833655" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833656" version="1" comment="libvirt-devel is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833657" version="1" comment="libvirt-docs is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833658" version="1" comment="libvirt-libs is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833659" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833660" version="1" comment="libvirt-nss is &lt;4.5.0-35.3.module+el8.1.0+5931+8897e7e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833661" version="1" comment="qemu-guest-agent is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833662" version="1" comment="qemu-img is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833663" version="1" comment="qemu-kvm is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833664" version="1" comment="qemu-kvm-block-curl is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833665" version="1" comment="qemu-kvm-block-gluster is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833666" version="1" comment="qemu-kvm-block-iscsi is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833667" version="1" comment="qemu-kvm-block-rbd is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833668" version="1" comment="qemu-kvm-block-ssh is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833669" version="1" comment="qemu-kvm-common is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833670" version="1" comment="qemu-kvm-core is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833671" version="1" comment="qemu-kvm-tests is &lt;2.12.0-88.module+el8.1.0+5708+85d8e057.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833672" version="1" comment="slirp4netns is &lt;0.1-4.dev.gitc4e1bc5.module+el8.1.0+5654+5237a55d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833673" version="1" comment="bpftool is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833674" version="1" comment="kernel is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833675" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-147.8.1.el8_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833676" version="1" comment="kernel-core is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833677" version="1" comment="kernel-cross-headers is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833678" version="1" comment="kernel-debug is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833679" version="1" comment="kernel-debug-core is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833681" version="1" comment="kernel-debug-modules is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833682" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833684" version="1" comment="kernel-doc is &lt;4.18.0-147.8.1.el8_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833685" version="1" comment="kernel-headers is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833686" version="1" comment="kernel-modules is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833687" version="1" comment="kernel-modules-extra is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833688" version="1" comment="kernel-tools is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833689" version="1" comment="kernel-tools-libs is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833691" version="1" comment="perf is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833692" version="1" comment="python3-perf is &lt;4.18.0-147.8.1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833693" version="1" comment="buildah is &lt;1.11.6-6.module+el8.1.1+5865+cc793d95 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833694" version="1" comment="buildah-tests is &lt;1.11.6-6.module+el8.1.1+5865+cc793d95 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833695" version="1" comment="fuse-overlayfs is &lt;0.7.2-5.module+el8.1.1+6114+953c5a57 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833696" version="1" comment="podman is &lt;1.6.4-4.module+el8.1.1+5885+44006e55 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833697" version="1" comment="podman-docker is &lt;1.6.4-4.module+el8.1.1+5885+44006e55 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833698" version="1" comment="podman-manpages is &lt;1.6.4-4.module+el8.1.1+5885+44006e55 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833699" version="1" comment="podman-remote is &lt;1.6.4-4.module+el8.1.1+5885+44006e55 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833700" version="1" comment="podman-tests is &lt;1.6.4-4.module+el8.1.1+5885+44006e55 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833701" version="1" comment="slirp4netns is &lt;0.4.2-3.git21fdece.module+el8.1.1+5657+524a77d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833702" version="1" comment="firefox is &lt;68.7.0-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833703" version="1" comment="thunderbird is &lt;68.7.0-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833704" version="1" comment="tigervnc is &lt;1.9.0-14.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833705" version="1" comment="tigervnc-icons is &lt;1.9.0-14.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833706" version="1" comment="tigervnc-license is &lt;1.9.0-14.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833707" version="1" comment="tigervnc-server is &lt;1.9.0-14.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833708" version="1" comment="tigervnc-server-applet is &lt;1.9.0-14.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833709" version="1" comment="tigervnc-server-minimal is &lt;1.9.0-14.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833710" version="1" comment="tigervnc-server-module is &lt;1.9.0-14.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833711" version="1" comment="git is &lt;2.18.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833712" version="1" comment="git-all is &lt;2.18.2-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833713" version="1" comment="git-core is &lt;2.18.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833714" version="1" comment="git-core-doc is &lt;2.18.2-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833715" version="1" comment="git-daemon is &lt;2.18.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833716" version="1" comment="git-email is &lt;2.18.2-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833717" version="1" comment="git-gui is &lt;2.18.2-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833718" version="1" comment="git-instaweb is &lt;2.18.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833719" version="1" comment="git-subtree is &lt;2.18.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833720" version="1" comment="git-svn is &lt;2.18.2-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833721" version="1" comment="gitk is &lt;2.18.2-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833722" version="1" comment="gitweb is &lt;2.18.2-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833723" version="1" comment="perl-Git is &lt;2.18.2-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833724" version="1" comment="perl-Git-SVN is &lt;2.18.2-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833725" version="1" comment="java-11-openjdk is &lt;11.0.7.10-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833726" version="1" comment="java-11-openjdk-demo is &lt;11.0.7.10-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833727" version="1" comment="java-11-openjdk-devel is &lt;11.0.7.10-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833728" version="1" comment="java-11-openjdk-headless is &lt;11.0.7.10-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833729" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.7.10-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833730" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.7.10-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833731" version="1" comment="java-11-openjdk-jmods is &lt;11.0.7.10-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833732" version="1" comment="java-11-openjdk-src is &lt;11.0.7.10-1.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833733" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.252.b09-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833734" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.252.b09-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833735" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.252.b09-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833736" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.252.b09-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833737" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.252.b09-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833738" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.252.b09-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833739" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.252.b09-2.el8_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833740" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.252.b09-2.el8_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833741" version="1" comment="memcached is &lt;1.5.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833742" version="1" comment="exiv2 is &lt;0.27.2-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833743" version="1" comment="exiv2-devel is &lt;0.27.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833744" version="1" comment="exiv2-doc is &lt;0.27.2-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833745" version="1" comment="exiv2-libs is &lt;0.27.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833746" version="1" comment="gegl is &lt;0.2.0-39.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833747" version="1" comment="gnome-color-manager is &lt;3.28.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833748" version="1" comment="libgexiv2 is &lt;0.10.8-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833749" version="1" comment="libgexiv2-devel is &lt;0.10.8-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833750" version="1" comment="wavpack is &lt;5.1.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833751" version="1" comment="wavpack-devel is &lt;5.1.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833752" version="1" comment="evolution is &lt;3.28.5-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833753" version="1" comment="evolution-bogofilter is &lt;3.28.5-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833754" version="1" comment="evolution-data-server is &lt;3.28.5-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833755" version="1" comment="evolution-data-server-devel is &lt;3.28.5-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833756" version="1" comment="evolution-data-server-doc is &lt;3.28.5-13.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833757" version="1" comment="evolution-data-server-langpacks is &lt;3.28.5-13.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833758" version="1" comment="evolution-data-server-perl is &lt;3.28.5-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833759" version="1" comment="evolution-data-server-tests is &lt;3.28.5-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833760" version="1" comment="evolution-devel is &lt;3.28.5-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833761" version="1" comment="evolution-ews is &lt;3.28.5-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833762" version="1" comment="evolution-ews-langpacks is &lt;3.28.5-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833763" version="1" comment="evolution-help is &lt;3.28.5-12.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833764" version="1" comment="evolution-langpacks is &lt;3.28.5-12.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833765" version="1" comment="evolution-pst is &lt;3.28.5-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833766" version="1" comment="evolution-spamassassin is &lt;3.28.5-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833767" version="1" comment="tcpdump is &lt;4.9.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833768" version="1" comment="python2 is &lt;2.7.17-1.module+el8.2.0+4561+f4e0d66a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833769" version="1" comment="python2-debug is &lt;2.7.17-1.module+el8.2.0+4561+f4e0d66a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833770" version="1" comment="python2-devel is &lt;2.7.17-1.module+el8.2.0+4561+f4e0d66a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833771" version="1" comment="python2-libs is &lt;2.7.17-1.module+el8.2.0+4561+f4e0d66a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833772" version="1" comment="python2-pip is &lt;9.0.3-16.module+el8.2.0+5478+b505947e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833773" version="1" comment="python2-pip-wheel is &lt;9.0.3-16.module+el8.2.0+5478+b505947e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833774" version="1" comment="python2-requests is &lt;2.20.0-3.module+el8.2.0+4577+feefd9b8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833775" version="1" comment="python2-test is &lt;2.7.17-1.module+el8.2.0+4561+f4e0d66a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833776" version="1" comment="python2-tkinter is &lt;2.7.17-1.module+el8.2.0+4561+f4e0d66a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833777" version="1" comment="python2-tools is &lt;2.7.17-1.module+el8.2.0+4561+f4e0d66a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833778" version="1" comment="irssi is &lt;1.1.1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833779" version="1" comment="irssi-devel is &lt;1.1.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833780" version="1" comment="apcu-panel is &lt;5.1.12-2.module+el8.1.0+3202+af5476b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833781" version="1" comment="libzip is &lt;1.5.1-2.module+el8.1.0+3202+af5476b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833782" version="1" comment="libzip-devel is &lt;1.5.1-2.module+el8.1.0+3202+af5476b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833783" version="1" comment="libzip-tools is &lt;1.5.1-2.module+el8.1.0+3202+af5476b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833784" version="1" comment="php is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833785" version="1" comment="php-bcmath is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833786" version="1" comment="php-cli is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833787" version="1" comment="php-common is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833788" version="1" comment="php-dba is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833789" version="1" comment="php-dbg is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833790" version="1" comment="php-devel is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833791" version="1" comment="php-embedded is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833792" version="1" comment="php-enchant is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833793" version="1" comment="php-fpm is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833794" version="1" comment="php-gd is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833795" version="1" comment="php-gmp is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833796" version="1" comment="php-intl is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833797" version="1" comment="php-json is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833798" version="1" comment="php-ldap is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833799" version="1" comment="php-mbstring is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833800" version="1" comment="php-mysqlnd is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833801" version="1" comment="php-odbc is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833802" version="1" comment="php-opcache is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833803" version="1" comment="php-pdo is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833804" version="1" comment="php-pear is &lt;1.10.5-9.module+el8.1.0+3202+af5476b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833805" version="1" comment="php-pecl-apcu is &lt;5.1.12-2.module+el8.1.0+3202+af5476b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833806" version="1" comment="php-pecl-apcu-devel is &lt;5.1.12-2.module+el8.1.0+3202+af5476b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833807" version="1" comment="php-pecl-zip is &lt;1.15.3-1.module+el8.1.0+3186+20164e6f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833808" version="1" comment="php-pgsql is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833809" version="1" comment="php-process is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833810" version="1" comment="php-recode is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833811" version="1" comment="php-snmp is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833812" version="1" comment="php-soap is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833813" version="1" comment="php-xml is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833814" version="1" comment="php-xmlrpc is &lt;7.2.24-1.module+el8.2.0+4601+7c76a223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833815" version="1" comment="SDL is &lt;1.2.15-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833816" version="1" comment="SDL-devel is &lt;1.2.15-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833817" version="1" comment="SDL2 is &lt;2.0.10-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833818" version="1" comment="SDL2-devel is &lt;2.0.10-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833819" version="1" comment="SDL2-static is &lt;2.0.10-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833820" version="1" comment="gstreamer1 is &lt;1.16.1-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833821" version="1" comment="gstreamer1-devel is &lt;1.16.1-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833822" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.16.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833823" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.16.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833824" version="1" comment="gstreamer1-plugins-base is &lt;1.16.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833825" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.16.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833826" version="1" comment="gstreamer1-plugins-good is &lt;1.16.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833827" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.16.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833828" version="1" comment="gstreamer1-plugins-ugly-free is &lt;1.16.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833829" version="1" comment="libmad is &lt;0.15.1b-25.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833830" version="1" comment="libmad-devel is &lt;0.15.1b-25.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833831" version="1" comment="orc is &lt;0.4.28-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833832" version="1" comment="orc-compiler is &lt;0.4.28-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833833" version="1" comment="orc-devel is &lt;0.4.28-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833834" version="1" comment="gdb is &lt;8.2-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833835" version="1" comment="gdb-doc is &lt;8.2-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833836" version="1" comment="gdb-gdbserver is &lt;8.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833837" version="1" comment="gdb-headless is &lt;8.2-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833838" version="1" comment="libsndfile is &lt;1.0.28-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833839" version="1" comment="libsndfile-devel is &lt;1.0.28-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833840" version="1" comment="apache-commons-collections is &lt;3.2.2-10.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833841" version="1" comment="apache-commons-lang is &lt;2.6-21.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833842" version="1" comment="bea-stax-api is &lt;1.2.0-16.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833843" version="1" comment="glassfish-fastinfoset is &lt;1.2.13-9.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833844" version="1" comment="glassfish-jaxb-api is &lt;2.2.12-8.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833845" version="1" comment="glassfish-jaxb-core is &lt;2.2.11-11.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833846" version="1" comment="glassfish-jaxb-runtime is &lt;2.2.11-11.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833847" version="1" comment="glassfish-jaxb-txw2 is &lt;2.2.11-11.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833848" version="1" comment="jackson-annotations is &lt;2.10.0-1.module+el8.2.0+5059+3eb3af25 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833849" version="1" comment="jackson-core is &lt;2.10.0-1.module+el8.2.0+5059+3eb3af25 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833850" version="1" comment="jackson-databind is &lt;2.10.0-1.module+el8.2.0+5059+3eb3af25 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833851" version="1" comment="jackson-jaxrs-json-provider is &lt;2.9.9-1.module+el8.1.0+3832+9784644d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833852" version="1" comment="jackson-jaxrs-providers is &lt;2.9.9-1.module+el8.1.0+3832+9784644d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833853" version="1" comment="jackson-module-jaxb-annotations is &lt;2.7.6-4.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833854" version="1" comment="jakarta-commons-httpclient is &lt;3.1-28.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833855" version="1" comment="javassist is &lt;3.18.1-8.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833856" version="1" comment="javassist-javadoc is &lt;3.18.1-8.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833857" version="1" comment="jss is &lt;4.6.2-4.module+el8.2.0+6123+b4678599 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833858" version="1" comment="jss-javadoc is &lt;4.6.2-4.module+el8.2.0+6123+b4678599 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833859" version="1" comment="ldapjdk is &lt;4.21.0-2.module+el8.2.0+4573+c3c38c7b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833860" version="1" comment="ldapjdk-javadoc is &lt;4.21.0-2.module+el8.2.0+4573+c3c38c7b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833861" version="1" comment="pki-base is &lt;10.8.3-1.module+el8.2.0+5925+bad5981a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833862" version="1" comment="pki-base-java is &lt;10.8.3-1.module+el8.2.0+5925+bad5981a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833863" version="1" comment="pki-ca is &lt;10.8.3-1.module+el8.2.0+5925+bad5981a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833864" version="1" comment="pki-kra is &lt;10.8.3-1.module+el8.2.0+5925+bad5981a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833865" version="1" comment="pki-server is &lt;10.8.3-1.module+el8.2.0+5925+bad5981a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833866" version="1" comment="pki-servlet-4.0-api is &lt;9.0.7-16.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833867" version="1" comment="pki-servlet-engine is &lt;9.0.7-16.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833868" version="1" comment="pki-symkey is &lt;10.8.3-1.module+el8.2.0+5925+bad5981a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833869" version="1" comment="pki-tools is &lt;10.8.3-1.module+el8.2.0+5925+bad5981a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833870" version="1" comment="python-nss-doc is &lt;1.0.1-10.module+el8.1.0+3366+6dfb954c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833871" version="1" comment="python3-nss is &lt;1.0.1-10.module+el8.1.0+3366+6dfb954c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833872" version="1" comment="python3-pki is &lt;10.8.3-1.module+el8.2.0+5925+bad5981a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833873" version="1" comment="relaxngDatatype is &lt;2011.1-7.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833874" version="1" comment="resteasy is &lt;3.0.26-3.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833875" version="1" comment="slf4j is &lt;1.7.25-4.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833876" version="1" comment="slf4j-jdk14 is &lt;1.7.25-4.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833877" version="1" comment="stax-ex is &lt;1.7.7-8.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833878" version="1" comment="tomcatjss is &lt;7.4.1-2.module+el8.2.0+4573+c3c38c7b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833879" version="1" comment="velocity is &lt;1.7-24.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833880" version="1" comment="xalan-j2 is &lt;2.7.1-38.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833881" version="1" comment="xerces-j2 is &lt;2.11.0-34.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833882" version="1" comment="xml-commons-apis is &lt;1.4.01-25.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833883" version="1" comment="xml-commons-resolver is &lt;1.2-26.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833884" version="1" comment="xmlstreambuffer is &lt;1.5.4-8.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833885" version="1" comment="xsom is &lt;0-19.20110809svn.module+el8.1.0+3366+6dfb954c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833886" version="1" comment="buildah is &lt;1.11.6-7.module+el8.2.0+5856+b8046c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833887" version="1" comment="buildah-tests is &lt;1.11.6-7.module+el8.2.0+5856+b8046c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833888" version="1" comment="cockpit-podman is &lt;12-1.module+el8.2.0+5950+6d183a6a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833889" version="1" comment="conmon is &lt;2.0.6-1.module+el8.2.0+5182+3136e5d4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833890" version="1" comment="container-selinux is &lt;2.124.0-1.module+el8.2.0+5182+3136e5d4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833891" version="1" comment="containernetworking-plugins is &lt;0.8.3-5.module+el8.2.0+5201+6b31f0d9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833892" version="1" comment="containers-common is &lt;0.1.40-10.module+el8.2.0+5955+6cd70ceb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833893" version="1" comment="crit is &lt;3.12-9.module+el8.2.0+5029+3ac48e7d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833894" version="1" comment="criu is &lt;3.12-9.module+el8.2.0+5029+3ac48e7d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833895" version="1" comment="fuse-overlayfs is &lt;0.7.2-5.module+el8.2.0+6060+9dbc027d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833896" version="1" comment="podman is &lt;1.6.4-10.module+el8.2.0+6063+e761893a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833897" version="1" comment="podman-docker is &lt;1.6.4-10.module+el8.2.0+6063+e761893a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833898" version="1" comment="podman-remote is &lt;1.6.4-10.module+el8.2.0+6063+e761893a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833899" version="1" comment="podman-tests is &lt;1.6.4-10.module+el8.2.0+6063+e761893a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833900" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833901" version="1" comment="python3-criu is &lt;3.12-9.module+el8.2.0+5029+3ac48e7d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833902" version="1" comment="runc is &lt;1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833903" version="1" comment="skopeo is &lt;0.1.40-10.module+el8.2.0+5955+6cd70ceb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833904" version="1" comment="skopeo-tests is &lt;0.1.40-10.module+el8.2.0+5955+6cd70ceb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833905" version="1" comment="slirp4netns is &lt;0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833906" version="1" comment="toolbox is &lt;0.0.7-1.module+el8.2.0+6096+9c3f08f3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833907" version="1" comment="udica is &lt;0.2.1-2.module+el8.2.0+4896+8f613c81 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833908" version="1" comment="zziplib is &lt;0.13.68-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833909" version="1" comment="zziplib-devel is &lt;0.13.68-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833910" version="1" comment="zziplib-utils is &lt;0.13.68-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833911" version="1" comment="grafana is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833912" version="1" comment="grafana-azure-monitor is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833913" version="1" comment="grafana-cloudwatch is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833914" version="1" comment="grafana-elasticsearch is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833915" version="1" comment="grafana-graphite is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833916" version="1" comment="grafana-influxdb is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833917" version="1" comment="grafana-loki is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833918" version="1" comment="grafana-mssql is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833919" version="1" comment="grafana-mysql is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833920" version="1" comment="grafana-opentsdb is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833921" version="1" comment="grafana-postgres is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833922" version="1" comment="grafana-prometheus is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833923" version="1" comment="grafana-stackdriver is &lt;6.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833924" version="1" comment="mod_auth_mellon is &lt;0.14.0-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833925" version="1" comment="mod_auth_mellon-diagnostics is &lt;0.14.0-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833926" version="1" comment="python-qt5-rpm-macros is &lt;5.13.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833927" version="1" comment="python3-pyqt5-sip is &lt;4.19.19-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833928" version="1" comment="python3-qt5 is &lt;5.13.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833929" version="1" comment="python3-qt5-base is &lt;5.13.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833930" version="1" comment="qgnomeplatform is &lt;0.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833931" version="1" comment="qt5-assistant is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833932" version="1" comment="qt5-designer is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833933" version="1" comment="qt5-doctools is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833934" version="1" comment="qt5-linguist is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833935" version="1" comment="qt5-qdbusviewer is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833936" version="1" comment="qt5-qt3d is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833937" version="1" comment="qt5-qt3d-devel is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833938" version="1" comment="qt5-qt3d-examples is &lt;5.12.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833939" version="1" comment="qt5-qtbase is &lt;5.12.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833940" version="1" comment="qt5-qtbase-common is &lt;5.12.5-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833941" version="1" comment="qt5-qtbase-devel is &lt;5.12.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833942" version="1" comment="qt5-qtbase-examples is &lt;5.12.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833943" version="1" comment="qt5-qtbase-gui is &lt;5.12.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833944" version="1" comment="qt5-qtbase-mysql is &lt;5.12.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833945" version="1" comment="qt5-qtbase-odbc is &lt;5.12.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833946" version="1" comment="qt5-qtbase-postgresql is &lt;5.12.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833947" version="1" comment="qt5-qtbase-private-devel is &lt;5.12.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833948" version="1" comment="qt5-qtcanvas3d is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833949" version="1" comment="qt5-qtcanvas3d-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833950" version="1" comment="qt5-qtconnectivity is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833951" version="1" comment="qt5-qtconnectivity-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833952" version="1" comment="qt5-qtconnectivity-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833953" version="1" comment="qt5-qtdeclarative is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833954" version="1" comment="qt5-qtdeclarative-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833955" version="1" comment="qt5-qtdeclarative-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833956" version="1" comment="qt5-qtdoc is &lt;5.12.5-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833957" version="1" comment="qt5-qtgraphicaleffects is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833958" version="1" comment="qt5-qtimageformats is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833959" version="1" comment="qt5-qtlocation is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833960" version="1" comment="qt5-qtlocation-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833961" version="1" comment="qt5-qtlocation-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833962" version="1" comment="qt5-qtmultimedia is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833963" version="1" comment="qt5-qtmultimedia-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833964" version="1" comment="qt5-qtmultimedia-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833965" version="1" comment="qt5-qtquickcontrols is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833966" version="1" comment="qt5-qtquickcontrols-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833967" version="1" comment="qt5-qtquickcontrols2 is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833968" version="1" comment="qt5-qtquickcontrols2-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833969" version="1" comment="qt5-qtscript is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833970" version="1" comment="qt5-qtscript-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833971" version="1" comment="qt5-qtscript-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833972" version="1" comment="qt5-qtsensors is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833973" version="1" comment="qt5-qtsensors-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833974" version="1" comment="qt5-qtsensors-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833975" version="1" comment="qt5-qtserialbus is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833976" version="1" comment="qt5-qtserialbus-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833977" version="1" comment="qt5-qtserialport is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833978" version="1" comment="qt5-qtserialport-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833979" version="1" comment="qt5-qtserialport-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833980" version="1" comment="qt5-qtsvg is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833981" version="1" comment="qt5-qtsvg-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833982" version="1" comment="qt5-qtsvg-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833983" version="1" comment="qt5-qttools is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833984" version="1" comment="qt5-qttools-common is &lt;5.12.5-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833985" version="1" comment="qt5-qttools-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833986" version="1" comment="qt5-qttools-examples is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833987" version="1" comment="qt5-qttools-libs-designer is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833988" version="1" comment="qt5-qttools-libs-designercomponents is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833989" version="1" comment="qt5-qttools-libs-help is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833990" version="1" comment="qt5-qttranslations is &lt;5.12.5-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833991" version="1" comment="qt5-qtwayland is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833992" version="1" comment="qt5-qtwayland-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833993" version="1" comment="qt5-qtwebchannel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833994" version="1" comment="qt5-qtwebchannel-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833995" version="1" comment="qt5-qtwebchannel-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833996" version="1" comment="qt5-qtwebsockets is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833997" version="1" comment="qt5-qtwebsockets-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833998" version="1" comment="qt5-qtwebsockets-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009833999" version="1" comment="qt5-qtx11extras is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834000" version="1" comment="qt5-qtx11extras-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834001" version="1" comment="qt5-qtxmlpatterns is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834002" version="1" comment="qt5-qtxmlpatterns-devel is &lt;5.12.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834003" version="1" comment="qt5-qtxmlpatterns-examples is &lt;5.12.5-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834004" version="1" comment="qt5-rpm-macros is &lt;5.12.5-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834005" version="1" comment="qt5-srpm-macros is &lt;5.12.5-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834006" version="1" comment="sip is &lt;4.19.19-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834007" version="1" comment="freeradius is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834008" version="1" comment="freeradius-devel is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834009" version="1" comment="freeradius-doc is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834010" version="1" comment="freeradius-krb5 is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834011" version="1" comment="freeradius-ldap is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834012" version="1" comment="freeradius-mysql is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834013" version="1" comment="freeradius-perl is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834014" version="1" comment="freeradius-postgresql is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834015" version="1" comment="freeradius-rest is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834016" version="1" comment="freeradius-sqlite is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834017" version="1" comment="freeradius-unixODBC is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834018" version="1" comment="freeradius-utils is &lt;3.0.17-7.module+el8.2.0+4847+336970e8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834019" version="1" comment="libmspack is &lt;0.7-0.3.alpha.el8.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834020" version="1" comment="libmspack-devel is &lt;0.7-0.3.alpha.el8.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834021" version="1" comment="libtiff is &lt;4.0.9-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834022" version="1" comment="libtiff-devel is &lt;4.0.9-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834023" version="1" comment="rsyslog is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834024" version="1" comment="rsyslog-crypto is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834025" version="1" comment="rsyslog-doc is &lt;8.1911.0-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834026" version="1" comment="rsyslog-elasticsearch is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834027" version="1" comment="rsyslog-gnutls is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834028" version="1" comment="rsyslog-gssapi is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834029" version="1" comment="rsyslog-kafka is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834030" version="1" comment="rsyslog-mmaudit is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834031" version="1" comment="rsyslog-mmjsonparse is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834032" version="1" comment="rsyslog-mmkubernetes is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834033" version="1" comment="rsyslog-mmnormalize is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834034" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834035" version="1" comment="rsyslog-mysql is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834036" version="1" comment="rsyslog-pgsql is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834037" version="1" comment="rsyslog-relp is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834038" version="1" comment="rsyslog-snmp is &lt;8.1911.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834039" version="1" comment="liblouis is &lt;2.6.2-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834040" version="1" comment="python3-louis is &lt;2.6.2-21.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834041" version="1" comment="edk2-ovmf is &lt;20190829git37eef91017ad-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834042" version="1" comment="dnsmasq is &lt;2.79-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834043" version="1" comment="dnsmasq-utils is &lt;2.79-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834044" version="1" comment="python3-unbound is &lt;1.7.3-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834045" version="1" comment="unbound is &lt;1.7.3-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834046" version="1" comment="unbound-devel is &lt;1.7.3-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834047" version="1" comment="unbound-libs is &lt;1.7.3-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834048" version="1" comment="haproxy is &lt;1.8.23-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834049" version="1" comment="dpdk is &lt;19.11-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834050" version="1" comment="dpdk-devel is &lt;19.11-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834051" version="1" comment="dpdk-doc is &lt;19.11-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834052" version="1" comment="dpdk-tools is &lt;19.11-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834053" version="1" comment="platform-python is &lt;3.6.8-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834054" version="1" comment="platform-python-debug is &lt;3.6.8-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834055" version="1" comment="platform-python-devel is &lt;3.6.8-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834056" version="1" comment="python3-idle is &lt;3.6.8-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834057" version="1" comment="python3-libs is &lt;3.6.8-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834058" version="1" comment="python3-test is &lt;3.6.8-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834059" version="1" comment="python3-tkinter is &lt;3.6.8-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834060" version="1" comment="cups is &lt;2.2.6-33.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834061" version="1" comment="cups-client is &lt;2.2.6-33.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834062" version="1" comment="cups-devel is &lt;2.2.6-33.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834063" version="1" comment="cups-filesystem is &lt;2.2.6-33.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834064" version="1" comment="cups-ipptool is &lt;2.2.6-33.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834065" version="1" comment="cups-libs is &lt;2.2.6-33.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834066" version="1" comment="cups-lpd is &lt;2.2.6-33.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834067" version="1" comment="LibRaw is &lt;0.19.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834068" version="1" comment="LibRaw-devel is &lt;0.19.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834069" version="1" comment="accountsservice is &lt;0.6.50-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834070" version="1" comment="accountsservice-devel is &lt;0.6.50-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834071" version="1" comment="accountsservice-libs is &lt;0.6.50-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834072" version="1" comment="appstream-data is &lt;8-20191129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834073" version="1" comment="baobab is &lt;3.28.0-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834074" version="1" comment="clutter is &lt;1.26.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834075" version="1" comment="clutter-devel is &lt;1.26.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834076" version="1" comment="clutter-doc is &lt;1.26.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834077" version="1" comment="evince is &lt;3.28.4-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834078" version="1" comment="evince-browser-plugin is &lt;3.28.4-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834079" version="1" comment="evince-libs is &lt;3.28.4-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834080" version="1" comment="evince-nautilus is &lt;3.28.4-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834081" version="1" comment="gdm is &lt;3.28.3-29.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834082" version="1" comment="gjs is &lt;1.56.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834083" version="1" comment="gjs-devel is &lt;1.56.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834084" version="1" comment="gnome-boxes is &lt;3.28.5-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834085" version="1" comment="gnome-control-center is &lt;3.28.2-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834086" version="1" comment="gnome-control-center-filesystem is &lt;3.28.2-19.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834087" version="1" comment="gnome-menus is &lt;3.13.3-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834088" version="1" comment="gnome-menus-devel is &lt;3.13.3-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834089" version="1" comment="gnome-online-accounts is &lt;3.28.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834090" version="1" comment="gnome-online-accounts-devel is &lt;3.28.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834091" version="1" comment="gnome-remote-desktop is &lt;0.1.6-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834092" version="1" comment="gnome-session is &lt;3.28.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834093" version="1" comment="gnome-session-wayland-session is &lt;3.28.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834094" version="1" comment="gnome-session-xsession is &lt;3.28.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834095" version="1" comment="gnome-settings-daemon is &lt;3.32.0-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834096" version="1" comment="gnome-shell is &lt;3.32.2-14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834097" version="1" comment="gnome-software is &lt;3.30.6-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834098" version="1" comment="gnome-software-editor is &lt;3.30.6-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834099" version="1" comment="gnome-terminal is &lt;3.28.3-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834100" version="1" comment="gnome-terminal-nautilus is &lt;3.28.3-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834101" version="1" comment="gnome-tweaks is &lt;3.28.1-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834102" version="1" comment="gsettings-desktop-schemas is &lt;3.32.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834103" version="1" comment="gsettings-desktop-schemas-devel is &lt;3.32.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834104" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834105" version="1" comment="gtk3 is &lt;3.22.30-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834106" version="1" comment="gtk3-devel is &lt;3.22.30-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834107" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834108" version="1" comment="gvfs is &lt;1.36.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834109" version="1" comment="gvfs-afc is &lt;1.36.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834110" version="1" comment="gvfs-afp is &lt;1.36.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834111" version="1" comment="gvfs-archive is &lt;1.36.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834112" version="1" comment="gvfs-client is &lt;1.36.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834113" version="1" comment="gvfs-devel is &lt;1.36.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834114" version="1" comment="gvfs-fuse is &lt;1.36.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834115" version="1" comment="gvfs-goa is &lt;1.36.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834116" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834117" version="1" comment="gvfs-mtp is &lt;1.36.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834118" version="1" comment="gvfs-smb is &lt;1.36.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834119" version="1" comment="libvncserver is &lt;0.9.11-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834120" version="1" comment="libvncserver-devel is &lt;0.9.11-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834121" version="1" comment="libxslt is &lt;1.1.32-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834122" version="1" comment="libxslt-devel is &lt;1.1.32-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834123" version="1" comment="mozjs52 is &lt;52.9.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834124" version="1" comment="mozjs52-devel is &lt;52.9.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834125" version="1" comment="mozjs60 is &lt;60.9.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834126" version="1" comment="mozjs60-devel is &lt;60.9.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834127" version="1" comment="mutter is &lt;3.32.2-34.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834128" version="1" comment="mutter-devel is &lt;3.32.2-34.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834129" version="1" comment="nautilus is &lt;3.28.1-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834130" version="1" comment="nautilus-devel is &lt;3.28.1-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834131" version="1" comment="nautilus-extensions is &lt;3.28.1-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834132" version="1" comment="vala is &lt;0.40.19-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834133" version="1" comment="vala-devel is &lt;0.40.19-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834134" version="1" comment="vinagre is &lt;3.22.0-21.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834135" version="1" comment="bpftool is &lt;4.18.0-193.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834136" version="1" comment="kernel is &lt;4.18.0-193.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834137" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-193.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834138" version="1" comment="kernel-core is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834139" version="1" comment="kernel-cross-headers is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834140" version="1" comment="kernel-debug is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834141" version="1" comment="kernel-debug-core is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834143" version="1" comment="kernel-debug-modules is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834144" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834146" version="1" comment="kernel-doc is &lt;4.18.0-193.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834147" version="1" comment="kernel-headers is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834148" version="1" comment="kernel-modules is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834149" version="1" comment="kernel-modules-extra is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834150" version="1" comment="kernel-tools is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834151" version="1" comment="kernel-tools-libs is &lt;4.18.0-193.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834153" version="1" comment="perf is &lt;4.18.0-193.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834154" version="1" comment="python3-perf is &lt;4.18.0-193.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834155" version="1" comment="unzip is &lt;6.0-43.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834156" version="1" comment="curl is &lt;7.61.1-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834157" version="1" comment="libcurl is &lt;7.61.1-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834158" version="1" comment="libcurl-devel is &lt;7.61.1-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834159" version="1" comment="libcurl-minimal is &lt;7.61.1-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834160" version="1" comment="systemd is &lt;239-29.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834161" version="1" comment="systemd-container is &lt;239-29.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834162" version="1" comment="systemd-devel is &lt;239-29.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834163" version="1" comment="systemd-journal-remote is &lt;239-29.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834164" version="1" comment="systemd-libs is &lt;239-29.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834165" version="1" comment="systemd-pam is &lt;239-29.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834166" version="1" comment="systemd-tests is &lt;239-29.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834167" version="1" comment="systemd-udev is &lt;239-29.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834168" version="1" comment="binutils is &lt;2.30-73.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834169" version="1" comment="binutils-devel is &lt;2.30-73.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834170" version="1" comment="sudo is &lt;1.8.29-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834171" version="1" comment="lemon is &lt;3.26.0-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834172" version="1" comment="sqlite is &lt;3.26.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834173" version="1" comment="sqlite-devel is &lt;3.26.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834174" version="1" comment="sqlite-doc is &lt;3.26.0-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834175" version="1" comment="sqlite-libs is &lt;3.26.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834176" version="1" comment="libxml2 is &lt;2.9.7-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834177" version="1" comment="libxml2-devel is &lt;2.9.7-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834178" version="1" comment="python3-libxml2 is &lt;2.9.7-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834179" version="1" comment="compat-libpthread-nonshared is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834180" version="1" comment="glibc is &lt;2.28-101.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834181" version="1" comment="glibc-all-langpacks is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834182" version="1" comment="glibc-benchtests is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834183" version="1" comment="glibc-common is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834184" version="1" comment="glibc-devel is &lt;2.28-101.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834185" version="1" comment="glibc-headers is &lt;2.28-101.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834186" version="1" comment="glibc-langpack-aa is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834187" version="1" comment="glibc-langpack-af is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834188" version="1" comment="glibc-langpack-agr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834189" version="1" comment="glibc-langpack-ak is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834190" version="1" comment="glibc-langpack-am is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834191" version="1" comment="glibc-langpack-an is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834192" version="1" comment="glibc-langpack-anp is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834193" version="1" comment="glibc-langpack-ar is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834194" version="1" comment="glibc-langpack-as is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834195" version="1" comment="glibc-langpack-ast is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834196" version="1" comment="glibc-langpack-ayc is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834197" version="1" comment="glibc-langpack-az is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834198" version="1" comment="glibc-langpack-be is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834199" version="1" comment="glibc-langpack-bem is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834200" version="1" comment="glibc-langpack-ber is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834201" version="1" comment="glibc-langpack-bg is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834202" version="1" comment="glibc-langpack-bhb is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834203" version="1" comment="glibc-langpack-bho is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834204" version="1" comment="glibc-langpack-bi is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834205" version="1" comment="glibc-langpack-bn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834206" version="1" comment="glibc-langpack-bo is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834207" version="1" comment="glibc-langpack-br is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834208" version="1" comment="glibc-langpack-brx is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834209" version="1" comment="glibc-langpack-bs is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834210" version="1" comment="glibc-langpack-byn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834211" version="1" comment="glibc-langpack-ca is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834212" version="1" comment="glibc-langpack-ce is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834213" version="1" comment="glibc-langpack-chr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834214" version="1" comment="glibc-langpack-cmn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834215" version="1" comment="glibc-langpack-crh is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834216" version="1" comment="glibc-langpack-cs is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834217" version="1" comment="glibc-langpack-csb is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834218" version="1" comment="glibc-langpack-cv is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834219" version="1" comment="glibc-langpack-cy is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834220" version="1" comment="glibc-langpack-da is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834221" version="1" comment="glibc-langpack-de is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834222" version="1" comment="glibc-langpack-doi is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834223" version="1" comment="glibc-langpack-dsb is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834224" version="1" comment="glibc-langpack-dv is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834225" version="1" comment="glibc-langpack-dz is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834226" version="1" comment="glibc-langpack-el is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834227" version="1" comment="glibc-langpack-en is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834228" version="1" comment="glibc-langpack-eo is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834229" version="1" comment="glibc-langpack-es is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834230" version="1" comment="glibc-langpack-et is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834231" version="1" comment="glibc-langpack-eu is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834232" version="1" comment="glibc-langpack-fa is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834233" version="1" comment="glibc-langpack-ff is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834234" version="1" comment="glibc-langpack-fi is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834235" version="1" comment="glibc-langpack-fil is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834236" version="1" comment="glibc-langpack-fo is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834237" version="1" comment="glibc-langpack-fr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834238" version="1" comment="glibc-langpack-fur is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834239" version="1" comment="glibc-langpack-fy is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834240" version="1" comment="glibc-langpack-ga is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834241" version="1" comment="glibc-langpack-gd is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834242" version="1" comment="glibc-langpack-gez is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834243" version="1" comment="glibc-langpack-gl is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834244" version="1" comment="glibc-langpack-gu is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834245" version="1" comment="glibc-langpack-gv is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834246" version="1" comment="glibc-langpack-ha is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834247" version="1" comment="glibc-langpack-hak is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834248" version="1" comment="glibc-langpack-he is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834249" version="1" comment="glibc-langpack-hi is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834250" version="1" comment="glibc-langpack-hif is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834251" version="1" comment="glibc-langpack-hne is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834252" version="1" comment="glibc-langpack-hr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834253" version="1" comment="glibc-langpack-hsb is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834254" version="1" comment="glibc-langpack-ht is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834255" version="1" comment="glibc-langpack-hu is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834256" version="1" comment="glibc-langpack-hy is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834257" version="1" comment="glibc-langpack-ia is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834258" version="1" comment="glibc-langpack-id is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834259" version="1" comment="glibc-langpack-ig is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834260" version="1" comment="glibc-langpack-ik is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834261" version="1" comment="glibc-langpack-is is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834262" version="1" comment="glibc-langpack-it is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834263" version="1" comment="glibc-langpack-iu is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834264" version="1" comment="glibc-langpack-ja is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834265" version="1" comment="glibc-langpack-ka is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834266" version="1" comment="glibc-langpack-kab is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834267" version="1" comment="glibc-langpack-kk is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834268" version="1" comment="glibc-langpack-kl is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834269" version="1" comment="glibc-langpack-km is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834270" version="1" comment="glibc-langpack-kn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834271" version="1" comment="glibc-langpack-ko is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834272" version="1" comment="glibc-langpack-kok is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834273" version="1" comment="glibc-langpack-ks is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834274" version="1" comment="glibc-langpack-ku is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834275" version="1" comment="glibc-langpack-kw is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834276" version="1" comment="glibc-langpack-ky is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834277" version="1" comment="glibc-langpack-lb is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834278" version="1" comment="glibc-langpack-lg is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834279" version="1" comment="glibc-langpack-li is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834280" version="1" comment="glibc-langpack-lij is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834281" version="1" comment="glibc-langpack-ln is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834282" version="1" comment="glibc-langpack-lo is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834283" version="1" comment="glibc-langpack-lt is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834284" version="1" comment="glibc-langpack-lv is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834285" version="1" comment="glibc-langpack-lzh is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834286" version="1" comment="glibc-langpack-mag is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834287" version="1" comment="glibc-langpack-mai is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834288" version="1" comment="glibc-langpack-mfe is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834289" version="1" comment="glibc-langpack-mg is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834290" version="1" comment="glibc-langpack-mhr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834291" version="1" comment="glibc-langpack-mi is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834292" version="1" comment="glibc-langpack-miq is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834293" version="1" comment="glibc-langpack-mjw is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834294" version="1" comment="glibc-langpack-mk is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834295" version="1" comment="glibc-langpack-ml is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834296" version="1" comment="glibc-langpack-mn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834297" version="1" comment="glibc-langpack-mni is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834298" version="1" comment="glibc-langpack-mr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834299" version="1" comment="glibc-langpack-ms is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834300" version="1" comment="glibc-langpack-mt is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834301" version="1" comment="glibc-langpack-my is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834302" version="1" comment="glibc-langpack-nan is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834303" version="1" comment="glibc-langpack-nb is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834304" version="1" comment="glibc-langpack-nds is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834305" version="1" comment="glibc-langpack-ne is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834306" version="1" comment="glibc-langpack-nhn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834307" version="1" comment="glibc-langpack-niu is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834308" version="1" comment="glibc-langpack-nl is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834309" version="1" comment="glibc-langpack-nn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834310" version="1" comment="glibc-langpack-nr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834311" version="1" comment="glibc-langpack-nso is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834312" version="1" comment="glibc-langpack-oc is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834313" version="1" comment="glibc-langpack-om is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834314" version="1" comment="glibc-langpack-or is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834315" version="1" comment="glibc-langpack-os is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834316" version="1" comment="glibc-langpack-pa is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834317" version="1" comment="glibc-langpack-pap is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834318" version="1" comment="glibc-langpack-pl is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834319" version="1" comment="glibc-langpack-ps is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834320" version="1" comment="glibc-langpack-pt is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834321" version="1" comment="glibc-langpack-quz is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834322" version="1" comment="glibc-langpack-raj is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834323" version="1" comment="glibc-langpack-ro is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834324" version="1" comment="glibc-langpack-ru is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834325" version="1" comment="glibc-langpack-rw is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834326" version="1" comment="glibc-langpack-sa is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834327" version="1" comment="glibc-langpack-sah is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834328" version="1" comment="glibc-langpack-sat is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834329" version="1" comment="glibc-langpack-sc is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834330" version="1" comment="glibc-langpack-sd is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834331" version="1" comment="glibc-langpack-se is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834332" version="1" comment="glibc-langpack-sgs is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834333" version="1" comment="glibc-langpack-shn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834334" version="1" comment="glibc-langpack-shs is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834335" version="1" comment="glibc-langpack-si is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834336" version="1" comment="glibc-langpack-sid is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834337" version="1" comment="glibc-langpack-sk is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834338" version="1" comment="glibc-langpack-sl is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834339" version="1" comment="glibc-langpack-sm is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834340" version="1" comment="glibc-langpack-so is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834341" version="1" comment="glibc-langpack-sq is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834342" version="1" comment="glibc-langpack-sr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834343" version="1" comment="glibc-langpack-ss is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834344" version="1" comment="glibc-langpack-st is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834345" version="1" comment="glibc-langpack-sv is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834346" version="1" comment="glibc-langpack-sw is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834347" version="1" comment="glibc-langpack-szl is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834348" version="1" comment="glibc-langpack-ta is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834349" version="1" comment="glibc-langpack-tcy is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834350" version="1" comment="glibc-langpack-te is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834351" version="1" comment="glibc-langpack-tg is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834352" version="1" comment="glibc-langpack-th is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834353" version="1" comment="glibc-langpack-the is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834354" version="1" comment="glibc-langpack-ti is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834355" version="1" comment="glibc-langpack-tig is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834356" version="1" comment="glibc-langpack-tk is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834357" version="1" comment="glibc-langpack-tl is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834358" version="1" comment="glibc-langpack-tn is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834359" version="1" comment="glibc-langpack-to is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834360" version="1" comment="glibc-langpack-tpi is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834361" version="1" comment="glibc-langpack-tr is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834362" version="1" comment="glibc-langpack-ts is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834363" version="1" comment="glibc-langpack-tt is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834364" version="1" comment="glibc-langpack-ug is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834365" version="1" comment="glibc-langpack-uk is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834366" version="1" comment="glibc-langpack-unm is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834367" version="1" comment="glibc-langpack-ur is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834368" version="1" comment="glibc-langpack-uz is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834369" version="1" comment="glibc-langpack-ve is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834370" version="1" comment="glibc-langpack-vi is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834371" version="1" comment="glibc-langpack-wa is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834372" version="1" comment="glibc-langpack-wae is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834373" version="1" comment="glibc-langpack-wal is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834374" version="1" comment="glibc-langpack-wo is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834375" version="1" comment="glibc-langpack-xh is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834376" version="1" comment="glibc-langpack-yi is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834377" version="1" comment="glibc-langpack-yo is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834378" version="1" comment="glibc-langpack-yue is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834379" version="1" comment="glibc-langpack-yuw is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834380" version="1" comment="glibc-langpack-zh is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834381" version="1" comment="glibc-langpack-zu is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834382" version="1" comment="glibc-locale-source is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834383" version="1" comment="glibc-minimal-langpack is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834384" version="1" comment="glibc-nss-devel is &lt;2.28-101.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834385" version="1" comment="glibc-static is &lt;2.28-101.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834386" version="1" comment="glibc-utils is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834387" version="1" comment="libnsl is &lt;2.28-101.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834388" version="1" comment="nscd is &lt;2.28-101.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834389" version="1" comment="nss_db is &lt;2.28-101.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834390" version="1" comment="nss_hesiod is &lt;2.28-101.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834391" version="1" comment="openssl is &lt;1.1.1c-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834392" version="1" comment="openssl-devel is &lt;1.1.1c-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834393" version="1" comment="openssl-libs is &lt;1.1.1c-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834394" version="1" comment="openssl-perl is &lt;1.1.1c-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834395" version="1" comment="bind is &lt;9.11.13-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834396" version="1" comment="bind-chroot is &lt;9.11.13-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834397" version="1" comment="bind-devel is &lt;9.11.13-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834398" version="1" comment="bind-export-devel is &lt;9.11.13-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834399" version="1" comment="bind-export-libs is &lt;9.11.13-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834400" version="1" comment="bind-libs is &lt;9.11.13-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834401" version="1" comment="bind-libs-lite is &lt;9.11.13-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834402" version="1" comment="bind-license is &lt;9.11.13-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834403" version="1" comment="bind-lite-devel is &lt;9.11.13-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834404" version="1" comment="bind-pkcs11 is &lt;9.11.13-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834405" version="1" comment="bind-pkcs11-devel is &lt;9.11.13-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834406" version="1" comment="bind-pkcs11-libs is &lt;9.11.13-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834407" version="1" comment="bind-pkcs11-utils is &lt;9.11.13-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834408" version="1" comment="bind-sdb is &lt;9.11.13-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834409" version="1" comment="bind-sdb-chroot is &lt;9.11.13-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834410" version="1" comment="bind-utils is &lt;9.11.13-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834411" version="1" comment="python3-bind is &lt;9.11.13-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834412" version="1" comment="patch is &lt;2.7.6-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834413" version="1" comment="cpp is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834414" version="1" comment="gcc is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834415" version="1" comment="gcc-c++ is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834416" version="1" comment="gcc-gdb-plugin is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834417" version="1" comment="gcc-gfortran is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834418" version="1" comment="gcc-offload-nvptx is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834419" version="1" comment="gcc-plugin-devel is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834420" version="1" comment="libasan is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834421" version="1" comment="libatomic is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834422" version="1" comment="libatomic-static is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834423" version="1" comment="libgcc is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834424" version="1" comment="libgfortran is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834425" version="1" comment="libgomp is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834426" version="1" comment="libgomp-offload-nvptx is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834427" version="1" comment="libitm is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834428" version="1" comment="libitm-devel is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834429" version="1" comment="liblsan is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834430" version="1" comment="libquadmath is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834431" version="1" comment="libquadmath-devel is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834432" version="1" comment="libstdc++ is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834433" version="1" comment="libstdc++-devel is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834434" version="1" comment="libstdc++-docs is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834435" version="1" comment="libstdc++-static is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834436" version="1" comment="libtsan is &lt;8.3.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834437" version="1" comment="libubsan is &lt;8.3.1-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834438" version="1" comment="ctdb is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834439" version="1" comment="ctdb-tests is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834440" version="1" comment="libsmbclient is &lt;4.11.2-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834441" version="1" comment="libsmbclient-devel is &lt;4.11.2-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834442" version="1" comment="libwbclient is &lt;4.11.2-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834443" version="1" comment="libwbclient-devel is &lt;4.11.2-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834444" version="1" comment="openchange is &lt;2.3-24.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834445" version="1" comment="python3-samba is &lt;4.11.2-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834446" version="1" comment="python3-samba-test is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834447" version="1" comment="samba is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834448" version="1" comment="samba-client is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834449" version="1" comment="samba-client-libs is &lt;4.11.2-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834450" version="1" comment="samba-common is &lt;4.11.2-13.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834451" version="1" comment="samba-common-libs is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834452" version="1" comment="samba-common-tools is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834453" version="1" comment="samba-krb5-printing is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834454" version="1" comment="samba-libs is &lt;4.11.2-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834455" version="1" comment="samba-pidl is &lt;4.11.2-13.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834456" version="1" comment="samba-test is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834457" version="1" comment="samba-test-libs is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834458" version="1" comment="samba-winbind is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834459" version="1" comment="samba-winbind-clients is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834460" version="1" comment="samba-winbind-krb5-locator is &lt;4.11.2-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834461" version="1" comment="samba-winbind-modules is &lt;4.11.2-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834462" version="1" comment="glib2 is &lt;2.56.4-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834463" version="1" comment="glib2-devel is &lt;2.56.4-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834464" version="1" comment="glib2-fam is &lt;2.56.4-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834465" version="1" comment="glib2-tests is &lt;2.56.4-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834466" version="1" comment="bluez is &lt;5.50-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834467" version="1" comment="bluez-cups is &lt;5.50-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834468" version="1" comment="bluez-hid2hci is &lt;5.50-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834469" version="1" comment="bluez-libs is &lt;5.50-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834470" version="1" comment="bluez-libs-devel is &lt;5.50-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834471" version="1" comment="bluez-obexd is &lt;5.50-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834472" version="1" comment="e2fsprogs is &lt;1.45.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834473" version="1" comment="e2fsprogs-devel is &lt;1.45.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834474" version="1" comment="e2fsprogs-libs is &lt;1.45.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834475" version="1" comment="libcom_err is &lt;1.45.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834476" version="1" comment="libcom_err-devel is &lt;1.45.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834477" version="1" comment="libss is &lt;1.45.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834478" version="1" comment="platform-python-pip is &lt;9.0.3-16.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834479" version="1" comment="python3-pip is &lt;9.0.3-16.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834480" version="1" comment="python3-pip-wheel is &lt;9.0.3-16.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834481" version="1" comment="fontforge is &lt;20170731-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834482" version="1" comment="buildah is &lt;1.5-4.gite94b4f9.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834483" version="1" comment="container-selinux is &lt;2.124.0-1.gitf958d0c.module+el8.2.0+6370+6fb6c8ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834484" version="1" comment="containernetworking-plugins is &lt;0.7.4-3.git9ebe139.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834485" version="1" comment="containers-common is &lt;0.1.32-4.git1715c90.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834486" version="1" comment="crit is &lt;3.12-9.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834487" version="1" comment="criu is &lt;3.12-9.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834488" version="1" comment="fuse-overlayfs is &lt;0.3-5.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834489" version="1" comment="oci-systemd-hook is &lt;0.1.15-2.git2d0b8a3.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834490" version="1" comment="oci-umount is &lt;2.3.4-2.git87f9237.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834491" version="1" comment="podman is &lt;1.0.0-4.git921f98f.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834492" version="1" comment="podman-docker is &lt;1.0.0-4.git921f98f.module+el8.2.0+6370+6fb6c8ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834493" version="1" comment="python3-criu is &lt;3.12-9.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834494" version="1" comment="runc is &lt;1.0.0-56.rc5.dev.git2abd837.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834495" version="1" comment="skopeo is &lt;0.1.32-4.git1715c90.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834496" version="1" comment="slirp4netns is &lt;0.1-5.dev.gitc4e1bc5.module+el8.2.0+6370+6fb6c8ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834497" version="1" comment="buildah is &lt;1.11.6-7.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834498" version="1" comment="buildah-tests is &lt;1.11.6-7.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834499" version="1" comment="cockpit-podman is &lt;11-1.module+el8.2.0+6369+1f4293b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834500" version="1" comment="conmon is &lt;2.0.6-1.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834501" version="1" comment="container-selinux is &lt;2.124.0-1.module+el8.2.0+6369+1f4293b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834502" version="1" comment="containernetworking-plugins is &lt;0.8.3-4.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834503" version="1" comment="containers-common is &lt;0.1.40-9.module+el8.2.0+6373+4950d421 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834504" version="1" comment="crit is &lt;3.12-9.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834505" version="1" comment="criu is &lt;3.12-9.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834506" version="1" comment="fuse-overlayfs is &lt;0.7.2-5.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834507" version="1" comment="podman is &lt;1.6.4-11.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834508" version="1" comment="podman-docker is &lt;1.6.4-11.module+el8.2.0+6369+1f4293b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834509" version="1" comment="podman-remote is &lt;1.6.4-11.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834510" version="1" comment="podman-tests is &lt;1.6.4-11.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834511" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.2.0+6369+1f4293b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834512" version="1" comment="python3-criu is &lt;3.12-9.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834513" version="1" comment="runc is &lt;1.0.0-64.rc10.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834514" version="1" comment="skopeo is &lt;0.1.40-9.module+el8.2.0+6373+4950d421 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834515" version="1" comment="skopeo-tests is &lt;0.1.40-9.module+el8.2.0+6373+4950d421 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834516" version="1" comment="slirp4netns is &lt;0.4.2-3.git21fdece.module+el8.2.0+6369+1f4293b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834517" version="1" comment="toolbox is &lt;0.0.7-1.module+el8.2.0+6369+1f4293b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834518" version="1" comment="udica is &lt;0.2.1-2.module+el8.2.0+6369+1f4293b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834519" version="1" comment="buildah is &lt;1.11.6-8.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834520" version="1" comment="buildah-tests is &lt;1.11.6-8.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834521" version="1" comment="cockpit-podman is &lt;12-1.module+el8.2.0+6368+cf16aa14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834522" version="1" comment="conmon is &lt;2.0.6-1.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834523" version="1" comment="container-selinux is &lt;2.124.0-1.module+el8.2.0+6368+cf16aa14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834524" version="1" comment="containernetworking-plugins is &lt;0.8.3-5.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834525" version="1" comment="containers-common is &lt;0.1.40-11.module+el8.2.0+6374+67f43e89 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834526" version="1" comment="crit is &lt;3.12-9.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834527" version="1" comment="criu is &lt;3.12-9.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834528" version="1" comment="fuse-overlayfs is &lt;0.7.2-5.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834529" version="1" comment="podman is &lt;1.6.4-11.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834530" version="1" comment="podman-docker is &lt;1.6.4-11.module+el8.2.0+6368+cf16aa14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834531" version="1" comment="podman-remote is &lt;1.6.4-11.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834532" version="1" comment="podman-tests is &lt;1.6.4-11.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834533" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.2.0+6368+cf16aa14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834534" version="1" comment="python3-criu is &lt;3.12-9.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834535" version="1" comment="runc is &lt;1.0.0-65.rc10.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834536" version="1" comment="skopeo is &lt;0.1.40-11.module+el8.2.0+6374+67f43e89 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834537" version="1" comment="skopeo-tests is &lt;0.1.40-11.module+el8.2.0+6374+67f43e89 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834538" version="1" comment="slirp4netns is &lt;0.4.2-3.git21fdece.module+el8.2.0+6368+cf16aa14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834539" version="1" comment="toolbox is &lt;0.0.7-1.module+el8.2.0+6368+cf16aa14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834540" version="1" comment="udica is &lt;0.2.1-2.module+el8.2.0+6368+cf16aa14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834541" version="1" comment="targetcli is &lt;2.1.51-4.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834542" version="1" comment="git is &lt;2.18.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834543" version="1" comment="git-all is &lt;2.18.4-2.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834544" version="1" comment="git-core is &lt;2.18.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834545" version="1" comment="git-core-doc is &lt;2.18.4-2.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834546" version="1" comment="git-daemon is &lt;2.18.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834547" version="1" comment="git-email is &lt;2.18.4-2.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834548" version="1" comment="git-gui is &lt;2.18.4-2.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834549" version="1" comment="git-instaweb is &lt;2.18.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834550" version="1" comment="git-subtree is &lt;2.18.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834551" version="1" comment="git-svn is &lt;2.18.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834552" version="1" comment="gitk is &lt;2.18.4-2.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834553" version="1" comment="gitweb is &lt;2.18.4-2.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834554" version="1" comment="perl-Git is &lt;2.18.4-2.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834555" version="1" comment="perl-Git-SVN is &lt;2.18.4-2.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834556" version="1" comment="gnutls is &lt;3.6.8-10.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834557" version="1" comment="gnutls-c++ is &lt;3.6.8-10.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834558" version="1" comment="gnutls-dane is &lt;3.6.8-10.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834559" version="1" comment="gnutls-devel is &lt;3.6.8-10.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834560" version="1" comment="gnutls-utils is &lt;3.6.8-10.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834561" version="1" comment="firefox is &lt;68.8.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834562" version="1" comment="squid is &lt;4.4-8.module+el8.2.0+6449+6ba3df3e.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834563" version="1" comment="thunderbird is &lt;68.8.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834564" version="1" comment="libreswan is &lt;3.29-7.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834565" version="1" comment="bpftool is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834566" version="1" comment="kernel is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834567" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-193.1.2.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834568" version="1" comment="kernel-core is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834569" version="1" comment="kernel-cross-headers is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834570" version="1" comment="kernel-debug is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834571" version="1" comment="kernel-debug-core is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834573" version="1" comment="kernel-debug-modules is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834574" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834576" version="1" comment="kernel-doc is &lt;4.18.0-193.1.2.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834577" version="1" comment="kernel-headers is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834578" version="1" comment="kernel-modules is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834579" version="1" comment="kernel-modules-extra is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834580" version="1" comment="kernel-tools is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834581" version="1" comment="kernel-tools-libs is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834583" version="1" comment="perf is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834584" version="1" comment="python3-perf is &lt;4.18.0-193.1.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834585" version="1" comment="dotnet-host-fxr-2.1 is &lt;2.1.18-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834586" version="1" comment="dotnet-runtime-2.1 is &lt;2.1.18-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834587" version="1" comment="dotnet-sdk-2.1 is &lt;2.1.514-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834588" version="1" comment="dotnet-sdk-2.1.5xx is &lt;2.1.514-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834589" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834590" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834591" version="1" comment="dotnet is &lt;3.1.104-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834592" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834593" version="1" comment="dotnet-host is &lt;3.1.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834594" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834595" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834596" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.104-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834597" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.4-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834598" version="1" comment="dotnet-templates-3.1 is &lt;3.1.104-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834599" version="1" comment="netstandard-targeting-pack-2.1 is &lt;3.1.104-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834600" version="1" comment="freerdp is &lt;2.0.0-46.rc4.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834601" version="1" comment="freerdp-devel is &lt;2.0.0-46.rc4.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834602" version="1" comment="freerdp-libs is &lt;2.0.0-46.rc4.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834603" version="1" comment="libwinpr is &lt;2.0.0-46.rc4.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834604" version="1" comment="libwinpr-devel is &lt;2.0.0-46.rc4.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834605" version="1" comment="bind is &lt;9.11.13-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834606" version="1" comment="bind-chroot is &lt;9.11.13-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834607" version="1" comment="bind-devel is &lt;9.11.13-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834608" version="1" comment="bind-export-devel is &lt;9.11.13-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834609" version="1" comment="bind-export-libs is &lt;9.11.13-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834610" version="1" comment="bind-libs is &lt;9.11.13-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834611" version="1" comment="bind-libs-lite is &lt;9.11.13-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834612" version="1" comment="bind-license is &lt;9.11.13-5.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834613" version="1" comment="bind-lite-devel is &lt;9.11.13-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834614" version="1" comment="bind-pkcs11 is &lt;9.11.13-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834615" version="1" comment="bind-pkcs11-devel is &lt;9.11.13-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834616" version="1" comment="bind-pkcs11-libs is &lt;9.11.13-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834617" version="1" comment="bind-pkcs11-utils is &lt;9.11.13-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834618" version="1" comment="bind-sdb is &lt;9.11.13-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834619" version="1" comment="bind-sdb-chroot is &lt;9.11.13-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834620" version="1" comment="bind-utils is &lt;9.11.13-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834621" version="1" comment="python3-bind is &lt;9.11.13-5.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834622" version="1" comment="firefox is &lt;68.9.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834623" version="1" comment="freerdp is &lt;2.0.0-46.rc4.el8_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834624" version="1" comment="freerdp-devel is &lt;2.0.0-46.rc4.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834625" version="1" comment="freerdp-libs is &lt;2.0.0-46.rc4.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834626" version="1" comment="libwinpr is &lt;2.0.0-46.rc4.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834627" version="1" comment="libwinpr-devel is &lt;2.0.0-46.rc4.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834628" version="1" comment="python3-unbound is &lt;1.7.3-11.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834629" version="1" comment="unbound is &lt;1.7.3-11.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834630" version="1" comment="unbound-devel is &lt;1.7.3-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834631" version="1" comment="unbound-libs is &lt;1.7.3-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834632" version="1" comment="bpftool is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834633" version="1" comment="kernel is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834634" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-193.6.3.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834635" version="1" comment="kernel-core is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834636" version="1" comment="kernel-cross-headers is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834637" version="1" comment="kernel-debug is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834638" version="1" comment="kernel-debug-core is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834640" version="1" comment="kernel-debug-modules is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834641" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834643" version="1" comment="kernel-doc is &lt;4.18.0-193.6.3.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834644" version="1" comment="kernel-headers is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834645" version="1" comment="kernel-modules is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834646" version="1" comment="kernel-modules-extra is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834647" version="1" comment="kernel-tools is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834648" version="1" comment="kernel-tools-libs is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834650" version="1" comment="perf is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834651" version="1" comment="python3-perf is &lt;4.18.0-193.6.3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834652" version="1" comment="microcode_ctl is &lt;20191115-4.20200602.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834653" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.5-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834654" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.5-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834655" version="1" comment="dotnet is &lt;3.1.105-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834656" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.5-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834657" version="1" comment="dotnet-host is &lt;3.1.5-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834658" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.5-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834659" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.5-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834660" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.105-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834661" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.5-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834662" version="1" comment="dotnet-templates-3.1 is &lt;3.1.105-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834663" version="1" comment="netstandard-targeting-pack-2.1 is &lt;3.1.105-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834664" version="1" comment="pcs is &lt;0.10.4-6.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834665" version="1" comment="pcs-snmp is &lt;0.10.4-6.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834666" version="1" comment="dotnet-host-fxr-2.1 is &lt;2.1.19-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834667" version="1" comment="dotnet-runtime-2.1 is &lt;2.1.19-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834668" version="1" comment="dotnet-sdk-2.1 is &lt;2.1.515-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834669" version="1" comment="dotnet-sdk-2.1.5xx is &lt;2.1.515-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834670" version="1" comment="libexif is &lt;0.6.21-17.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834671" version="1" comment="libexif-devel is &lt;0.6.21-17.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982181" version="1" comment="thunderbird is &lt;68.9.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834672" version="1" comment="gnutls is &lt;3.6.8-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834673" version="1" comment="gnutls-c++ is &lt;3.6.8-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834674" version="1" comment="gnutls-dane is &lt;3.6.8-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834675" version="1" comment="gnutls-devel is &lt;3.6.8-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834676" version="1" comment="gnutls-utils is &lt;3.6.8-11.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834677" version="1" comment="grafana is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834678" version="1" comment="grafana-azure-monitor is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834679" version="1" comment="grafana-cloudwatch is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834680" version="1" comment="grafana-elasticsearch is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834681" version="1" comment="grafana-graphite is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834682" version="1" comment="grafana-influxdb is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834683" version="1" comment="grafana-loki is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834684" version="1" comment="grafana-mssql is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834685" version="1" comment="grafana-mysql is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834686" version="1" comment="grafana-opentsdb is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834687" version="1" comment="grafana-postgres is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834688" version="1" comment="grafana-prometheus is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834689" version="1" comment="grafana-stackdriver is &lt;6.3.6-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834690" version="1" comment="libnghttp2 is &lt;1.33.0-3.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834691" version="1" comment="libnghttp2-devel is &lt;1.33.0-3.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834692" version="1" comment="nghttp2 is &lt;1.33.0-3.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834693" version="1" comment="libguestfs is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834694" version="1" comment="libguestfs-bash-completion is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834695" version="1" comment="libguestfs-benchmarking is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834696" version="1" comment="libguestfs-devel is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834697" version="1" comment="libguestfs-gfs2 is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834698" version="1" comment="libguestfs-gobject is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834699" version="1" comment="libguestfs-gobject-devel is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834700" version="1" comment="libguestfs-inspect-icons is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834701" version="1" comment="libguestfs-java is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834702" version="1" comment="libguestfs-java-devel is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834703" version="1" comment="libguestfs-javadoc is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834704" version="1" comment="libguestfs-man-pages-ja is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834705" version="1" comment="libguestfs-man-pages-uk is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834706" version="1" comment="libguestfs-rescue is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834707" version="1" comment="libguestfs-rsync is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834708" version="1" comment="libguestfs-tools is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834709" version="1" comment="libguestfs-tools-c is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834710" version="1" comment="libguestfs-xfs is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834711" version="1" comment="libvirt is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834712" version="1" comment="libvirt-admin is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834713" version="1" comment="libvirt-bash-completion is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834714" version="1" comment="libvirt-client is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834715" version="1" comment="libvirt-daemon is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834716" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834717" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834718" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834719" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834720" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834721" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834722" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834723" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834724" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834725" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834726" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834727" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834728" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834729" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834730" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834731" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834732" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834733" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834734" version="1" comment="libvirt-devel is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834735" version="1" comment="libvirt-docs is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834736" version="1" comment="libvirt-libs is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834737" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834738" version="1" comment="libvirt-nss is &lt;4.5.0-42.module+el8.2.0+6024+15a2423f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834739" version="1" comment="lua-guestfs is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834740" version="1" comment="ocaml-libguestfs is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834741" version="1" comment="ocaml-libguestfs-devel is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834742" version="1" comment="perl-Sys-Guestfs is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834743" version="1" comment="python3-libguestfs is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834744" version="1" comment="qemu-guest-agent is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834745" version="1" comment="qemu-img is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834746" version="1" comment="qemu-kvm is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834747" version="1" comment="qemu-kvm-block-curl is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834748" version="1" comment="qemu-kvm-block-gluster is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834749" version="1" comment="qemu-kvm-block-iscsi is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834750" version="1" comment="qemu-kvm-block-rbd is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834751" version="1" comment="qemu-kvm-block-ssh is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834752" version="1" comment="qemu-kvm-common is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834753" version="1" comment="qemu-kvm-core is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834754" version="1" comment="qemu-kvm-tests is &lt;2.12.0-99.module+el8.2.0+6870+55b789b4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834755" version="1" comment="ruby-libguestfs is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834756" version="1" comment="virt-dib is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834757" version="1" comment="virt-v2v is &lt;1.38.4-15.module+el8.2.0+5297+222a20af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834758" version="1" comment="firefox is &lt;68.10.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834759" version="1" comment="nodejs is &lt;10.21.0-3.module+el8.2.0+7071+d2377ea3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834760" version="1" comment="nodejs-devel is &lt;10.21.0-3.module+el8.2.0+7071+d2377ea3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834761" version="1" comment="nodejs-docs is &lt;10.21.0-3.module+el8.2.0+7071+d2377ea3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834762" version="1" comment="nodejs-full-i18n is &lt;10.21.0-3.module+el8.2.0+7071+d2377ea3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834763" version="1" comment="npm is &lt;6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834764" version="1" comment="nodejs is &lt;12.18.2-1.module+el8.2.0+7233+61d664c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834765" version="1" comment="nodejs-devel is &lt;12.18.2-1.module+el8.2.0+7233+61d664c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834766" version="1" comment="nodejs-docs is &lt;12.18.2-1.module+el8.2.0+7233+61d664c1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834767" version="1" comment="nodejs-full-i18n is &lt;12.18.2-1.module+el8.2.0+7233+61d664c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834768" version="1" comment="npm is &lt;6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834769" version="1" comment="jbig2dec-libs is &lt;0.14-4.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834770" version="1" comment="dovecot is &lt;2.3.8-2.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834771" version="1" comment="dovecot-devel is &lt;2.3.8-2.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834772" version="1" comment="dovecot-mysql is &lt;2.3.8-2.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834773" version="1" comment="dovecot-pgsql is &lt;2.3.8-2.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834774" version="1" comment="dovecot-pigeonhole is &lt;2.3.8-2.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834775" version="1" comment="sane-backends is &lt;1.0.27-19.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834776" version="1" comment="sane-backends-daemon is &lt;1.0.27-19.el8_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834777" version="1" comment="sane-backends-devel is &lt;1.0.27-19.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834778" version="1" comment="sane-backends-doc is &lt;1.0.27-19.el8_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834779" version="1" comment="sane-backends-drivers-cameras is &lt;1.0.27-19.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834780" version="1" comment="sane-backends-drivers-scanners is &lt;1.0.27-19.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834781" version="1" comment="sane-backends-libs is &lt;1.0.27-19.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834782" version="1" comment="dotnet-host-fxr-2.1 is &lt;2.1.20-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834783" version="1" comment="dotnet-runtime-2.1 is &lt;2.1.20-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834784" version="1" comment="dotnet-sdk-2.1 is &lt;2.1.516-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834785" version="1" comment="dotnet-sdk-2.1.5xx is &lt;2.1.516-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834786" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.6-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834787" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.6-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834788" version="1" comment="dotnet is &lt;3.1.106-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834789" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.6-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834790" version="1" comment="dotnet-host is &lt;3.1.6-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834791" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.6-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834792" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.6-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834793" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.106-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834794" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.6-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834795" version="1" comment="dotnet-templates-3.1 is &lt;3.1.106-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834796" version="1" comment="netstandard-targeting-pack-2.1 is &lt;3.1.106-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834797" version="1" comment="java-11-openjdk is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834798" version="1" comment="java-11-openjdk-demo is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834799" version="1" comment="java-11-openjdk-devel is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834800" version="1" comment="java-11-openjdk-headless is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834801" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834802" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834803" version="1" comment="java-11-openjdk-jmods is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834804" version="1" comment="java-11-openjdk-src is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834805" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.8.10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834806" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.262.b10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834807" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.262.b10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834808" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.262.b10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834809" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.262.b10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834810" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.262.b10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834811" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.262.b10-0.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834812" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.262.b10-0.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834813" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.262.b10-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834814" version="1" comment="bpftool is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834815" version="1" comment="kernel is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834816" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-193.13.2.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834817" version="1" comment="kernel-core is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834818" version="1" comment="kernel-cross-headers is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834819" version="1" comment="kernel-debug is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834820" version="1" comment="kernel-debug-core is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834822" version="1" comment="kernel-debug-modules is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834823" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834825" version="1" comment="kernel-doc is &lt;4.18.0-193.13.2.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834826" version="1" comment="kernel-headers is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834827" version="1" comment="kernel-modules is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834828" version="1" comment="kernel-modules-extra is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834829" version="1" comment="kernel-tools is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834830" version="1" comment="kernel-tools-libs is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834832" version="1" comment="perf is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834833" version="1" comment="python3-perf is &lt;4.18.0-193.13.2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834834" version="1" comment="NetworkManager is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834835" version="1" comment="NetworkManager-adsl is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834836" version="1" comment="NetworkManager-bluetooth is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834837" version="1" comment="NetworkManager-cloud-setup is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834838" version="1" comment="NetworkManager-config-server is &lt;1.22.8-5.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834839" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.22.8-5.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834840" version="1" comment="NetworkManager-libnm is &lt;1.22.8-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834841" version="1" comment="NetworkManager-libnm-devel is &lt;1.22.8-5.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834842" version="1" comment="NetworkManager-ovs is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834843" version="1" comment="NetworkManager-ppp is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834844" version="1" comment="NetworkManager-team is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834845" version="1" comment="NetworkManager-tui is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834846" version="1" comment="NetworkManager-wifi is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834847" version="1" comment="NetworkManager-wwan is &lt;1.22.8-5.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834848" version="1" comment="dbus is &lt;1.12.8-10.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834849" version="1" comment="dbus-common is &lt;1.12.8-10.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834850" version="1" comment="dbus-daemon is &lt;1.12.8-10.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834851" version="1" comment="dbus-devel is &lt;1.12.8-10.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834852" version="1" comment="dbus-libs is &lt;1.12.8-10.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834853" version="1" comment="dbus-tools is &lt;1.12.8-10.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834854" version="1" comment="dbus-x11 is &lt;1.12.8-10.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834855" version="1" comment="mod_auth_openidc is &lt;2.3.7-4.module+el8.2.0+6919+ac02cfd2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834856" version="1" comment="thunderbird is &lt;68.10.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834857" version="1" comment="cloud-init is &lt;19.4-1.el8.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834858" version="1" comment="buildah is &lt;1.14.9-1.module+el8.2.1+6689+748e6520 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834859" version="1" comment="buildah-tests is &lt;1.14.9-1.module+el8.2.1+6689+748e6520 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834860" version="1" comment="cockpit-podman is &lt;17-1.module+el8.2.1+6636+bf4db4ab for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834861" version="1" comment="conmon is &lt;2.0.17-1.module+el8.2.1+6771+3533eb4c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834862" version="1" comment="container-selinux is &lt;2.135.0-1.module+el8.2.1+6849+893e4f4a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834863" version="1" comment="containernetworking-plugins is &lt;0.8.6-1.module+el8.2.1+6626+598993b4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834864" version="1" comment="containers-common is &lt;1.0.0-1.module+el8.2.1+6676+604e1b26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834865" version="1" comment="crit is &lt;3.14-2.module+el8.2.1+6750+e53a300c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834866" version="1" comment="criu is &lt;3.14-2.module+el8.2.1+6750+e53a300c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834867" version="1" comment="fuse-overlayfs is &lt;1.0.0-2.module+el8.2.1+6465+1a51e8b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834868" version="1" comment="libslirp is &lt;4.3.0-3.module+el8.2.1+6816+bedf4f91 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834869" version="1" comment="libslirp-devel is &lt;4.3.0-3.module+el8.2.1+6816+bedf4f91 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834870" version="1" comment="podman is &lt;1.9.3-2.module+el8.2.1+6867+366c07d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834871" version="1" comment="podman-docker is &lt;1.9.3-2.module+el8.2.1+6867+366c07d6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834872" version="1" comment="podman-remote is &lt;1.9.3-2.module+el8.2.1+6867+366c07d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834873" version="1" comment="podman-tests is &lt;1.9.3-2.module+el8.2.1+6867+366c07d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834874" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.2.1+6465+1a51e8b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834875" version="1" comment="python3-criu is &lt;3.14-2.module+el8.2.1+6750+e53a300c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834876" version="1" comment="runc is &lt;1.0.0-66.rc10.module+el8.2.1+6465+1a51e8b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834877" version="1" comment="skopeo is &lt;1.0.0-1.module+el8.2.1+6676+604e1b26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834878" version="1" comment="skopeo-tests is &lt;1.0.0-1.module+el8.2.1+6676+604e1b26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834879" version="1" comment="slirp4netns is &lt;1.0.1-1.module+el8.2.1+6595+03641d72 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834880" version="1" comment="toolbox is &lt;0.0.7-1.module+el8.2.1+6465+1a51e8b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834881" version="1" comment="udica is &lt;0.2.1-2.module+el8.2.1+6465+1a51e8b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834882" version="1" comment="postgresql-jdbc is &lt;42.2.3-3.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834883" version="1" comment="postgresql-jdbc-javadoc is &lt;42.2.3-3.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834884" version="1" comment="python3-pillow is &lt;5.1.1-12.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834885" version="1" comment="bpftool is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834886" version="1" comment="kernel is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834887" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-193.14.3.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834888" version="1" comment="kernel-core is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834889" version="1" comment="kernel-cross-headers is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834890" version="1" comment="kernel-debug is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834891" version="1" comment="kernel-debug-core is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834893" version="1" comment="kernel-debug-modules is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834894" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834896" version="1" comment="kernel-doc is &lt;4.18.0-193.14.3.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834897" version="1" comment="kernel-headers is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834898" version="1" comment="kernel-modules is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834899" version="1" comment="kernel-modules-extra is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834900" version="1" comment="kernel-tools is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834901" version="1" comment="kernel-tools-libs is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834903" version="1" comment="perf is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834904" version="1" comment="python3-perf is &lt;4.18.0-193.14.3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834905" version="1" comment="firefox is &lt;68.11.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834906" version="1" comment="nspr is &lt;4.25.0-2.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834907" version="1" comment="nspr-devel is &lt;4.25.0-2.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834908" version="1" comment="nss is &lt;3.53.1-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834909" version="1" comment="nss-devel is &lt;3.53.1-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834910" version="1" comment="nss-softokn is &lt;3.53.1-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834911" version="1" comment="nss-softokn-devel is &lt;3.53.1-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834912" version="1" comment="nss-softokn-freebl is &lt;3.53.1-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834913" version="1" comment="nss-softokn-freebl-devel is &lt;3.53.1-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834914" version="1" comment="nss-sysinit is &lt;3.53.1-11.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834915" version="1" comment="nss-tools is &lt;3.53.1-11.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834916" version="1" comment="nss-util is &lt;3.53.1-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834917" version="1" comment="nss-util-devel is &lt;3.53.1-11.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834918" version="1" comment="thunderbird is &lt;68.11.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834919" version="1" comment="libvncserver is &lt;0.9.11-15.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834920" version="1" comment="libvncserver-devel is &lt;0.9.11-15.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834921" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.7-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834922" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.7-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834923" version="1" comment="dotnet is &lt;3.1.107-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834924" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.7-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834925" version="1" comment="dotnet-host is &lt;3.1.7-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834926" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.7-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834927" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.7-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834928" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.107-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834929" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.7-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834930" version="1" comment="dotnet-templates-3.1 is &lt;3.1.107-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834931" version="1" comment="netstandard-targeting-pack-2.1 is &lt;3.1.107-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834932" version="1" comment="firefox is &lt;78.2.0-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834933" version="1" comment="squid is &lt;4.4-8.module+el8.2.0+7834+b8ecaeef.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834934" version="1" comment="thunderbird is &lt;68.12.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834935" version="1" comment="libcroco is &lt;0.6.12-4.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834936" version="1" comment="libcroco-devel is &lt;0.6.12-4.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834937" version="1" comment="librepo is &lt;1.11.0-3.el8_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834938" version="1" comment="python3-librepo is &lt;1.11.0-3.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834939" version="1" comment="php is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834940" version="1" comment="php-bcmath is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834941" version="1" comment="php-cli is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834942" version="1" comment="php-common is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834943" version="1" comment="php-dba is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834944" version="1" comment="php-dbg is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834945" version="1" comment="php-devel is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834946" version="1" comment="php-embedded is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834947" version="1" comment="php-enchant is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834948" version="1" comment="php-fpm is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834949" version="1" comment="php-gd is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834950" version="1" comment="php-gmp is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834951" version="1" comment="php-intl is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834952" version="1" comment="php-json is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834953" version="1" comment="php-ldap is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834954" version="1" comment="php-mbstring is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834955" version="1" comment="php-mysqlnd is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834956" version="1" comment="php-odbc is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834957" version="1" comment="php-opcache is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834958" version="1" comment="php-pdo is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834959" version="1" comment="php-pecl-rrd is &lt;2.0.1-1.module+el8.2.0+4968+1d5097db for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834960" version="1" comment="php-pecl-xdebug is &lt;2.8.0-1.module+el8.2.0+4968+1d5097db for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834961" version="1" comment="php-pgsql is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834962" version="1" comment="php-process is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834963" version="1" comment="php-recode is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834964" version="1" comment="php-snmp is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834965" version="1" comment="php-soap is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834966" version="1" comment="php-xml is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834967" version="1" comment="php-xmlrpc is &lt;7.3.20-1.module+el8.2.0+7373+b272fdef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834968" version="1" comment="delve is &lt;1.3.2-3.module+el8.2.0+5581+896cb53e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834969" version="1" comment="go-toolset is &lt;1.13.15-1.module+el8.2.0+7662+fa98b974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834970" version="1" comment="golang is &lt;1.13.15-1.module+el8.2.0+7662+fa98b974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834971" version="1" comment="golang-bin is &lt;1.13.15-1.module+el8.2.0+7662+fa98b974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834972" version="1" comment="golang-docs is &lt;1.13.15-1.module+el8.2.0+7662+fa98b974 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834973" version="1" comment="golang-misc is &lt;1.13.15-1.module+el8.2.0+7662+fa98b974 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834974" version="1" comment="golang-race is &lt;1.13.15-1.module+el8.2.0+7662+fa98b974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834975" version="1" comment="golang-src is &lt;1.13.15-1.module+el8.2.0+7662+fa98b974 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834976" version="1" comment="golang-tests is &lt;1.13.15-1.module+el8.2.0+7662+fa98b974 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834977" version="1" comment="postgresql is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834978" version="1" comment="postgresql-contrib is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834979" version="1" comment="postgresql-docs is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834980" version="1" comment="postgresql-plperl is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834981" version="1" comment="postgresql-plpython3 is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834982" version="1" comment="postgresql-pltcl is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834983" version="1" comment="postgresql-server is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834984" version="1" comment="postgresql-server-devel is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834985" version="1" comment="postgresql-static is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834986" version="1" comment="postgresql-test is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834987" version="1" comment="postgresql-test-rpm-macros is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834988" version="1" comment="postgresql-upgrade is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834989" version="1" comment="postgresql-upgrade-devel is &lt;10.14-1.module+el8.2.0+7801+be0fed80 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834990" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.8-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834991" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.8-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834992" version="1" comment="dotnet is &lt;3.1.108-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834993" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.8-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834994" version="1" comment="dotnet-host is &lt;3.1.8-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834995" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.8-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834996" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.8-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834997" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.108-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834998" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.8-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009834999" version="1" comment="dotnet-templates-3.1 is &lt;3.1.108-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835000" version="1" comment="netstandard-targeting-pack-2.1 is &lt;3.1.108-2.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835001" version="1" comment="dovecot is &lt;2.3.8-2.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835002" version="1" comment="dovecot-devel is &lt;2.3.8-2.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835003" version="1" comment="dovecot-mysql is &lt;2.3.8-2.el8_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835004" version="1" comment="dovecot-pgsql is &lt;2.3.8-2.el8_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835005" version="1" comment="dovecot-pigeonhole is &lt;2.3.8-2.el8_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835006" version="1" comment="httpd is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835007" version="1" comment="httpd-devel is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835008" version="1" comment="httpd-filesystem is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835009" version="1" comment="httpd-manual is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835010" version="1" comment="httpd-tools is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835011" version="1" comment="mod_http2 is &lt;1.11.3-3.module+el8.2.0+7758+84b4ca3e.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835012" version="1" comment="mod_ldap is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835013" version="1" comment="mod_md is &lt;2.0.8-7.module+el8.2.0+5531+7e4d69a2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835014" version="1" comment="mod_proxy_html is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835015" version="1" comment="mod_session is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835016" version="1" comment="mod_ssl is &lt;2.4.37-21.module+el8.2.0+5008+cca404a3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835017" version="1" comment="mysql is &lt;8.0.21-1.module+el8.2.0+7855+47abd494 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835018" version="1" comment="mysql-common is &lt;8.0.21-1.module+el8.2.0+7855+47abd494 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835019" version="1" comment="mysql-devel is &lt;8.0.21-1.module+el8.2.0+7855+47abd494 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835020" version="1" comment="mysql-errmsg is &lt;8.0.21-1.module+el8.2.0+7855+47abd494 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835021" version="1" comment="mysql-libs is &lt;8.0.21-1.module+el8.2.0+7855+47abd494 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835022" version="1" comment="mysql-server is &lt;8.0.21-1.module+el8.2.0+7855+47abd494 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835023" version="1" comment="mysql-test is &lt;8.0.21-1.module+el8.2.0+7855+47abd494 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835024" version="1" comment="firefox is &lt;78.3.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835025" version="1" comment="qemu-guest-agent is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835026" version="1" comment="qemu-img is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835027" version="1" comment="qemu-kvm is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835028" version="1" comment="qemu-kvm-block-curl is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835029" version="1" comment="qemu-kvm-block-gluster is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835030" version="1" comment="qemu-kvm-block-iscsi is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835031" version="1" comment="qemu-kvm-block-rbd is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835032" version="1" comment="qemu-kvm-block-ssh is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835033" version="1" comment="qemu-kvm-common is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835034" version="1" comment="qemu-kvm-core is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835035" version="1" comment="qemu-kvm-tests is &lt;2.12.0-99.module+el8.2.0+7988+c1d02dbb.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835036" version="1" comment="thunderbird is &lt;78.3.1-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835037" version="1" comment="spice-glib is &lt;0.37-1.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835038" version="1" comment="spice-glib-devel is &lt;0.37-1.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835039" version="1" comment="spice-gtk is &lt;0.37-1.el8_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835040" version="1" comment="spice-gtk-tools is &lt;0.37-1.el8_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835041" version="1" comment="spice-gtk3 is &lt;0.37-1.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835042" version="1" comment="spice-gtk3-devel is &lt;0.37-1.el8_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835043" version="1" comment="spice-gtk3-vala is &lt;0.37-1.el8_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835044" version="1" comment="spice-server is &lt;0.14.2-1.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835045" version="1" comment="spice-server-devel is &lt;0.14.2-1.el8_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835046" version="1" comment="nodejs is &lt;12.18.4-2.module+el8.2.0+8361+192e434e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835047" version="1" comment="nodejs-devel is &lt;12.18.4-2.module+el8.2.0+8361+192e434e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835048" version="1" comment="nodejs-docs is &lt;12.18.4-2.module+el8.2.0+8361+192e434e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835049" version="1" comment="nodejs-full-i18n is &lt;12.18.4-2.module+el8.2.0+8361+192e434e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835050" version="1" comment="npm is &lt;6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835051" version="1" comment="bpftool is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835052" version="1" comment="kernel is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835053" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-193.28.1.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835054" version="1" comment="kernel-core is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835055" version="1" comment="kernel-cross-headers is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835056" version="1" comment="kernel-debug is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835057" version="1" comment="kernel-debug-core is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835059" version="1" comment="kernel-debug-modules is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835060" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835062" version="1" comment="kernel-doc is &lt;4.18.0-193.28.1.el8_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835063" version="1" comment="kernel-headers is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835064" version="1" comment="kernel-modules is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835065" version="1" comment="kernel-modules-extra is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835066" version="1" comment="kernel-tools is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835067" version="1" comment="kernel-tools-libs is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835069" version="1" comment="perf is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835070" version="1" comment="python3-perf is &lt;4.18.0-193.28.1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835071" version="1" comment="java-11-openjdk is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835072" version="1" comment="java-11-openjdk-demo is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835073" version="1" comment="java-11-openjdk-devel is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835074" version="1" comment="java-11-openjdk-headless is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835075" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835076" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835077" version="1" comment="java-11-openjdk-jmods is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835078" version="1" comment="java-11-openjdk-src is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835079" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.9.11-0.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835080" version="1" comment="firefox is &lt;78.4.0-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835081" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.272.b10-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835082" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.272.b10-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835083" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.272.b10-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835084" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.272.b10-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835085" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.272.b10-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835086" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.272.b10-1.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835087" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.272.b10-1.el8_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835088" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.272.b10-1.el8_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835089" version="1" comment="bpftool is &lt;4.18.0-240.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835090" version="1" comment="kernel is &lt;4.18.0-240.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835091" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-240.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835092" version="1" comment="kernel-core is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835093" version="1" comment="kernel-cross-headers is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835094" version="1" comment="kernel-debug is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835095" version="1" comment="kernel-debug-core is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835097" version="1" comment="kernel-debug-modules is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835098" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835100" version="1" comment="kernel-doc is &lt;4.18.0-240.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835101" version="1" comment="kernel-headers is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835102" version="1" comment="kernel-modules is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835103" version="1" comment="kernel-modules-extra is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835104" version="1" comment="kernel-tools is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835105" version="1" comment="kernel-tools-libs is &lt;4.18.0-240.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835107" version="1" comment="perf is &lt;4.18.0-240.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835108" version="1" comment="python3-perf is &lt;4.18.0-240.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835109" version="1" comment="platform-python-pip is &lt;9.0.3-18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835110" version="1" comment="python3-pip is &lt;9.0.3-18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835111" version="1" comment="python3-pip-wheel is &lt;9.0.3-18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835112" version="1" comment="platform-python is &lt;3.6.8-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835113" version="1" comment="platform-python-debug is &lt;3.6.8-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835114" version="1" comment="platform-python-devel is &lt;3.6.8-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835115" version="1" comment="python3-idle is &lt;3.6.8-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835116" version="1" comment="python3-libs is &lt;3.6.8-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835117" version="1" comment="python3-test is &lt;3.6.8-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835118" version="1" comment="python3-tkinter is &lt;3.6.8-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835119" version="1" comment="fwupd is &lt;1.4.2-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835120" version="1" comment="gnome-software is &lt;3.36.1-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835121" version="1" comment="libxmlb is &lt;0.1.15-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835122" version="1" comment="lemon is &lt;3.26.0-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835123" version="1" comment="sqlite is &lt;3.26.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835124" version="1" comment="sqlite-devel is &lt;3.26.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835125" version="1" comment="sqlite-doc is &lt;3.26.0-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835126" version="1" comment="sqlite-libs is &lt;3.26.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835127" version="1" comment="bsdtar is &lt;3.3.2-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835128" version="1" comment="libarchive is &lt;3.3.2-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835129" version="1" comment="libarchive-devel is &lt;3.3.2-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835130" version="1" comment="compat-libpthread-nonshared is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835131" version="1" comment="glibc is &lt;2.28-127.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835132" version="1" comment="glibc-all-langpacks is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835133" version="1" comment="glibc-benchtests is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835134" version="1" comment="glibc-common is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835135" version="1" comment="glibc-devel is &lt;2.28-127.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835136" version="1" comment="glibc-headers is &lt;2.28-127.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835137" version="1" comment="glibc-langpack-aa is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835138" version="1" comment="glibc-langpack-af is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835139" version="1" comment="glibc-langpack-agr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835140" version="1" comment="glibc-langpack-ak is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835141" version="1" comment="glibc-langpack-am is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835142" version="1" comment="glibc-langpack-an is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835143" version="1" comment="glibc-langpack-anp is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835144" version="1" comment="glibc-langpack-ar is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835145" version="1" comment="glibc-langpack-as is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835146" version="1" comment="glibc-langpack-ast is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835147" version="1" comment="glibc-langpack-ayc is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835148" version="1" comment="glibc-langpack-az is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835149" version="1" comment="glibc-langpack-be is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835150" version="1" comment="glibc-langpack-bem is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835151" version="1" comment="glibc-langpack-ber is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835152" version="1" comment="glibc-langpack-bg is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835153" version="1" comment="glibc-langpack-bhb is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835154" version="1" comment="glibc-langpack-bho is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835155" version="1" comment="glibc-langpack-bi is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835156" version="1" comment="glibc-langpack-bn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835157" version="1" comment="glibc-langpack-bo is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835158" version="1" comment="glibc-langpack-br is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835159" version="1" comment="glibc-langpack-brx is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835160" version="1" comment="glibc-langpack-bs is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835161" version="1" comment="glibc-langpack-byn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835162" version="1" comment="glibc-langpack-ca is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835163" version="1" comment="glibc-langpack-ce is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835164" version="1" comment="glibc-langpack-chr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835165" version="1" comment="glibc-langpack-cmn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835166" version="1" comment="glibc-langpack-crh is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835167" version="1" comment="glibc-langpack-cs is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835168" version="1" comment="glibc-langpack-csb is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835169" version="1" comment="glibc-langpack-cv is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835170" version="1" comment="glibc-langpack-cy is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835171" version="1" comment="glibc-langpack-da is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835172" version="1" comment="glibc-langpack-de is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835173" version="1" comment="glibc-langpack-doi is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835174" version="1" comment="glibc-langpack-dsb is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835175" version="1" comment="glibc-langpack-dv is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835176" version="1" comment="glibc-langpack-dz is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835177" version="1" comment="glibc-langpack-el is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835178" version="1" comment="glibc-langpack-en is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835179" version="1" comment="glibc-langpack-eo is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835180" version="1" comment="glibc-langpack-es is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835181" version="1" comment="glibc-langpack-et is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835182" version="1" comment="glibc-langpack-eu is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835183" version="1" comment="glibc-langpack-fa is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835184" version="1" comment="glibc-langpack-ff is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835185" version="1" comment="glibc-langpack-fi is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835186" version="1" comment="glibc-langpack-fil is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835187" version="1" comment="glibc-langpack-fo is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835188" version="1" comment="glibc-langpack-fr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835189" version="1" comment="glibc-langpack-fur is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835190" version="1" comment="glibc-langpack-fy is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835191" version="1" comment="glibc-langpack-ga is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835192" version="1" comment="glibc-langpack-gd is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835193" version="1" comment="glibc-langpack-gez is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835194" version="1" comment="glibc-langpack-gl is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835195" version="1" comment="glibc-langpack-gu is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835196" version="1" comment="glibc-langpack-gv is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835197" version="1" comment="glibc-langpack-ha is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835198" version="1" comment="glibc-langpack-hak is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835199" version="1" comment="glibc-langpack-he is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835200" version="1" comment="glibc-langpack-hi is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835201" version="1" comment="glibc-langpack-hif is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835202" version="1" comment="glibc-langpack-hne is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835203" version="1" comment="glibc-langpack-hr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835204" version="1" comment="glibc-langpack-hsb is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835205" version="1" comment="glibc-langpack-ht is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835206" version="1" comment="glibc-langpack-hu is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835207" version="1" comment="glibc-langpack-hy is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835208" version="1" comment="glibc-langpack-ia is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835209" version="1" comment="glibc-langpack-id is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835210" version="1" comment="glibc-langpack-ig is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835211" version="1" comment="glibc-langpack-ik is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835212" version="1" comment="glibc-langpack-is is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835213" version="1" comment="glibc-langpack-it is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835214" version="1" comment="glibc-langpack-iu is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835215" version="1" comment="glibc-langpack-ja is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835216" version="1" comment="glibc-langpack-ka is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835217" version="1" comment="glibc-langpack-kab is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835218" version="1" comment="glibc-langpack-kk is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835219" version="1" comment="glibc-langpack-kl is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835220" version="1" comment="glibc-langpack-km is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835221" version="1" comment="glibc-langpack-kn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835222" version="1" comment="glibc-langpack-ko is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835223" version="1" comment="glibc-langpack-kok is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835224" version="1" comment="glibc-langpack-ks is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835225" version="1" comment="glibc-langpack-ku is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835226" version="1" comment="glibc-langpack-kw is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835227" version="1" comment="glibc-langpack-ky is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835228" version="1" comment="glibc-langpack-lb is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835229" version="1" comment="glibc-langpack-lg is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835230" version="1" comment="glibc-langpack-li is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835231" version="1" comment="glibc-langpack-lij is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835232" version="1" comment="glibc-langpack-ln is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835233" version="1" comment="glibc-langpack-lo is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835234" version="1" comment="glibc-langpack-lt is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835235" version="1" comment="glibc-langpack-lv is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835236" version="1" comment="glibc-langpack-lzh is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835237" version="1" comment="glibc-langpack-mag is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835238" version="1" comment="glibc-langpack-mai is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835239" version="1" comment="glibc-langpack-mfe is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835240" version="1" comment="glibc-langpack-mg is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835241" version="1" comment="glibc-langpack-mhr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835242" version="1" comment="glibc-langpack-mi is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835243" version="1" comment="glibc-langpack-miq is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835244" version="1" comment="glibc-langpack-mjw is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835245" version="1" comment="glibc-langpack-mk is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835246" version="1" comment="glibc-langpack-ml is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835247" version="1" comment="glibc-langpack-mn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835248" version="1" comment="glibc-langpack-mni is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835249" version="1" comment="glibc-langpack-mr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835250" version="1" comment="glibc-langpack-ms is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835251" version="1" comment="glibc-langpack-mt is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835252" version="1" comment="glibc-langpack-my is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835253" version="1" comment="glibc-langpack-nan is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835254" version="1" comment="glibc-langpack-nb is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835255" version="1" comment="glibc-langpack-nds is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835256" version="1" comment="glibc-langpack-ne is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835257" version="1" comment="glibc-langpack-nhn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835258" version="1" comment="glibc-langpack-niu is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835259" version="1" comment="glibc-langpack-nl is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835260" version="1" comment="glibc-langpack-nn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835261" version="1" comment="glibc-langpack-nr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835262" version="1" comment="glibc-langpack-nso is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835263" version="1" comment="glibc-langpack-oc is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835264" version="1" comment="glibc-langpack-om is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835265" version="1" comment="glibc-langpack-or is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835266" version="1" comment="glibc-langpack-os is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835267" version="1" comment="glibc-langpack-pa is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835268" version="1" comment="glibc-langpack-pap is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835269" version="1" comment="glibc-langpack-pl is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835270" version="1" comment="glibc-langpack-ps is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835271" version="1" comment="glibc-langpack-pt is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835272" version="1" comment="glibc-langpack-quz is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835273" version="1" comment="glibc-langpack-raj is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835274" version="1" comment="glibc-langpack-ro is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835275" version="1" comment="glibc-langpack-ru is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835276" version="1" comment="glibc-langpack-rw is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835277" version="1" comment="glibc-langpack-sa is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835278" version="1" comment="glibc-langpack-sah is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835279" version="1" comment="glibc-langpack-sat is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835280" version="1" comment="glibc-langpack-sc is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835281" version="1" comment="glibc-langpack-sd is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835282" version="1" comment="glibc-langpack-se is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835283" version="1" comment="glibc-langpack-sgs is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835284" version="1" comment="glibc-langpack-shn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835285" version="1" comment="glibc-langpack-shs is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835286" version="1" comment="glibc-langpack-si is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835287" version="1" comment="glibc-langpack-sid is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835288" version="1" comment="glibc-langpack-sk is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835289" version="1" comment="glibc-langpack-sl is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835290" version="1" comment="glibc-langpack-sm is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835291" version="1" comment="glibc-langpack-so is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835292" version="1" comment="glibc-langpack-sq is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835293" version="1" comment="glibc-langpack-sr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835294" version="1" comment="glibc-langpack-ss is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835295" version="1" comment="glibc-langpack-st is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835296" version="1" comment="glibc-langpack-sv is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835297" version="1" comment="glibc-langpack-sw is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835298" version="1" comment="glibc-langpack-szl is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835299" version="1" comment="glibc-langpack-ta is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835300" version="1" comment="glibc-langpack-tcy is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835301" version="1" comment="glibc-langpack-te is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835302" version="1" comment="glibc-langpack-tg is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835303" version="1" comment="glibc-langpack-th is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835304" version="1" comment="glibc-langpack-the is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835305" version="1" comment="glibc-langpack-ti is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835306" version="1" comment="glibc-langpack-tig is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835307" version="1" comment="glibc-langpack-tk is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835308" version="1" comment="glibc-langpack-tl is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835309" version="1" comment="glibc-langpack-tn is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835310" version="1" comment="glibc-langpack-to is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835311" version="1" comment="glibc-langpack-tpi is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835312" version="1" comment="glibc-langpack-tr is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835313" version="1" comment="glibc-langpack-ts is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835314" version="1" comment="glibc-langpack-tt is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835315" version="1" comment="glibc-langpack-ug is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835316" version="1" comment="glibc-langpack-uk is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835317" version="1" comment="glibc-langpack-unm is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835318" version="1" comment="glibc-langpack-ur is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835319" version="1" comment="glibc-langpack-uz is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835320" version="1" comment="glibc-langpack-ve is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835321" version="1" comment="glibc-langpack-vi is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835322" version="1" comment="glibc-langpack-wa is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835323" version="1" comment="glibc-langpack-wae is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835324" version="1" comment="glibc-langpack-wal is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835325" version="1" comment="glibc-langpack-wo is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835326" version="1" comment="glibc-langpack-xh is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835327" version="1" comment="glibc-langpack-yi is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835328" version="1" comment="glibc-langpack-yo is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835329" version="1" comment="glibc-langpack-yue is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835330" version="1" comment="glibc-langpack-yuw is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835331" version="1" comment="glibc-langpack-zh is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835332" version="1" comment="glibc-langpack-zu is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835333" version="1" comment="glibc-locale-source is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835334" version="1" comment="glibc-minimal-langpack is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835335" version="1" comment="glibc-nss-devel is &lt;2.28-127.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835336" version="1" comment="glibc-static is &lt;2.28-127.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835337" version="1" comment="glibc-utils is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835338" version="1" comment="libnsl is &lt;2.28-127.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835339" version="1" comment="nscd is &lt;2.28-127.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835340" version="1" comment="nss_db is &lt;2.28-127.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835341" version="1" comment="nss_hesiod is &lt;2.28-127.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835342" version="1" comment="librabbitmq is &lt;0.9.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835343" version="1" comment="librabbitmq-devel is &lt;0.9.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051511" version="1" comment="PackageKit is &lt;1.1.12-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051512" version="1" comment="PackageKit-command-not-found is &lt;1.1.12-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051513" version="1" comment="PackageKit-cron is &lt;1.1.12-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051514" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.12-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051515" version="1" comment="dleyna-renderer is &lt;0.6.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051516" version="1" comment="frei0r-plugins is &lt;1.6.1-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051517" version="1" comment="frei0r-plugins-opencv is &lt;1.6.1-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051518" version="1" comment="gnome-control-center is &lt;3.28.2-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051519" version="1" comment="gnome-photos is &lt;3.28.1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051520" version="1" comment="gnome-photos-tests is &lt;3.28.1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051521" version="1" comment="gnome-remote-desktop is &lt;0.1.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051522" version="1" comment="gnome-session is &lt;3.28.1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051523" version="1" comment="gnome-session-wayland-session is &lt;3.28.1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051524" version="1" comment="gnome-session-xsession is &lt;3.28.1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051525" version="1" comment="gnome-settings-daemon is &lt;3.32.0-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051526" version="1" comment="gnome-shell is &lt;3.32.2-20.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051527" version="1" comment="gnome-terminal is &lt;3.28.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051528" version="1" comment="gnome-terminal-nautilus is &lt;3.28.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051529" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051530" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051531" version="1" comment="gvfs is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051532" version="1" comment="gvfs-afc is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051533" version="1" comment="gvfs-afp is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051534" version="1" comment="gvfs-archive is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051535" version="1" comment="gvfs-fuse is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051536" version="1" comment="gvfs-goa is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051537" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051538" version="1" comment="gvfs-mtp is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051539" version="1" comment="gvfs-smb is &lt;1.36.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051540" version="1" comment="nautilus is &lt;3.28.1-14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051541" version="1" comment="pipewire-doc is &lt;0.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051542" version="1" comment="pipewire-utils is &lt;0.3.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051543" version="1" comment="vte-profile is &lt;0.52.4-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051544" version="1" comment="xdg-desktop-portal is &lt;1.6.0-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051545" version="1" comment="xdg-desktop-portal-gtk is &lt;1.6.0-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835344" version="1" comment="vim-X11 is &lt;8.0.1763-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835345" version="1" comment="vim-common is &lt;8.0.1763-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835346" version="1" comment="vim-enhanced is &lt;8.0.1763-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835347" version="1" comment="vim-filesystem is &lt;8.0.1763-15.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835348" version="1" comment="vim-minimal is &lt;8.0.1763-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835349" version="1" comment="libxslt is &lt;1.1.32-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835350" version="1" comment="libxslt-devel is &lt;1.1.32-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835351" version="1" comment="binutils is &lt;2.30-79.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835352" version="1" comment="binutils-devel is &lt;2.30-79.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835353" version="1" comment="cups is &lt;2.2.6-38.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835354" version="1" comment="cups-client is &lt;2.2.6-38.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835355" version="1" comment="cups-devel is &lt;2.2.6-38.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835356" version="1" comment="cups-filesystem is &lt;2.2.6-38.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835357" version="1" comment="cups-ipptool is &lt;2.2.6-38.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835358" version="1" comment="cups-libs is &lt;2.2.6-38.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835359" version="1" comment="cups-lpd is &lt;2.2.6-38.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835360" version="1" comment="libxml2 is &lt;2.9.7-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835361" version="1" comment="libxml2-devel is &lt;2.9.7-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835362" version="1" comment="python3-libxml2 is &lt;2.9.7-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835363" version="1" comment="bluez is &lt;5.50-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835364" version="1" comment="bluez-cups is &lt;5.50-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835365" version="1" comment="bluez-hid2hci is &lt;5.50-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835366" version="1" comment="bluez-libs is &lt;5.50-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835367" version="1" comment="bluez-libs-devel is &lt;5.50-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835368" version="1" comment="bluez-obexd is &lt;5.50-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835369" version="1" comment="libgcrypt is &lt;1.8.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835370" version="1" comment="libgcrypt-devel is &lt;1.8.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835371" version="1" comment="opensc is &lt;0.20.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835372" version="1" comment="expat is &lt;2.2.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835373" version="1" comment="expat-devel is &lt;2.2.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835374" version="1" comment="gnupg2 is &lt;2.2.20-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835375" version="1" comment="gnupg2-smime is &lt;2.2.20-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835376" version="1" comment="cyrus-sasl is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835377" version="1" comment="cyrus-sasl-devel is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835378" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835379" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835380" version="1" comment="cyrus-sasl-ldap is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835381" version="1" comment="cyrus-sasl-lib is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835382" version="1" comment="cyrus-sasl-md5 is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835383" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835384" version="1" comment="cyrus-sasl-plain is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835385" version="1" comment="cyrus-sasl-scram is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835386" version="1" comment="cyrus-sasl-sql is &lt;2.1.27-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835387" version="1" comment="bind is &lt;9.11.20-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835388" version="1" comment="bind-chroot is &lt;9.11.20-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835389" version="1" comment="bind-devel is &lt;9.11.20-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835390" version="1" comment="bind-export-devel is &lt;9.11.20-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835391" version="1" comment="bind-export-libs is &lt;9.11.20-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835392" version="1" comment="bind-libs is &lt;9.11.20-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835393" version="1" comment="bind-libs-lite is &lt;9.11.20-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835394" version="1" comment="bind-license is &lt;9.11.20-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835395" version="1" comment="bind-lite-devel is &lt;9.11.20-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835396" version="1" comment="bind-pkcs11 is &lt;9.11.20-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835397" version="1" comment="bind-pkcs11-devel is &lt;9.11.20-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835398" version="1" comment="bind-pkcs11-libs is &lt;9.11.20-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835399" version="1" comment="bind-pkcs11-utils is &lt;9.11.20-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835400" version="1" comment="bind-sdb is &lt;9.11.20-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835401" version="1" comment="bind-sdb-chroot is &lt;9.11.20-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835402" version="1" comment="bind-utils is &lt;9.11.20-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835403" version="1" comment="python3-bind is &lt;9.11.20-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835404" version="1" comment="libsolv is &lt;0.7.11-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835405" version="1" comment="python3-solv is &lt;0.7.11-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835406" version="1" comment="openssl is &lt;1.1.1g-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835407" version="1" comment="openssl-devel is &lt;1.1.1g-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835408" version="1" comment="openssl-libs is &lt;1.1.1g-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835409" version="1" comment="openssl-perl is &lt;1.1.1g-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835410" version="1" comment="pcre2 is &lt;10.32-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835411" version="1" comment="pcre2-devel is &lt;10.32-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835412" version="1" comment="pcre2-tools is &lt;10.32-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835413" version="1" comment="pcre2-utf16 is &lt;10.32-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835414" version="1" comment="pcre2-utf32 is &lt;10.32-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835415" version="1" comment="cryptsetup is &lt;2.3.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835416" version="1" comment="cryptsetup-devel is &lt;2.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835417" version="1" comment="cryptsetup-libs is &lt;2.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835418" version="1" comment="cryptsetup-reencrypt is &lt;2.3.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835419" version="1" comment="integritysetup is &lt;2.3.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835420" version="1" comment="veritysetup is &lt;2.3.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835421" version="1" comment="libssh is &lt;0.9.4-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835422" version="1" comment="libssh-config is &lt;0.9.4-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835423" version="1" comment="libssh-devel is &lt;0.9.4-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835424" version="1" comment="libpcap is &lt;1.9.1-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835425" version="1" comment="libpcap-devel is &lt;1.9.1-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835426" version="1" comment="systemd is &lt;239-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835427" version="1" comment="systemd-container is &lt;239-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835428" version="1" comment="systemd-devel is &lt;239-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835429" version="1" comment="systemd-journal-remote is &lt;239-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835430" version="1" comment="systemd-libs is &lt;239-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835431" version="1" comment="systemd-pam is &lt;239-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835432" version="1" comment="systemd-tests is &lt;239-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835433" version="1" comment="systemd-udev is &lt;239-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835434" version="1" comment="ldb-tools is &lt;2.1.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835435" version="1" comment="libldb is &lt;2.1.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835436" version="1" comment="libldb-devel is &lt;2.1.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835437" version="1" comment="python3-ldb is &lt;2.1.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835438" version="1" comment="curl is &lt;7.61.1-14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835439" version="1" comment="libcurl is &lt;7.61.1-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835440" version="1" comment="libcurl-devel is &lt;7.61.1-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835441" version="1" comment="libcurl-minimal is &lt;7.61.1-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835442" version="1" comment="resource-agents is &lt;4.1.1-68.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835443" version="1" comment="resource-agents-aliyun is &lt;4.1.1-68.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835444" version="1" comment="frr is &lt;7.0-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835445" version="1" comment="frr-contrib is &lt;7.0-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835446" version="1" comment="spamassassin is &lt;3.4.2-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835447" version="1" comment="SDL is &lt;1.2.15-38.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835448" version="1" comment="SDL-devel is &lt;1.2.15-38.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835449" version="1" comment="libvpx is &lt;1.7.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835450" version="1" comment="libvpx-devel is &lt;1.7.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835451" version="1" comment="libtiff is &lt;4.0.9-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835452" version="1" comment="libtiff-devel is &lt;4.0.9-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835453" version="1" comment="libtiff-tools is &lt;4.0.9-18.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835454" version="1" comment="sysstat is &lt;11.7.3-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835455" version="1" comment="python38 is &lt;3.8.3-3.module+el8.3.0+7680+79e7e61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835456" version="1" comment="python38-Cython is &lt;0.29.14-4.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835457" version="1" comment="python38-PyMySQL is &lt;0.9.3-3.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835458" version="1" comment="python38-asn1crypto is &lt;1.2.0-3.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835459" version="1" comment="python38-babel is &lt;2.7.0-10.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835460" version="1" comment="python38-cffi is &lt;1.13.2-3.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835461" version="1" comment="python38-chardet is &lt;3.0.4-19.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835462" version="1" comment="python38-cryptography is &lt;2.8-3.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835463" version="1" comment="python38-debug is &lt;3.8.3-3.module+el8.3.0+7680+79e7e61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835464" version="1" comment="python38-devel is &lt;3.8.3-3.module+el8.3.0+7680+79e7e61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835465" version="1" comment="python38-idle is &lt;3.8.3-3.module+el8.3.0+7680+79e7e61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835466" version="1" comment="python38-idna is &lt;2.8-6.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835467" version="1" comment="python38-jinja2 is &lt;2.10.3-4.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835468" version="1" comment="python38-libs is &lt;3.8.3-3.module+el8.3.0+7680+79e7e61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835469" version="1" comment="python38-lxml is &lt;4.4.1-4.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835470" version="1" comment="python38-markupsafe is &lt;1.1.1-6.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835471" version="1" comment="python38-mod_wsgi is &lt;4.6.8-3.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835472" version="1" comment="python38-numpy is &lt;1.17.3-5.module+el8.3.0+7187+a27ec44b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835473" version="1" comment="python38-numpy-doc is &lt;1.17.3-5.module+el8.3.0+7187+a27ec44b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835474" version="1" comment="python38-numpy-f2py is &lt;1.17.3-5.module+el8.3.0+7187+a27ec44b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835475" version="1" comment="python38-pip is &lt;19.3.1-1.module+el8.3.0+7187+a27ec44b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835476" version="1" comment="python38-pip-wheel is &lt;19.3.1-1.module+el8.3.0+7187+a27ec44b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835477" version="1" comment="python38-ply is &lt;3.11-8.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835478" version="1" comment="python38-psutil is &lt;5.6.4-3.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835479" version="1" comment="python38-psycopg2 is &lt;2.8.4-4.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835480" version="1" comment="python38-psycopg2-doc is &lt;2.8.4-4.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835481" version="1" comment="python38-psycopg2-tests is &lt;2.8.4-4.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835482" version="1" comment="python38-pycparser is &lt;2.19-3.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835483" version="1" comment="python38-pysocks is &lt;1.7.1-4.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835484" version="1" comment="python38-pytz is &lt;2019.3-3.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835485" version="1" comment="python38-pyyaml is &lt;5.3.1-1.module+el8.3.0+7187+a27ec44b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835486" version="1" comment="python38-requests is &lt;2.22.0-9.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835487" version="1" comment="python38-rpm-macros is &lt;3.8.3-3.module+el8.3.0+7680+79e7e61a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835488" version="1" comment="python38-scipy is &lt;1.3.1-4.module+el8.2.0+5234+f98739b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835489" version="1" comment="python38-setuptools is &lt;41.6.0-4.module+el8.3.0+7187+a27ec44b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835490" version="1" comment="python38-setuptools-wheel is &lt;41.6.0-4.module+el8.3.0+7187+a27ec44b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835491" version="1" comment="python38-six is &lt;1.12.0-9.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835492" version="1" comment="python38-test is &lt;3.8.3-3.module+el8.3.0+7680+79e7e61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835493" version="1" comment="python38-tkinter is &lt;3.8.3-3.module+el8.3.0+7680+79e7e61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835494" version="1" comment="python38-urllib3 is &lt;1.25.7-4.module+el8.2.0+5234+f98739b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835495" version="1" comment="python38-wheel is &lt;0.33.6-5.module+el8.3.0+7187+a27ec44b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835496" version="1" comment="python38-wheel-wheel is &lt;0.33.6-5.module+el8.3.0+7187+a27ec44b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835497" version="1" comment="poppler is &lt;0.66.0-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835498" version="1" comment="poppler-cpp is &lt;0.66.0-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835499" version="1" comment="poppler-cpp-devel is &lt;0.66.0-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835500" version="1" comment="poppler-devel is &lt;0.66.0-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835501" version="1" comment="poppler-glib is &lt;0.66.0-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835502" version="1" comment="poppler-glib-devel is &lt;0.66.0-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835503" version="1" comment="poppler-qt5 is &lt;0.66.0-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835504" version="1" comment="poppler-qt5-devel is &lt;0.66.0-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835505" version="1" comment="poppler-utils is &lt;0.66.0-27.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835506" version="1" comment="freerdp is &lt;2.1.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835507" version="1" comment="freerdp-devel is &lt;2.1.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835508" version="1" comment="freerdp-libs is &lt;2.1.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835509" version="1" comment="libwinpr is &lt;2.1.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835510" version="1" comment="libwinpr-devel is &lt;2.1.1-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835511" version="1" comment="vinagre is &lt;3.22.0-23.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835512" version="1" comment="cloud-init is &lt;19.4-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835513" version="1" comment="python-sqlalchemy-doc is &lt;1.3.2-2.module+el8.3.0+6647+8d010749 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835514" version="1" comment="python2 is &lt;2.7.17-2.module+el8.3.0+7681+f1f02ded for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835515" version="1" comment="python2-debug is &lt;2.7.17-2.module+el8.3.0+7681+f1f02ded for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835516" version="1" comment="python2-devel is &lt;2.7.17-2.module+el8.3.0+7681+f1f02ded for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835517" version="1" comment="python2-libs is &lt;2.7.17-2.module+el8.3.0+7681+f1f02ded for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835518" version="1" comment="python2-pip is &lt;9.0.3-18.module+el8.3.0+7707+eb4bba01 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835519" version="1" comment="python2-pip-wheel is &lt;9.0.3-18.module+el8.3.0+7707+eb4bba01 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835520" version="1" comment="python2-setuptools is &lt;39.0.1-12.module+el8.3.0+7075+8484f0d0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835521" version="1" comment="python2-setuptools-wheel is &lt;39.0.1-12.module+el8.3.0+7075+8484f0d0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835522" version="1" comment="python2-sqlalchemy is &lt;1.3.2-2.module+el8.3.0+6647+8d010749 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835523" version="1" comment="python2-test is &lt;2.7.17-2.module+el8.3.0+7681+f1f02ded for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835524" version="1" comment="python2-tkinter is &lt;2.7.17-2.module+el8.3.0+7681+f1f02ded for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835525" version="1" comment="python2-tools is &lt;2.7.17-2.module+el8.3.0+7681+f1f02ded for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835526" version="1" comment="cyrus-imapd is &lt;3.0.7-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835527" version="1" comment="cyrus-imapd-utils is &lt;3.0.7-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835528" version="1" comment="cyrus-imapd-vzic is &lt;3.0.7-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835529" version="1" comment="gd is &lt;2.2.5-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835530" version="1" comment="gd-devel is &lt;2.2.5-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835531" version="1" comment="mailman is &lt;2.1.29-10.module+el8.3.0+6860+8e47d84b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835532" version="1" comment="grafana is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835533" version="1" comment="grafana-azure-monitor is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835534" version="1" comment="grafana-cloudwatch is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835535" version="1" comment="grafana-elasticsearch is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835536" version="1" comment="grafana-graphite is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835537" version="1" comment="grafana-influxdb is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835538" version="1" comment="grafana-loki is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835539" version="1" comment="grafana-mssql is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835540" version="1" comment="grafana-mysql is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835541" version="1" comment="grafana-opentsdb is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835542" version="1" comment="grafana-postgres is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835543" version="1" comment="grafana-prometheus is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835544" version="1" comment="grafana-stackdriver is &lt;6.7.4-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835545" version="1" comment="bpftool is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835546" version="1" comment="kernel is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835547" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-240.1.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835548" version="1" comment="kernel-core is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835549" version="1" comment="kernel-cross-headers is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835550" version="1" comment="kernel-debug is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835551" version="1" comment="kernel-debug-core is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835553" version="1" comment="kernel-debug-modules is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835554" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835556" version="1" comment="kernel-doc is &lt;4.18.0-240.1.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835557" version="1" comment="kernel-headers is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835558" version="1" comment="kernel-modules is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835559" version="1" comment="kernel-modules-extra is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835560" version="1" comment="kernel-tools is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835561" version="1" comment="kernel-tools-libs is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835563" version="1" comment="perf is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835564" version="1" comment="python3-perf is &lt;4.18.0-240.1.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835565" version="1" comment="oddjob is &lt;0.34.5-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835566" version="1" comment="oddjob-mkhomedir is &lt;0.34.5-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835567" version="1" comment="libwsman-devel is &lt;2.6.5-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835568" version="1" comment="libwsman1 is &lt;2.6.5-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835569" version="1" comment="openwsman-client is &lt;2.6.5-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835570" version="1" comment="openwsman-python3 is &lt;2.6.5-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835571" version="1" comment="openwsman-server is &lt;2.6.5-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835572" version="1" comment="qt5-assistant is &lt;5.12.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835573" version="1" comment="qt5-designer is &lt;5.12.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835574" version="1" comment="qt5-doctools is &lt;5.12.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835575" version="1" comment="qt5-linguist is &lt;5.12.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835576" version="1" comment="qt5-qdbusviewer is &lt;5.12.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835577" version="1" comment="qt5-qtbase is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835578" version="1" comment="qt5-qtbase-common is &lt;5.12.5-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835579" version="1" comment="qt5-qtbase-devel is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835580" version="1" comment="qt5-qtbase-examples is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835581" version="1" comment="qt5-qtbase-gui is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835582" version="1" comment="qt5-qtbase-mysql is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835583" version="1" comment="qt5-qtbase-odbc is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835584" version="1" comment="qt5-qtbase-postgresql is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835585" version="1" comment="qt5-qtbase-private-devel is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835586" version="1" comment="qt5-qtbase-static is &lt;5.12.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835587" version="1" comment="qt5-qttools is &lt;5.12.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835588" version="1" comment="qt5-qttools-common is &lt;5.12.5-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835589" version="1" comment="qt5-qttools-devel is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835590" version="1" comment="qt5-qttools-examples is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835591" version="1" comment="qt5-qttools-libs-designer is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835592" version="1" comment="qt5-qttools-libs-designercomponents is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835593" version="1" comment="qt5-qttools-libs-help is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835594" version="1" comment="qt5-qttools-static is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835595" version="1" comment="qt5-qtwebsockets is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835596" version="1" comment="qt5-qtwebsockets-devel is &lt;5.12.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835597" version="1" comment="qt5-qtwebsockets-examples is &lt;5.12.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009196728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835598" version="1" comment="buildah is &lt;1.15.1-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835599" version="1" comment="buildah-tests is &lt;1.15.1-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835600" version="1" comment="cockpit-podman is &lt;18.1-2.module+el8.3.0+8221+97165c3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835601" version="1" comment="conmon is &lt;2.0.20-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835602" version="1" comment="container-selinux is &lt;2.144.0-1.module+el8.3.0+8221+97165c3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835603" version="1" comment="containernetworking-plugins is &lt;0.8.6-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835604" version="1" comment="containers-common is &lt;1.1.1-3.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835605" version="1" comment="crit is &lt;3.14-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835606" version="1" comment="criu is &lt;3.14-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835607" version="1" comment="crun is &lt;0.14.1-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835608" version="1" comment="fuse-overlayfs is &lt;1.1.2-3.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835609" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835610" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835611" version="1" comment="oci-seccomp-bpf-hook is &lt;1.1.2-3.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835612" version="1" comment="podman is &lt;2.0.5-5.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835613" version="1" comment="podman-catatonit is &lt;2.0.5-5.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835614" version="1" comment="podman-docker is &lt;2.0.5-5.module+el8.3.0+8221+97165c3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835615" version="1" comment="podman-remote is &lt;2.0.5-5.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835616" version="1" comment="podman-tests is &lt;2.0.5-5.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835617" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835618" version="1" comment="python3-criu is &lt;3.14-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835619" version="1" comment="runc is &lt;1.0.0-68.rc92.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835620" version="1" comment="skopeo is &lt;1.1.1-3.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835621" version="1" comment="skopeo-tests is &lt;1.1.1-3.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835622" version="1" comment="slirp4netns is &lt;1.1.4-2.module+el8.3.0+8221+97165c3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835623" version="1" comment="toolbox is &lt;0.0.8-1.module+el8.3.0+8221+97165c3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835624" version="1" comment="udica is &lt;0.2.2-1.module+el8.3.0+8221+97165c3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835625" version="1" comment="targetcli is &lt;2.1.53-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835626" version="1" comment="librsvg2 is &lt;2.42.7-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835627" version="1" comment="librsvg2-devel is &lt;2.42.7-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835628" version="1" comment="librsvg2-tools is &lt;2.42.7-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835629" version="1" comment="libserf is &lt;1.3.9-9.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835630" version="1" comment="mod_dav_svn is &lt;1.10.2-3.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835631" version="1" comment="subversion is &lt;1.10.2-3.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835632" version="1" comment="subversion-devel is &lt;1.10.2-3.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835633" version="1" comment="subversion-gnome is &lt;1.10.2-3.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835634" version="1" comment="subversion-javahl is &lt;1.10.2-3.module+el8.3.0+6671+2675c974 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835635" version="1" comment="subversion-libs is &lt;1.10.2-3.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835636" version="1" comment="subversion-perl is &lt;1.10.2-3.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835637" version="1" comment="subversion-tools is &lt;1.10.2-3.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835638" version="1" comment="utf8proc is &lt;2.1.1-5.module+el8.3.0+6671+2675c974 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835639" version="1" comment="squid is &lt;4.11-3.module+el8.3.0+7851+7808b5f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835640" version="1" comment="httpd is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835641" version="1" comment="httpd-devel is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835642" version="1" comment="httpd-filesystem is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835643" version="1" comment="httpd-manual is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835644" version="1" comment="httpd-tools is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835645" version="1" comment="mod_http2 is &lt;1.15.7-2.module+el8.3.0+7670+8bf57d29 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835646" version="1" comment="mod_ldap is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835647" version="1" comment="mod_proxy_html is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835648" version="1" comment="mod_session is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835649" version="1" comment="mod_ssl is &lt;2.4.37-30.module+el8.3.0+7001+0766b9e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835650" version="1" comment="varnish is &lt;6.0.6-2.module+el8.3.0+6843+b3b42fcc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835651" version="1" comment="varnish-devel is &lt;6.0.6-2.module+el8.3.0+6843+b3b42fcc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835652" version="1" comment="varnish-docs is &lt;6.0.6-2.module+el8.3.0+6843+b3b42fcc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835653" version="1" comment="varnish-modules is &lt;0.15.0-5.module+el8.3.0+6843+b3b42fcc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835654" version="1" comment="tcpdump is &lt;4.9.3-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835655" version="1" comment="dovecot is &lt;2.3.8-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835656" version="1" comment="dovecot-devel is &lt;2.3.8-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835657" version="1" comment="dovecot-mysql is &lt;2.3.8-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835658" version="1" comment="dovecot-pgsql is &lt;2.3.8-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835659" version="1" comment="dovecot-pigeonhole is &lt;2.3.8-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835660" version="1" comment="libexif is &lt;0.6.22-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835661" version="1" comment="libexif-devel is &lt;0.6.22-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835662" version="1" comment="freeradius is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835663" version="1" comment="freeradius-devel is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835664" version="1" comment="freeradius-doc is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835665" version="1" comment="freeradius-krb5 is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835666" version="1" comment="freeradius-ldap is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835667" version="1" comment="freeradius-mysql is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835668" version="1" comment="freeradius-perl is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835669" version="1" comment="freeradius-postgresql is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835670" version="1" comment="freeradius-rest is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835671" version="1" comment="freeradius-sqlite is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835672" version="1" comment="freeradius-unixODBC is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835673" version="1" comment="freeradius-utils is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835674" version="1" comment="python3-freeradius is &lt;3.0.20-3.module+el8.3.0+7597+67902674 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835675" version="1" comment="edk2-ovmf is &lt;20200602gitca407c7246bf-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835676" version="1" comment="dpdk is &lt;19.11.3-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835677" version="1" comment="dpdk-devel is &lt;19.11.3-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835678" version="1" comment="dpdk-doc is &lt;19.11.3-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835679" version="1" comment="dpdk-tools is &lt;19.11.3-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835680" version="1" comment="prometheus-jmx-exporter is &lt;0.12.0-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835681" version="1" comment="file-roller is &lt;3.28.1-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835682" version="1" comment="oniguruma is &lt;6.8.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835683" version="1" comment="oniguruma-devel is &lt;6.8.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835684" version="1" comment="fontforge is &lt;20170731-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835685" version="1" comment="thunderbird is &lt;78.4.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835686" version="1" comment="freetype is &lt;2.9.1-4.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835687" version="1" comment="freetype-devel is &lt;2.9.1-4.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835688" version="1" comment="microcode_ctl is &lt;20200609-2.20201027.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835689" version="1" comment="firefox is &lt;78.4.1-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835690" version="1" comment="thunderbird is &lt;78.4.3-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835691" version="1" comment="thunderbird is &lt;78.5.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835692" version="1" comment="firefox is &lt;78.5.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835693" version="1" comment="libexif is &lt;0.6.22-5.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835694" version="1" comment="libexif-devel is &lt;0.6.22-5.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835695" version="1" comment="thunderbird is &lt;78.5.1-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835696" version="1" comment="libpq is &lt;12.5-1.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835697" version="1" comment="libpq-devel is &lt;12.5-1.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835698" version="1" comment="bpftool is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835699" version="1" comment="kernel is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835700" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-240.8.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835701" version="1" comment="kernel-core is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835702" version="1" comment="kernel-cross-headers is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835703" version="1" comment="kernel-debug is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835704" version="1" comment="kernel-debug-core is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835706" version="1" comment="kernel-debug-modules is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835707" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835709" version="1" comment="kernel-doc is &lt;4.18.0-240.8.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835710" version="1" comment="kernel-headers is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835711" version="1" comment="kernel-modules is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835712" version="1" comment="kernel-modules-extra is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835713" version="1" comment="kernel-tools is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835714" version="1" comment="kernel-tools-libs is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835716" version="1" comment="perf is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835717" version="1" comment="python3-perf is &lt;4.18.0-240.8.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835718" version="1" comment="openssl is &lt;1.1.1g-12.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835719" version="1" comment="openssl-devel is &lt;1.1.1g-12.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835720" version="1" comment="openssl-libs is &lt;1.1.1g-12.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835721" version="1" comment="openssl-perl is &lt;1.1.1g-12.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835722" version="1" comment="iwl100-firmware is &lt;39.31.5.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835723" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835724" version="1" comment="iwl105-firmware is &lt;18.168.6.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835725" version="1" comment="iwl135-firmware is &lt;18.168.6.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835726" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835727" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835728" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835729" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835730" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835731" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835732" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835733" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835734" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835735" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835736" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835737" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-101.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835738" version="1" comment="libertas-sd8686-firmware is &lt;20200619-101.git3890db36.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835739" version="1" comment="libertas-sd8787-firmware is &lt;20200619-101.git3890db36.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835740" version="1" comment="libertas-usb8388-firmware is &lt;20200619-101.git3890db36.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835741" version="1" comment="libertas-usb8388-olpc-firmware is &lt;20200619-101.git3890db36.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835742" version="1" comment="linux-firmware is &lt;20200619-101.git3890db36.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835743" version="1" comment="net-snmp is &lt;5.8-18.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835744" version="1" comment="net-snmp-agent-libs is &lt;5.8-18.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835745" version="1" comment="net-snmp-devel is &lt;5.8-18.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835746" version="1" comment="net-snmp-libs is &lt;5.8-18.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835747" version="1" comment="net-snmp-perl is &lt;5.8-18.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835748" version="1" comment="net-snmp-utils is &lt;5.8-18.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835749" version="1" comment="gnutls is &lt;3.6.14-7.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835750" version="1" comment="gnutls-c++ is &lt;3.6.14-7.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835751" version="1" comment="gnutls-dane is &lt;3.6.14-7.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835752" version="1" comment="gnutls-devel is &lt;3.6.14-7.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835753" version="1" comment="gnutls-utils is &lt;3.6.14-7.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835754" version="1" comment="pacemaker is &lt;2.0.4-6.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835755" version="1" comment="pacemaker-cli is &lt;2.0.4-6.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835756" version="1" comment="pacemaker-cluster-libs is &lt;2.0.4-6.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835757" version="1" comment="pacemaker-cts is &lt;2.0.4-6.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835758" version="1" comment="pacemaker-doc is &lt;2.0.4-6.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835759" version="1" comment="pacemaker-libs is &lt;2.0.4-6.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835760" version="1" comment="pacemaker-libs-devel is &lt;2.0.4-6.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835761" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;2.0.4-6.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835762" version="1" comment="pacemaker-remote is &lt;2.0.4-6.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835763" version="1" comment="pacemaker-schemas is &lt;2.0.4-6.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835764" version="1" comment="delve is &lt;1.4.1-1.module+el8.3.0+7840+63dfb1ed for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835765" version="1" comment="go-toolset is &lt;1.14.12-1.module+el8.3.0+8784+380394dc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835766" version="1" comment="golang is &lt;1.14.12-1.module+el8.3.0+8784+380394dc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835767" version="1" comment="golang-bin is &lt;1.14.12-1.module+el8.3.0+8784+380394dc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835768" version="1" comment="golang-docs is &lt;1.14.12-1.module+el8.3.0+8784+380394dc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835769" version="1" comment="golang-misc is &lt;1.14.12-1.module+el8.3.0+8784+380394dc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835770" version="1" comment="golang-race is &lt;1.14.12-1.module+el8.3.0+8784+380394dc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835771" version="1" comment="golang-src is &lt;1.14.12-1.module+el8.3.0+8784+380394dc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835772" version="1" comment="golang-tests is &lt;1.14.12-1.module+el8.3.0+8784+380394dc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835773" version="1" comment="nginx is &lt;1.16.1-1.module+el8.3.0+8844+e5e7039f.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835774" version="1" comment="nginx-all-modules is &lt;1.16.1-1.module+el8.3.0+8844+e5e7039f.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835775" version="1" comment="nginx-filesystem is &lt;1.16.1-1.module+el8.3.0+8844+e5e7039f.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835776" version="1" comment="nginx-mod-http-image-filter is &lt;1.16.1-1.module+el8.3.0+8844+e5e7039f.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835777" version="1" comment="nginx-mod-http-perl is &lt;1.16.1-1.module+el8.3.0+8844+e5e7039f.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835778" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.16.1-1.module+el8.3.0+8844+e5e7039f.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835779" version="1" comment="nginx-mod-mail is &lt;1.16.1-1.module+el8.3.0+8844+e5e7039f.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835780" version="1" comment="nginx-mod-stream is &lt;1.16.1-1.module+el8.3.0+8844+e5e7039f.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835781" version="1" comment="nodejs is &lt;12.19.1-1.module+el8.3.0+8851+b7b41ca0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835782" version="1" comment="nodejs-devel is &lt;12.19.1-1.module+el8.3.0+8851+b7b41ca0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835783" version="1" comment="nodejs-docs is &lt;12.19.1-1.module+el8.3.0+8851+b7b41ca0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835784" version="1" comment="nodejs-full-i18n is &lt;12.19.1-1.module+el8.3.0+8851+b7b41ca0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835786" version="1" comment="npm is &lt;6.14.8-1.12.19.1.1.module+el8.3.0+8851+b7b41ca0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835787" version="1" comment="galera is &lt;25.3.31-1.module+el8.3.0+8843+3f4e42f6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835788" version="1" comment="mariadb is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835789" version="1" comment="mariadb-backup is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835790" version="1" comment="mariadb-common is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835791" version="1" comment="mariadb-devel is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835792" version="1" comment="mariadb-embedded is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835793" version="1" comment="mariadb-embedded-devel is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835794" version="1" comment="mariadb-errmsg is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835795" version="1" comment="mariadb-gssapi-server is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835796" version="1" comment="mariadb-oqgraph-engine is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835797" version="1" comment="mariadb-server is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835798" version="1" comment="mariadb-server-galera is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835799" version="1" comment="mariadb-server-utils is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835800" version="1" comment="mariadb-test is &lt;10.3.27-3.module+el8.3.0+8972+5e3224e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835801" version="1" comment="mariadb-connector-c is &lt;3.1.11-2.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835802" version="1" comment="mariadb-connector-c-config is &lt;3.1.11-2.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835803" version="1" comment="mariadb-connector-c-devel is &lt;3.1.11-2.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835804" version="1" comment="firefox is &lt;78.6.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835805" version="1" comment="postgresql is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835806" version="1" comment="postgresql-contrib is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835807" version="1" comment="postgresql-docs is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835808" version="1" comment="postgresql-plperl is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835809" version="1" comment="postgresql-plpython3 is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835810" version="1" comment="postgresql-pltcl is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835811" version="1" comment="postgresql-server is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835812" version="1" comment="postgresql-server-devel is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835813" version="1" comment="postgresql-static is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835814" version="1" comment="postgresql-test is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835815" version="1" comment="postgresql-test-rpm-macros is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835816" version="1" comment="postgresql-upgrade is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835817" version="1" comment="postgresql-upgrade-devel is &lt;10.15-1.module+el8.3.0+8944+1ca16b1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835818" version="1" comment="fapolicyd is &lt;1.0-3.el8_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835819" version="1" comment="fapolicyd-selinux is &lt;1.0-3.el8_3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835820" version="1" comment="postgresql is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835821" version="1" comment="postgresql-contrib is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835822" version="1" comment="postgresql-docs is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835823" version="1" comment="postgresql-plperl is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835824" version="1" comment="postgresql-plpython3 is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835825" version="1" comment="postgresql-pltcl is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835826" version="1" comment="postgresql-server is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835827" version="1" comment="postgresql-server-devel is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835828" version="1" comment="postgresql-static is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835829" version="1" comment="postgresql-test is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835830" version="1" comment="postgresql-test-rpm-macros is &lt;9.6.20-1.module+el8.3.0+8938+7f0e88b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835831" version="1" comment="pgaudit is &lt;1.4.0-4.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835832" version="1" comment="postgres-decoderbufs is &lt;0.10.0-2.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835833" version="1" comment="postgresql is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835834" version="1" comment="postgresql-contrib is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835835" version="1" comment="postgresql-docs is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835836" version="1" comment="postgresql-plperl is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835837" version="1" comment="postgresql-plpython3 is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835838" version="1" comment="postgresql-pltcl is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835839" version="1" comment="postgresql-server is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835840" version="1" comment="postgresql-server-devel is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835841" version="1" comment="postgresql-static is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835842" version="1" comment="postgresql-test is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835843" version="1" comment="postgresql-test-rpm-macros is &lt;12.5-1.module+el8.3.0+9042+664538f4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835844" version="1" comment="postgresql-upgrade is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835845" version="1" comment="postgresql-upgrade-devel is &lt;12.5-1.module+el8.3.0+9042+664538f4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835846" version="1" comment="thunderbird is &lt;78.6.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835847" version="1" comment="bpftool is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835848" version="1" comment="kernel is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835849" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-240.10.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835850" version="1" comment="kernel-core is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835851" version="1" comment="kernel-cross-headers is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835852" version="1" comment="kernel-debug is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835853" version="1" comment="kernel-debug-core is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835855" version="1" comment="kernel-debug-modules is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835856" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835858" version="1" comment="kernel-doc is &lt;4.18.0-240.10.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835859" version="1" comment="kernel-headers is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835860" version="1" comment="kernel-modules is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835861" version="1" comment="kernel-modules-extra is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835862" version="1" comment="kernel-tools is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835863" version="1" comment="kernel-tools-libs is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835865" version="1" comment="perf is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835866" version="1" comment="python3-perf is &lt;4.18.0-240.10.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835867" version="1" comment="firefox is &lt;78.6.1-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835868" version="1" comment="thunderbird is &lt;78.6.1-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835869" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.2-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835870" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.2-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835871" version="1" comment="dotnet is &lt;5.0.102-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835872" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.2-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835873" version="1" comment="dotnet-host is &lt;5.0.2-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835874" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.2-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835875" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.2-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835876" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.102-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835877" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.2-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835878" version="1" comment="dotnet-templates-5.0 is &lt;5.0.102-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835879" version="1" comment="netstandard-targeting-pack-2.1 is &lt;5.0.102-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835880" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.11-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835881" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.11-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835882" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.11-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835883" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.11-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835884" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.11-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835885" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.111-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835886" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.11-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835887" version="1" comment="dotnet-templates-3.1 is &lt;3.1.111-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835888" version="1" comment="dnsmasq is &lt;2.79-13.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835889" version="1" comment="dnsmasq-utils is &lt;2.79-13.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835890" version="1" comment="sudo is &lt;1.8.29-6.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835891" version="1" comment="firefox is &lt;78.7.0-2.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835892" version="1" comment="thunderbird is &lt;78.7.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835893" version="1" comment="flatpak is &lt;1.6.2-5.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835894" version="1" comment="flatpak-libs is &lt;1.6.2-5.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835895" version="1" comment="flatpak-selinux is &lt;1.6.2-5.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835896" version="1" comment="flatpak-session-helper is &lt;1.6.2-5.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835897" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.12-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835898" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.12-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835899" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.12-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835900" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.12-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835901" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.12-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835902" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.112-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835903" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.12-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835904" version="1" comment="dotnet-templates-3.1 is &lt;3.1.112-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835905" version="1" comment="dotnet-host-fxr-2.1 is &lt;2.1.25-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835906" version="1" comment="dotnet-runtime-2.1 is &lt;2.1.25-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835907" version="1" comment="dotnet-sdk-2.1 is &lt;2.1.521-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835908" version="1" comment="dotnet-sdk-2.1.5xx is &lt;2.1.521-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835909" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.3-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835910" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.3-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835911" version="1" comment="dotnet is &lt;5.0.103-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835912" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.3-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835913" version="1" comment="dotnet-host is &lt;5.0.3-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835914" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.3-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835915" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.3-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835916" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.103-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835917" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.3-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835918" version="1" comment="dotnet-templates-5.0 is &lt;5.0.103-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835919" version="1" comment="netstandard-targeting-pack-2.1 is &lt;5.0.103-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835920" version="1" comment="mod_dav_svn is &lt;1.10.2-4.module+el8.3.0+9886+ac338b6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835921" version="1" comment="subversion is &lt;1.10.2-4.module+el8.3.0+9886+ac338b6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835922" version="1" comment="subversion-devel is &lt;1.10.2-4.module+el8.3.0+9886+ac338b6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835923" version="1" comment="subversion-gnome is &lt;1.10.2-4.module+el8.3.0+9886+ac338b6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835924" version="1" comment="subversion-javahl is &lt;1.10.2-4.module+el8.3.0+9886+ac338b6d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835925" version="1" comment="subversion-libs is &lt;1.10.2-4.module+el8.3.0+9886+ac338b6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835926" version="1" comment="subversion-perl is &lt;1.10.2-4.module+el8.3.0+9886+ac338b6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835927" version="1" comment="subversion-tools is &lt;1.10.2-4.module+el8.3.0+9886+ac338b6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835928" version="1" comment="buildah is &lt;1.16.7-4.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835929" version="1" comment="buildah-tests is &lt;1.16.7-4.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835930" version="1" comment="cockpit-podman is &lt;27.1-3.module+el8.3.1+9857+68fb1526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835931" version="1" comment="conmon is &lt;2.0.22-3.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835932" version="1" comment="container-selinux is &lt;2.155.0-1.module+el8.3.1+9857+68fb1526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835933" version="1" comment="containernetworking-plugins is &lt;0.9.0-1.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835934" version="1" comment="containers-common is &lt;1.2.0-9.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835935" version="1" comment="crit is &lt;3.15-1.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835936" version="1" comment="criu is &lt;3.15-1.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835937" version="1" comment="crun is &lt;0.16-2.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835938" version="1" comment="fuse-overlayfs is &lt;1.3.0-2.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835939" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.3.1+9803+64eb0fd6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835940" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.3.1+9803+64eb0fd6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835941" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-1.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835942" version="1" comment="podman is &lt;2.2.1-7.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835943" version="1" comment="podman-catatonit is &lt;2.2.1-7.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835944" version="1" comment="podman-docker is &lt;2.2.1-7.module+el8.3.1+9857+68fb1526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835945" version="1" comment="podman-plugins is &lt;2.2.1-7.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835946" version="1" comment="podman-remote is &lt;2.2.1-7.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835947" version="1" comment="podman-tests is &lt;2.2.1-7.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835948" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.3.1+9857+68fb1526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835949" version="1" comment="python3-criu is &lt;3.15-1.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835950" version="1" comment="runc is &lt;1.0.0-70.rc92.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835951" version="1" comment="skopeo is &lt;1.2.0-9.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835952" version="1" comment="skopeo-tests is &lt;1.2.0-9.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835953" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.3.1+9857+68fb1526 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835954" version="1" comment="toolbox is &lt;0.0.8-1.module+el8.3.1+9857+68fb1526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835955" version="1" comment="udica is &lt;0.2.4-1.module+el8.3.1+9857+68fb1526 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835956" version="1" comment="nss is &lt;3.53.1-17.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835957" version="1" comment="nss-devel is &lt;3.53.1-17.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835958" version="1" comment="nss-softokn is &lt;3.53.1-17.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835959" version="1" comment="nss-softokn-devel is &lt;3.53.1-17.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835960" version="1" comment="nss-softokn-freebl is &lt;3.53.1-17.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835961" version="1" comment="nss-softokn-freebl-devel is &lt;3.53.1-17.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835962" version="1" comment="nss-sysinit is &lt;3.53.1-17.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835963" version="1" comment="nss-tools is &lt;3.53.1-17.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835964" version="1" comment="nss-util is &lt;3.53.1-17.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835965" version="1" comment="nss-util-devel is &lt;3.53.1-17.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835966" version="1" comment="nodejs is &lt;10.23.1-1.module+el8.3.0+9502+012d8a97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835967" version="1" comment="nodejs-devel is &lt;10.23.1-1.module+el8.3.0+9502+012d8a97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835968" version="1" comment="nodejs-docs is &lt;10.23.1-1.module+el8.3.0+9502+012d8a97 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835969" version="1" comment="nodejs-full-i18n is &lt;10.23.1-1.module+el8.3.0+9502+012d8a97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835970" version="1" comment="npm is &lt;6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835971" version="1" comment="nodejs is &lt;12.20.1-1.module+el8.3.0+9503+19cb079c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835972" version="1" comment="nodejs-devel is &lt;12.20.1-1.module+el8.3.0+9503+19cb079c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835973" version="1" comment="nodejs-docs is &lt;12.20.1-1.module+el8.3.0+9503+19cb079c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835974" version="1" comment="nodejs-full-i18n is &lt;12.20.1-1.module+el8.3.0+9503+19cb079c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835975" version="1" comment="nodejs-nodemon is &lt;2.0.3-1.module+el8.3.0+9715+1718613f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835976" version="1" comment="npm is &lt;6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835977" version="1" comment="nodejs is &lt;14.15.4-2.module+el8.3.0+9635+ffdf8381 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835978" version="1" comment="nodejs-devel is &lt;14.15.4-2.module+el8.3.0+9635+ffdf8381 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835979" version="1" comment="nodejs-docs is &lt;14.15.4-2.module+el8.3.0+9635+ffdf8381 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835980" version="1" comment="nodejs-full-i18n is &lt;14.15.4-2.module+el8.3.0+9635+ffdf8381 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835981" version="1" comment="nodejs-nodemon is &lt;2.0.3-1.module+el8.3.0+6519+9f98ed83 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835982" version="1" comment="nodejs-packaging is &lt;23-3.module+el8.3.0+6519+9f98ed83 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835983" version="1" comment="npm is &lt;6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835984" version="1" comment="perl is &lt;5.26.3-417.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835985" version="1" comment="perl-Attribute-Handlers is &lt;0.99-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835986" version="1" comment="perl-Devel-Peek is &lt;1.26-417.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835987" version="1" comment="perl-Devel-SelfStubber is &lt;1.06-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835988" version="1" comment="perl-Errno is &lt;1.28-417.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835989" version="1" comment="perl-ExtUtils-Embed is &lt;1.34-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835990" version="1" comment="perl-ExtUtils-Miniperl is &lt;1.06-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835991" version="1" comment="perl-IO is &lt;1.38-417.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835992" version="1" comment="perl-IO-Zlib is &lt;1.10-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835993" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835994" version="1" comment="perl-Math-Complex is &lt;1.59-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835995" version="1" comment="perl-Memoize is &lt;1.03-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835996" version="1" comment="perl-Module-Loaded is &lt;0.08-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835997" version="1" comment="perl-Net-Ping is &lt;2.55-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835998" version="1" comment="perl-Pod-Html is &lt;1.22.02-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009835999" version="1" comment="perl-SelfLoader is &lt;1.23-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836000" version="1" comment="perl-Test is &lt;1.30-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836001" version="1" comment="perl-Time-Piece is &lt;1.31-417.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836002" version="1" comment="perl-devel is &lt;5.26.3-417.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836003" version="1" comment="perl-interpreter is &lt;5.26.3-417.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836004" version="1" comment="perl-libnetcfg is &lt;5.26.3-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836005" version="1" comment="perl-libs is &lt;5.26.3-417.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836006" version="1" comment="perl-macros is &lt;5.26.3-417.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836007" version="1" comment="perl-open is &lt;1.11-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836008" version="1" comment="perl-tests is &lt;5.26.3-417.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836009" version="1" comment="perl-utils is &lt;5.26.3-417.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836010" version="1" comment="bpftool is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836011" version="1" comment="kernel is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836012" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-240.15.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836013" version="1" comment="kernel-core is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836014" version="1" comment="kernel-cross-headers is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836015" version="1" comment="kernel-debug is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836016" version="1" comment="kernel-debug-core is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836018" version="1" comment="kernel-debug-modules is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836019" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836021" version="1" comment="kernel-doc is &lt;4.18.0-240.15.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836022" version="1" comment="kernel-headers is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836023" version="1" comment="kernel-modules is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836024" version="1" comment="kernel-modules-extra is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836025" version="1" comment="kernel-tools is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836026" version="1" comment="kernel-tools-libs is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836028" version="1" comment="perf is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836029" version="1" comment="python3-perf is &lt;4.18.0-240.15.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836030" version="1" comment="xterm is &lt;331-1.el8_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836031" version="1" comment="xterm-resize is &lt;331-1.el8_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836032" version="1" comment="stunnel is &lt;5.56-5.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836033" version="1" comment="firefox is &lt;78.8.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836034" version="1" comment="thunderbird is &lt;78.8.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836035" version="1" comment="bind is &lt;9.11.20-5.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836036" version="1" comment="bind-chroot is &lt;9.11.20-5.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836037" version="1" comment="bind-devel is &lt;9.11.20-5.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836038" version="1" comment="bind-export-devel is &lt;9.11.20-5.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836039" version="1" comment="bind-export-libs is &lt;9.11.20-5.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836040" version="1" comment="bind-libs is &lt;9.11.20-5.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836041" version="1" comment="bind-libs-lite is &lt;9.11.20-5.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836042" version="1" comment="bind-license is &lt;9.11.20-5.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836043" version="1" comment="bind-lite-devel is &lt;9.11.20-5.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836044" version="1" comment="bind-pkcs11 is &lt;9.11.20-5.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836045" version="1" comment="bind-pkcs11-devel is &lt;9.11.20-5.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836046" version="1" comment="bind-pkcs11-libs is &lt;9.11.20-5.el8_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836047" version="1" comment="bind-pkcs11-utils is &lt;9.11.20-5.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836048" version="1" comment="bind-sdb is &lt;9.11.20-5.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836049" version="1" comment="bind-sdb-chroot is &lt;9.11.20-5.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836050" version="1" comment="bind-utils is &lt;9.11.20-5.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836051" version="1" comment="python3-bind is &lt;9.11.20-5.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836052" version="1" comment="grub2-common is &lt;2.02-90.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836053" version="1" comment="grub2-efi-ia32 is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836054" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836055" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-90.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836056" version="1" comment="grub2-efi-x64 is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836057" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836058" version="1" comment="grub2-efi-x64-modules is &lt;2.02-90.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836059" version="1" comment="grub2-pc is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836060" version="1" comment="grub2-pc-modules is &lt;2.02-90.el8_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836061" version="1" comment="grub2-tools is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836062" version="1" comment="grub2-tools-efi is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836063" version="1" comment="grub2-tools-extra is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836064" version="1" comment="grub2-tools-minimal is &lt;2.02-90.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836065" version="1" comment="buildah is &lt;1.5-8.gite94b4f9.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836066" version="1" comment="container-selinux is &lt;2.124.0-1.gitf958d0c.module+el8.3.0+10171+12421f43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836067" version="1" comment="containernetworking-plugins is &lt;0.7.4-4.git9ebe139.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836068" version="1" comment="containers-common is &lt;0.1.32-6.git1715c90.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836069" version="1" comment="crit is &lt;3.12-9.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836070" version="1" comment="criu is &lt;3.12-9.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836071" version="1" comment="fuse-overlayfs is &lt;0.3-5.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836072" version="1" comment="oci-systemd-hook is &lt;0.1.15-2.git2d0b8a3.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836073" version="1" comment="oci-umount is &lt;2.3.4-2.git87f9237.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836074" version="1" comment="podman is &lt;1.0.0-8.git921f98f.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836075" version="1" comment="podman-docker is &lt;1.0.0-8.git921f98f.module+el8.3.0+10171+12421f43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836076" version="1" comment="python3-criu is &lt;3.12-9.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836077" version="1" comment="runc is &lt;1.0.0-56.rc5.dev.git2abd837.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836078" version="1" comment="skopeo is &lt;0.1.32-6.git1715c90.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836079" version="1" comment="slirp4netns is &lt;0.1-5.dev.gitc4e1bc5.module+el8.3.0+10171+12421f43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836080" version="1" comment="nodejs is &lt;12.21.0-1.module+el8.3.0+10191+34fb5a07 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836081" version="1" comment="nodejs-devel is &lt;12.21.0-1.module+el8.3.0+10191+34fb5a07 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836082" version="1" comment="nodejs-docs is &lt;12.21.0-1.module+el8.3.0+10191+34fb5a07 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836083" version="1" comment="nodejs-full-i18n is &lt;12.21.0-1.module+el8.3.0+10191+34fb5a07 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836084" version="1" comment="npm is &lt;6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836085" version="1" comment="nodejs is &lt;10.24.0-1.module+el8.3.0+10166+b07ac28e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836086" version="1" comment="nodejs-devel is &lt;10.24.0-1.module+el8.3.0+10166+b07ac28e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836087" version="1" comment="nodejs-docs is &lt;10.24.0-1.module+el8.3.0+10166+b07ac28e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836088" version="1" comment="nodejs-full-i18n is &lt;10.24.0-1.module+el8.3.0+10166+b07ac28e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836089" version="1" comment="npm is &lt;6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836090" version="1" comment="nodejs is &lt;14.16.0-2.module+el8.3.0+10180+b92e1eb6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836091" version="1" comment="nodejs-devel is &lt;14.16.0-2.module+el8.3.0+10180+b92e1eb6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836092" version="1" comment="nodejs-docs is &lt;14.16.0-2.module+el8.3.0+10180+b92e1eb6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836093" version="1" comment="nodejs-full-i18n is &lt;14.16.0-2.module+el8.3.0+10180+b92e1eb6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836094" version="1" comment="npm is &lt;6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836095" version="1" comment="dotnet-host-fxr-2.1 is &lt;2.1.26-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836096" version="1" comment="dotnet-runtime-2.1 is &lt;2.1.26-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836097" version="1" comment="dotnet-sdk-2.1 is &lt;2.1.522-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836098" version="1" comment="dotnet-sdk-2.1.5xx is &lt;2.1.522-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836099" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.13-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836100" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.13-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836101" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.13-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836102" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.13-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836103" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.13-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836104" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.113-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836105" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.13-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836106" version="1" comment="dotnet-templates-3.1 is &lt;3.1.113-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836107" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.4-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836108" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.4-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836109" version="1" comment="dotnet is &lt;5.0.104-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836110" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.4-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836111" version="1" comment="dotnet-host is &lt;5.0.4-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836112" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.4-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836113" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.4-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836114" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.104-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836115" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.4-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836116" version="1" comment="dotnet-templates-5.0 is &lt;5.0.104-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836117" version="1" comment="netstandard-targeting-pack-2.1 is &lt;5.0.104-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836118" version="1" comment="wpa_supplicant is &lt;2.9-2.el8_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836119" version="1" comment="jss is &lt;4.7.3-1.module+el8.3.0+8058+d5cd4219 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836120" version="1" comment="jss-javadoc is &lt;4.7.3-1.module+el8.3.0+8058+d5cd4219 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836121" version="1" comment="ldapjdk is &lt;4.22.0-1.module+el8.3.0+6784+6e1e4c62 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836122" version="1" comment="ldapjdk-javadoc is &lt;4.22.0-1.module+el8.3.0+6784+6e1e4c62 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836123" version="1" comment="pki-base is &lt;10.9.4-3.module+el8.3.0+10353+73f6df5b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836124" version="1" comment="pki-base-java is &lt;10.9.4-3.module+el8.3.0+10353+73f6df5b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836125" version="1" comment="pki-ca is &lt;10.9.4-3.module+el8.3.0+10353+73f6df5b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836126" version="1" comment="pki-kra is &lt;10.9.4-3.module+el8.3.0+10353+73f6df5b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836127" version="1" comment="pki-server is &lt;10.9.4-3.module+el8.3.0+10353+73f6df5b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836128" version="1" comment="pki-symkey is &lt;10.9.4-3.module+el8.3.0+10353+73f6df5b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836129" version="1" comment="pki-tools is &lt;10.9.4-3.module+el8.3.0+10353+73f6df5b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836130" version="1" comment="python3-pki is &lt;10.9.4-3.module+el8.3.0+10353+73f6df5b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836131" version="1" comment="tomcatjss is &lt;7.5.0-1.module+el8.3.0+7355+c59bcbd9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836132" version="1" comment="firefox is &lt;78.9.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836133" version="1" comment="thunderbird is &lt;78.9.0-3.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836134" version="1" comment="openssl is &lt;1.1.1g-15.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836135" version="1" comment="openssl-devel is &lt;1.1.1g-15.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836136" version="1" comment="openssl-libs is &lt;1.1.1g-15.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836137" version="1" comment="openssl-perl is &lt;1.1.1g-15.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836138" version="1" comment="flatpak is &lt;1.6.2-6.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836139" version="1" comment="flatpak-libs is &lt;1.6.2-6.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836140" version="1" comment="flatpak-selinux is &lt;1.6.2-6.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836141" version="1" comment="flatpak-session-helper is &lt;1.6.2-6.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836142" version="1" comment="389-ds-base is &lt;1.4.3.8-7.module+el8.3.0+10310+6e88d919 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836143" version="1" comment="389-ds-base-devel is &lt;1.4.3.8-7.module+el8.3.0+10310+6e88d919 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836144" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.8-7.module+el8.3.0+10310+6e88d919 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836145" version="1" comment="389-ds-base-libs is &lt;1.4.3.8-7.module+el8.3.0+10310+6e88d919 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836146" version="1" comment="389-ds-base-snmp is &lt;1.4.3.8-7.module+el8.3.0+10310+6e88d919 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836147" version="1" comment="python3-lib389 is &lt;1.4.3.8-7.module+el8.3.0+10310+6e88d919 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836148" version="1" comment="bpftool is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836149" version="1" comment="kernel is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836150" version="1" comment="kernel-abi-whitelists is &lt;4.18.0-240.22.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836151" version="1" comment="kernel-core is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836152" version="1" comment="kernel-cross-headers is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836153" version="1" comment="kernel-debug is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836154" version="1" comment="kernel-debug-core is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836156" version="1" comment="kernel-debug-modules is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836157" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836159" version="1" comment="kernel-doc is &lt;4.18.0-240.22.1.el8_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836160" version="1" comment="kernel-headers is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836161" version="1" comment="kernel-modules is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836162" version="1" comment="kernel-modules-extra is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836163" version="1" comment="kernel-tools is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836164" version="1" comment="kernel-tools-libs is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836166" version="1" comment="perf is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836167" version="1" comment="python3-perf is &lt;4.18.0-240.22.1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836168" version="1" comment="thunderbird is &lt;78.9.1-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836169" version="1" comment="ldb-tools is &lt;2.1.3-3.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836170" version="1" comment="libldb is &lt;2.1.3-3.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836171" version="1" comment="libldb-devel is &lt;2.1.3-3.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836172" version="1" comment="python3-ldb is &lt;2.1.3-3.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836173" version="1" comment="gnutls is &lt;3.6.14-8.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836174" version="1" comment="gnutls-c++ is &lt;3.6.14-8.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836175" version="1" comment="gnutls-dane is &lt;3.6.14-8.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836176" version="1" comment="gnutls-devel is &lt;3.6.14-8.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836177" version="1" comment="gnutls-utils is &lt;3.6.14-8.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836178" version="1" comment="nettle is &lt;3.4.1-4.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836179" version="1" comment="nettle-devel is &lt;3.4.1-4.el8_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836180" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.292.b10-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836181" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.292.b10-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836182" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.292.b10-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836183" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.292.b10-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836184" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.292.b10-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836185" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.292.b10-0.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836186" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.292.b10-0.el8_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836187" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.292.b10-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836188" version="1" comment="java-11-openjdk is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836189" version="1" comment="java-11-openjdk-demo is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836190" version="1" comment="java-11-openjdk-devel is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836191" version="1" comment="java-11-openjdk-headless is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836192" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836193" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836194" version="1" comment="java-11-openjdk-jmods is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836195" version="1" comment="java-11-openjdk-src is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836196" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.11.0.9-0.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836197" version="1" comment="thunderbird is &lt;78.10.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836198" version="1" comment="firefox is &lt;78.10.0-1.el8_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836199" version="1" comment="NetworkManager is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836200" version="1" comment="NetworkManager-adsl is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836201" version="1" comment="NetworkManager-bluetooth is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836202" version="1" comment="NetworkManager-cloud-setup is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836203" version="1" comment="NetworkManager-config-connectivity-suse is &lt;1.30.0-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836204" version="1" comment="NetworkManager-config-server is &lt;1.30.0-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836205" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.30.0-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836206" version="1" comment="NetworkManager-libnm is &lt;1.30.0-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836207" version="1" comment="NetworkManager-libnm-devel is &lt;1.30.0-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836208" version="1" comment="NetworkManager-ovs is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836209" version="1" comment="NetworkManager-ppp is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836210" version="1" comment="NetworkManager-team is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836211" version="1" comment="NetworkManager-tui is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836212" version="1" comment="NetworkManager-wifi is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836213" version="1" comment="NetworkManager-wwan is &lt;1.30.0-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836214" version="1" comment="libnma is &lt;1.8.30-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836215" version="1" comment="libnma-devel is &lt;1.8.30-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836216" version="1" comment="bpftool is &lt;4.18.0-305.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836217" version="1" comment="kernel is &lt;4.18.0-305.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836218" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-305.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836219" version="1" comment="kernel-core is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836220" version="1" comment="kernel-cross-headers is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836221" version="1" comment="kernel-debug is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836222" version="1" comment="kernel-debug-core is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836224" version="1" comment="kernel-debug-modules is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836225" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836227" version="1" comment="kernel-doc is &lt;4.18.0-305.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836228" version="1" comment="kernel-headers is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836229" version="1" comment="kernel-modules is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836230" version="1" comment="kernel-modules-extra is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836231" version="1" comment="kernel-tools is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836232" version="1" comment="kernel-tools-libs is &lt;4.18.0-305.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836234" version="1" comment="perf is &lt;4.18.0-305.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836235" version="1" comment="python3-perf is &lt;4.18.0-305.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836236" version="1" comment="lemon is &lt;3.26.0-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836237" version="1" comment="sqlite is &lt;3.26.0-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836238" version="1" comment="sqlite-devel is &lt;3.26.0-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836239" version="1" comment="sqlite-doc is &lt;3.26.0-13.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836240" version="1" comment="sqlite-libs is &lt;3.26.0-13.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836241" version="1" comment="cpio is &lt;2.12-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836242" version="1" comment="compat-libpthread-nonshared is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836243" version="1" comment="glibc is &lt;2.28-151.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836244" version="1" comment="glibc-all-langpacks is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836245" version="1" comment="glibc-benchtests is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836246" version="1" comment="glibc-common is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836247" version="1" comment="glibc-devel is &lt;2.28-151.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836248" version="1" comment="glibc-headers is &lt;2.28-151.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836249" version="1" comment="glibc-langpack-aa is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836250" version="1" comment="glibc-langpack-af is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836251" version="1" comment="glibc-langpack-agr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836252" version="1" comment="glibc-langpack-ak is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836253" version="1" comment="glibc-langpack-am is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836254" version="1" comment="glibc-langpack-an is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836255" version="1" comment="glibc-langpack-anp is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836256" version="1" comment="glibc-langpack-ar is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836257" version="1" comment="glibc-langpack-as is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836258" version="1" comment="glibc-langpack-ast is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836259" version="1" comment="glibc-langpack-ayc is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836260" version="1" comment="glibc-langpack-az is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836261" version="1" comment="glibc-langpack-be is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836262" version="1" comment="glibc-langpack-bem is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836263" version="1" comment="glibc-langpack-ber is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836264" version="1" comment="glibc-langpack-bg is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836265" version="1" comment="glibc-langpack-bhb is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836266" version="1" comment="glibc-langpack-bho is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836267" version="1" comment="glibc-langpack-bi is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836268" version="1" comment="glibc-langpack-bn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836269" version="1" comment="glibc-langpack-bo is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836270" version="1" comment="glibc-langpack-br is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836271" version="1" comment="glibc-langpack-brx is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836272" version="1" comment="glibc-langpack-bs is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836273" version="1" comment="glibc-langpack-byn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836274" version="1" comment="glibc-langpack-ca is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836275" version="1" comment="glibc-langpack-ce is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836276" version="1" comment="glibc-langpack-chr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836277" version="1" comment="glibc-langpack-cmn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836278" version="1" comment="glibc-langpack-crh is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836279" version="1" comment="glibc-langpack-cs is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836280" version="1" comment="glibc-langpack-csb is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836281" version="1" comment="glibc-langpack-cv is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836282" version="1" comment="glibc-langpack-cy is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836283" version="1" comment="glibc-langpack-da is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836284" version="1" comment="glibc-langpack-de is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836285" version="1" comment="glibc-langpack-doi is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836286" version="1" comment="glibc-langpack-dsb is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836287" version="1" comment="glibc-langpack-dv is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836288" version="1" comment="glibc-langpack-dz is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836289" version="1" comment="glibc-langpack-el is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836290" version="1" comment="glibc-langpack-en is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836291" version="1" comment="glibc-langpack-eo is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836292" version="1" comment="glibc-langpack-es is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836293" version="1" comment="glibc-langpack-et is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836294" version="1" comment="glibc-langpack-eu is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836295" version="1" comment="glibc-langpack-fa is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836296" version="1" comment="glibc-langpack-ff is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836297" version="1" comment="glibc-langpack-fi is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836298" version="1" comment="glibc-langpack-fil is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836299" version="1" comment="glibc-langpack-fo is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836300" version="1" comment="glibc-langpack-fr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836301" version="1" comment="glibc-langpack-fur is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836302" version="1" comment="glibc-langpack-fy is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836303" version="1" comment="glibc-langpack-ga is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836304" version="1" comment="glibc-langpack-gd is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836305" version="1" comment="glibc-langpack-gez is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836306" version="1" comment="glibc-langpack-gl is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836307" version="1" comment="glibc-langpack-gu is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836308" version="1" comment="glibc-langpack-gv is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836309" version="1" comment="glibc-langpack-ha is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836310" version="1" comment="glibc-langpack-hak is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836311" version="1" comment="glibc-langpack-he is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836312" version="1" comment="glibc-langpack-hi is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836313" version="1" comment="glibc-langpack-hif is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836314" version="1" comment="glibc-langpack-hne is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836315" version="1" comment="glibc-langpack-hr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836316" version="1" comment="glibc-langpack-hsb is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836317" version="1" comment="glibc-langpack-ht is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836318" version="1" comment="glibc-langpack-hu is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836319" version="1" comment="glibc-langpack-hy is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836320" version="1" comment="glibc-langpack-ia is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836321" version="1" comment="glibc-langpack-id is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836322" version="1" comment="glibc-langpack-ig is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836323" version="1" comment="glibc-langpack-ik is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836324" version="1" comment="glibc-langpack-is is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836325" version="1" comment="glibc-langpack-it is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836326" version="1" comment="glibc-langpack-iu is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836327" version="1" comment="glibc-langpack-ja is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836328" version="1" comment="glibc-langpack-ka is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836329" version="1" comment="glibc-langpack-kab is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836330" version="1" comment="glibc-langpack-kk is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836331" version="1" comment="glibc-langpack-kl is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836332" version="1" comment="glibc-langpack-km is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836333" version="1" comment="glibc-langpack-kn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836334" version="1" comment="glibc-langpack-ko is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836335" version="1" comment="glibc-langpack-kok is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836336" version="1" comment="glibc-langpack-ks is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836337" version="1" comment="glibc-langpack-ku is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836338" version="1" comment="glibc-langpack-kw is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836339" version="1" comment="glibc-langpack-ky is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836340" version="1" comment="glibc-langpack-lb is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836341" version="1" comment="glibc-langpack-lg is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836342" version="1" comment="glibc-langpack-li is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836343" version="1" comment="glibc-langpack-lij is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836344" version="1" comment="glibc-langpack-ln is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836345" version="1" comment="glibc-langpack-lo is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836346" version="1" comment="glibc-langpack-lt is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836347" version="1" comment="glibc-langpack-lv is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836348" version="1" comment="glibc-langpack-lzh is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836349" version="1" comment="glibc-langpack-mag is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836350" version="1" comment="glibc-langpack-mai is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836351" version="1" comment="glibc-langpack-mfe is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836352" version="1" comment="glibc-langpack-mg is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836353" version="1" comment="glibc-langpack-mhr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836354" version="1" comment="glibc-langpack-mi is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836355" version="1" comment="glibc-langpack-miq is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836356" version="1" comment="glibc-langpack-mjw is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836357" version="1" comment="glibc-langpack-mk is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836358" version="1" comment="glibc-langpack-ml is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836359" version="1" comment="glibc-langpack-mn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836360" version="1" comment="glibc-langpack-mni is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836361" version="1" comment="glibc-langpack-mr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836362" version="1" comment="glibc-langpack-ms is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836363" version="1" comment="glibc-langpack-mt is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836364" version="1" comment="glibc-langpack-my is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836365" version="1" comment="glibc-langpack-nan is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836366" version="1" comment="glibc-langpack-nb is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836367" version="1" comment="glibc-langpack-nds is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836368" version="1" comment="glibc-langpack-ne is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836369" version="1" comment="glibc-langpack-nhn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836370" version="1" comment="glibc-langpack-niu is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836371" version="1" comment="glibc-langpack-nl is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836372" version="1" comment="glibc-langpack-nn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836373" version="1" comment="glibc-langpack-nr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836374" version="1" comment="glibc-langpack-nso is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836375" version="1" comment="glibc-langpack-oc is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836376" version="1" comment="glibc-langpack-om is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836377" version="1" comment="glibc-langpack-or is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836378" version="1" comment="glibc-langpack-os is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836379" version="1" comment="glibc-langpack-pa is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836380" version="1" comment="glibc-langpack-pap is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836381" version="1" comment="glibc-langpack-pl is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836382" version="1" comment="glibc-langpack-ps is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836383" version="1" comment="glibc-langpack-pt is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836384" version="1" comment="glibc-langpack-quz is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836385" version="1" comment="glibc-langpack-raj is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836386" version="1" comment="glibc-langpack-ro is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836387" version="1" comment="glibc-langpack-ru is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836388" version="1" comment="glibc-langpack-rw is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836389" version="1" comment="glibc-langpack-sa is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836390" version="1" comment="glibc-langpack-sah is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836391" version="1" comment="glibc-langpack-sat is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836392" version="1" comment="glibc-langpack-sc is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836393" version="1" comment="glibc-langpack-sd is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836394" version="1" comment="glibc-langpack-se is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836395" version="1" comment="glibc-langpack-sgs is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836396" version="1" comment="glibc-langpack-shn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836397" version="1" comment="glibc-langpack-shs is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836398" version="1" comment="glibc-langpack-si is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836399" version="1" comment="glibc-langpack-sid is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836400" version="1" comment="glibc-langpack-sk is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836401" version="1" comment="glibc-langpack-sl is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836402" version="1" comment="glibc-langpack-sm is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836403" version="1" comment="glibc-langpack-so is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836404" version="1" comment="glibc-langpack-sq is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836405" version="1" comment="glibc-langpack-sr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836406" version="1" comment="glibc-langpack-ss is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836407" version="1" comment="glibc-langpack-st is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836408" version="1" comment="glibc-langpack-sv is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836409" version="1" comment="glibc-langpack-sw is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836410" version="1" comment="glibc-langpack-szl is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836411" version="1" comment="glibc-langpack-ta is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836412" version="1" comment="glibc-langpack-tcy is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836413" version="1" comment="glibc-langpack-te is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836414" version="1" comment="glibc-langpack-tg is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836415" version="1" comment="glibc-langpack-th is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836416" version="1" comment="glibc-langpack-the is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836417" version="1" comment="glibc-langpack-ti is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836418" version="1" comment="glibc-langpack-tig is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836419" version="1" comment="glibc-langpack-tk is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836420" version="1" comment="glibc-langpack-tl is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836421" version="1" comment="glibc-langpack-tn is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836422" version="1" comment="glibc-langpack-to is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836423" version="1" comment="glibc-langpack-tpi is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836424" version="1" comment="glibc-langpack-tr is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836425" version="1" comment="glibc-langpack-ts is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836426" version="1" comment="glibc-langpack-tt is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836427" version="1" comment="glibc-langpack-ug is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836428" version="1" comment="glibc-langpack-uk is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836429" version="1" comment="glibc-langpack-unm is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836430" version="1" comment="glibc-langpack-ur is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836431" version="1" comment="glibc-langpack-uz is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836432" version="1" comment="glibc-langpack-ve is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836433" version="1" comment="glibc-langpack-vi is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836434" version="1" comment="glibc-langpack-wa is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836435" version="1" comment="glibc-langpack-wae is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836436" version="1" comment="glibc-langpack-wal is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836437" version="1" comment="glibc-langpack-wo is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836438" version="1" comment="glibc-langpack-xh is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836439" version="1" comment="glibc-langpack-yi is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836440" version="1" comment="glibc-langpack-yo is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836441" version="1" comment="glibc-langpack-yue is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836442" version="1" comment="glibc-langpack-yuw is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836443" version="1" comment="glibc-langpack-zh is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836444" version="1" comment="glibc-langpack-zu is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836445" version="1" comment="glibc-locale-source is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836446" version="1" comment="glibc-minimal-langpack is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836447" version="1" comment="glibc-nss-devel is &lt;2.28-151.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836448" version="1" comment="glibc-static is &lt;2.28-151.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836449" version="1" comment="glibc-utils is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836450" version="1" comment="libnsl is &lt;2.28-151.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836451" version="1" comment="nscd is &lt;2.28-151.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836452" version="1" comment="nss_db is &lt;2.28-151.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836453" version="1" comment="nss_hesiod is &lt;2.28-151.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836454" version="1" comment="OpenEXR-devel is &lt;2.2.0-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836455" version="1" comment="OpenEXR-libs is &lt;2.2.0-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836456" version="1" comment="accountsservice is &lt;0.6.55-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836457" version="1" comment="accountsservice-devel is &lt;0.6.55-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836458" version="1" comment="accountsservice-libs is &lt;0.6.55-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836459" version="1" comment="atkmm is &lt;2.24.2-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836460" version="1" comment="atkmm-devel is &lt;2.24.2-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836461" version="1" comment="atkmm-doc is &lt;2.24.2-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836462" version="1" comment="cairomm is &lt;1.12.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836463" version="1" comment="cairomm-devel is &lt;1.12.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836464" version="1" comment="cairomm-doc is &lt;1.12.0-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836465" version="1" comment="chrome-gnome-shell is &lt;10.1-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836466" version="1" comment="dleyna-core is &lt;0.6.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836467" version="1" comment="dleyna-server is &lt;0.6.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836468" version="1" comment="enchant2 is &lt;2.2.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836469" version="1" comment="enchant2-devel is &lt;2.2.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836470" version="1" comment="gamin is &lt;0.1.10-32.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836471" version="1" comment="gamin-devel is &lt;0.1.10-32.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836472" version="1" comment="gdm is &lt;3.28.3-39.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836473" version="1" comment="geoclue2 is &lt;2.5.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836474" version="1" comment="geoclue2-demos is &lt;2.5.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836475" version="1" comment="geoclue2-devel is &lt;2.5.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836476" version="1" comment="geoclue2-libs is &lt;2.5.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836477" version="1" comment="geocode-glib is &lt;3.26.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836478" version="1" comment="geocode-glib-devel is &lt;3.26.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836479" version="1" comment="gjs is &lt;1.56.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836480" version="1" comment="gjs-devel is &lt;1.56.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836481" version="1" comment="glib2 is &lt;2.56.4-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836482" version="1" comment="glib2-devel is &lt;2.56.4-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836483" version="1" comment="glib2-doc is &lt;2.56.4-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836484" version="1" comment="glib2-fam is &lt;2.56.4-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836485" version="1" comment="glib2-static is &lt;2.56.4-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836486" version="1" comment="glib2-tests is &lt;2.56.4-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836487" version="1" comment="glibmm24 is &lt;2.56.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836488" version="1" comment="glibmm24-devel is &lt;2.56.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836489" version="1" comment="glibmm24-doc is &lt;2.56.0-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836490" version="1" comment="gnome-boxes is &lt;3.36.5-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836491" version="1" comment="gnome-classic-session is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836492" version="1" comment="gnome-control-center is &lt;3.28.2-27.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836493" version="1" comment="gnome-control-center-filesystem is &lt;3.28.2-27.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836494" version="1" comment="gnome-online-accounts is &lt;3.28.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836495" version="1" comment="gnome-online-accounts-devel is &lt;3.28.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836496" version="1" comment="gnome-photos is &lt;3.28.1-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836497" version="1" comment="gnome-photos-tests is &lt;3.28.1-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836498" version="1" comment="gnome-settings-daemon is &lt;3.32.0-14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836499" version="1" comment="gnome-shell is &lt;3.32.2-30.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836500" version="1" comment="gnome-shell-extension-apps-menu is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836501" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836502" version="1" comment="gnome-shell-extension-common is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836503" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836504" version="1" comment="gnome-shell-extension-desktop-icons is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836505" version="1" comment="gnome-shell-extension-disable-screenshield is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836506" version="1" comment="gnome-shell-extension-drive-menu is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836507" version="1" comment="gnome-shell-extension-horizontal-workspaces is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836508" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836509" version="1" comment="gnome-shell-extension-native-window-placement is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836510" version="1" comment="gnome-shell-extension-no-hot-corner is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836511" version="1" comment="gnome-shell-extension-panel-favorites is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836512" version="1" comment="gnome-shell-extension-places-menu is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836513" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836514" version="1" comment="gnome-shell-extension-systemMonitor is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836515" version="1" comment="gnome-shell-extension-top-icons is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836516" version="1" comment="gnome-shell-extension-updates-dialog is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836517" version="1" comment="gnome-shell-extension-user-theme is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836518" version="1" comment="gnome-shell-extension-window-grouper is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836519" version="1" comment="gnome-shell-extension-window-list is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836520" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836521" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;3.32.1-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836522" version="1" comment="gnome-software is &lt;3.36.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836523" version="1" comment="gnome-terminal is &lt;3.28.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836524" version="1" comment="gnome-terminal-nautilus is &lt;3.28.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836525" version="1" comment="gtk-doc is &lt;1.28-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836526" version="1" comment="gtk2 is &lt;2.24.32-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836527" version="1" comment="gtk2-devel is &lt;2.24.32-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836528" version="1" comment="gtk2-devel-docs is &lt;2.24.32-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836529" version="1" comment="gtk2-immodule-xim is &lt;2.24.32-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836530" version="1" comment="gtk2-immodules is &lt;2.24.32-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836531" version="1" comment="gtkmm24 is &lt;2.24.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836532" version="1" comment="gtkmm24-devel is &lt;2.24.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836533" version="1" comment="gtkmm24-docs is &lt;2.24.5-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836534" version="1" comment="gtkmm30 is &lt;3.22.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836535" version="1" comment="gtkmm30-devel is &lt;3.22.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836536" version="1" comment="gtkmm30-doc is &lt;3.22.2-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836537" version="1" comment="gvfs is &lt;1.36.2-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836538" version="1" comment="gvfs-afc is &lt;1.36.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836539" version="1" comment="gvfs-afp is &lt;1.36.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836540" version="1" comment="gvfs-archive is &lt;1.36.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836541" version="1" comment="gvfs-client is &lt;1.36.2-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836542" version="1" comment="gvfs-devel is &lt;1.36.2-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836543" version="1" comment="gvfs-fuse is &lt;1.36.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836544" version="1" comment="gvfs-goa is &lt;1.36.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836545" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836546" version="1" comment="gvfs-mtp is &lt;1.36.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836547" version="1" comment="gvfs-smb is &lt;1.36.2-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836548" version="1" comment="libdazzle is &lt;3.28.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836549" version="1" comment="libdazzle-devel is &lt;3.28.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836550" version="1" comment="libepubgen is &lt;0.1.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836551" version="1" comment="libepubgen-devel is &lt;0.1.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836552" version="1" comment="libsass is &lt;3.4.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836553" version="1" comment="libsass-devel is &lt;3.4.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836554" version="1" comment="libsigc++20 is &lt;2.10.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836555" version="1" comment="libsigc++20-devel is &lt;2.10.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836556" version="1" comment="libsigc++20-doc is &lt;2.10.0-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836557" version="1" comment="libvisual is &lt;0.4.0-25.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836558" version="1" comment="libvisual-devel is &lt;0.4.0-25.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836559" version="1" comment="mutter is &lt;3.32.2-57.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836560" version="1" comment="mutter-devel is &lt;3.32.2-57.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836561" version="1" comment="nautilus is &lt;3.28.1-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836562" version="1" comment="nautilus-devel is &lt;3.28.1-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836563" version="1" comment="nautilus-extensions is &lt;3.28.1-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836564" version="1" comment="pangomm is &lt;2.40.1-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836565" version="1" comment="pangomm-devel is &lt;2.40.1-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836566" version="1" comment="pangomm-doc is &lt;2.40.1-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836567" version="1" comment="soundtouch is &lt;2.0.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836568" version="1" comment="soundtouch-devel is &lt;2.0.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836569" version="1" comment="vala is &lt;0.40.19-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836570" version="1" comment="vala-devel is &lt;0.40.19-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836571" version="1" comment="webkit2gtk3 is &lt;2.30.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836572" version="1" comment="webkit2gtk3-devel is &lt;2.30.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836573" version="1" comment="webkit2gtk3-jsc is &lt;2.30.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836574" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.30.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836575" version="1" comment="woff2 is &lt;1.0.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836576" version="1" comment="woff2-devel is &lt;1.0.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836577" version="1" comment="krb5-devel is &lt;1.18.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836578" version="1" comment="krb5-libs is &lt;1.18.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836579" version="1" comment="krb5-pkinit is &lt;1.18.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836580" version="1" comment="krb5-server is &lt;1.18.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836581" version="1" comment="krb5-server-ldap is &lt;1.18.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836582" version="1" comment="krb5-workstation is &lt;1.18.2-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836583" version="1" comment="libkadm5 is &lt;1.18.2-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836584" version="1" comment="libxml2 is &lt;2.9.7-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836585" version="1" comment="libxml2-devel is &lt;2.9.7-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836586" version="1" comment="python3-libxml2 is &lt;2.9.7-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836587" version="1" comment="bluez is &lt;5.52-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836588" version="1" comment="bluez-cups is &lt;5.52-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836589" version="1" comment="bluez-hid2hci is &lt;5.52-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836590" version="1" comment="bluez-libs is &lt;5.52-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836591" version="1" comment="bluez-libs-devel is &lt;5.52-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836592" version="1" comment="bluez-obexd is &lt;5.52-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836593" version="1" comment="opensc is &lt;0.20.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836594" version="1" comment="python3-cryptography is &lt;3.2.1-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836595" version="1" comment="p11-kit is &lt;0.23.22-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836596" version="1" comment="p11-kit-devel is &lt;0.23.22-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836597" version="1" comment="p11-kit-server is &lt;0.23.22-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836598" version="1" comment="p11-kit-trust is &lt;0.23.22-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836599" version="1" comment="curl is &lt;7.61.1-18.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836600" version="1" comment="libcurl is &lt;7.61.1-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836601" version="1" comment="libcurl-devel is &lt;7.61.1-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836602" version="1" comment="libcurl-minimal is &lt;7.61.1-18.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836603" version="1" comment="systemd is &lt;239-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836604" version="1" comment="systemd-container is &lt;239-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836605" version="1" comment="systemd-devel is &lt;239-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836606" version="1" comment="systemd-journal-remote is &lt;239-45.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836607" version="1" comment="systemd-libs is &lt;239-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836608" version="1" comment="systemd-pam is &lt;239-45.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836609" version="1" comment="systemd-tests is &lt;239-45.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836610" version="1" comment="systemd-udev is &lt;239-45.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836611" version="1" comment="iwl100-firmware is &lt;39.31.5.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836612" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836613" version="1" comment="iwl105-firmware is &lt;18.168.6.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836614" version="1" comment="iwl135-firmware is &lt;18.168.6.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836615" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836616" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836617" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836618" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836619" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836620" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836621" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836622" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836623" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836624" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836625" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836626" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-102.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836627" version="1" comment="libertas-sd8686-firmware is &lt;20201218-102.git05789708.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836628" version="1" comment="libertas-sd8787-firmware is &lt;20201218-102.git05789708.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836629" version="1" comment="libertas-usb8388-firmware is &lt;20201218-102.git05789708.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836630" version="1" comment="libertas-usb8388-olpc-firmware is &lt;20201218-102.git05789708.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836631" version="1" comment="linux-firmware is &lt;20201218-102.git05789708.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836632" version="1" comment="trousers is &lt;0.3.15-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836633" version="1" comment="trousers-devel is &lt;0.3.15-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836634" version="1" comment="trousers-lib is &lt;0.3.15-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836635" version="1" comment="python3-urllib3 is &lt;1.24.2-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836636" version="1" comment="platform-python is &lt;3.6.8-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836637" version="1" comment="platform-python-debug is &lt;3.6.8-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836638" version="1" comment="platform-python-devel is &lt;3.6.8-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836639" version="1" comment="python3-idle is &lt;3.6.8-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836640" version="1" comment="python3-libs is &lt;3.6.8-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836641" version="1" comment="python3-test is &lt;3.6.8-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836642" version="1" comment="python3-tkinter is &lt;3.6.8-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836643" version="1" comment="ctdb is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836644" version="1" comment="ctdb-tests is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836645" version="1" comment="libsmbclient is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836646" version="1" comment="libsmbclient-devel is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836647" version="1" comment="libwbclient is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836648" version="1" comment="libwbclient-devel is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836649" version="1" comment="openchange is &lt;2.3-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836650" version="1" comment="python3-samba is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836651" version="1" comment="python3-samba-test is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836652" version="1" comment="samba is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836653" version="1" comment="samba-client is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836654" version="1" comment="samba-client-libs is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836655" version="1" comment="samba-common is &lt;4.13.3-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836656" version="1" comment="samba-common-libs is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836657" version="1" comment="samba-common-tools is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836658" version="1" comment="samba-devel is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836659" version="1" comment="samba-krb5-printing is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836660" version="1" comment="samba-libs is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836661" version="1" comment="samba-pidl is &lt;4.13.3-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836662" version="1" comment="samba-test is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836663" version="1" comment="samba-test-libs is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836664" version="1" comment="samba-winbind is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836665" version="1" comment="samba-winbind-clients is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836666" version="1" comment="samba-winbind-krb5-locator is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836667" version="1" comment="samba-winbind-modules is &lt;4.13.3-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836668" version="1" comment="samba-winexe is &lt;4.13.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836669" version="1" comment="libdb is &lt;5.3.28-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836670" version="1" comment="libdb-cxx is &lt;5.3.28-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836671" version="1" comment="libdb-cxx-devel is &lt;5.3.28-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836672" version="1" comment="libdb-devel is &lt;5.3.28-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836673" version="1" comment="libdb-devel-doc is &lt;5.3.28-40.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836674" version="1" comment="libdb-sql is &lt;5.3.28-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836675" version="1" comment="libdb-sql-devel is &lt;5.3.28-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836676" version="1" comment="libdb-utils is &lt;5.3.28-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836677" version="1" comment="perl is &lt;5.26.3-419.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836678" version="1" comment="perl-Attribute-Handlers is &lt;0.99-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836679" version="1" comment="perl-Devel-Peek is &lt;1.26-419.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836680" version="1" comment="perl-Devel-SelfStubber is &lt;1.06-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836681" version="1" comment="perl-Errno is &lt;1.28-419.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836682" version="1" comment="perl-ExtUtils-Embed is &lt;1.34-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836683" version="1" comment="perl-ExtUtils-Miniperl is &lt;1.06-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836684" version="1" comment="perl-IO is &lt;1.38-419.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836685" version="1" comment="perl-IO-Zlib is &lt;1.10-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836686" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836687" version="1" comment="perl-Math-Complex is &lt;1.59-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836688" version="1" comment="perl-Memoize is &lt;1.03-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836689" version="1" comment="perl-Module-Loaded is &lt;0.08-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836690" version="1" comment="perl-Net-Ping is &lt;2.55-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836691" version="1" comment="perl-Pod-Html is &lt;1.22.02-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836692" version="1" comment="perl-SelfLoader is &lt;1.23-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836693" version="1" comment="perl-Test is &lt;1.30-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836694" version="1" comment="perl-Time-Piece is &lt;1.31-419.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836695" version="1" comment="perl-devel is &lt;5.26.3-419.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836696" version="1" comment="perl-interpreter is &lt;5.26.3-419.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836697" version="1" comment="perl-libnetcfg is &lt;5.26.3-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836698" version="1" comment="perl-libs is &lt;5.26.3-419.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836699" version="1" comment="perl-macros is &lt;5.26.3-419.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836700" version="1" comment="perl-open is &lt;1.11-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836701" version="1" comment="perl-tests is &lt;5.26.3-419.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836702" version="1" comment="perl-utils is &lt;5.26.3-419.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836703" version="1" comment="bash is &lt;4.4.19-14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836704" version="1" comment="bash-doc is &lt;4.4.19-14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836705" version="1" comment="wpa_supplicant is &lt;2.9-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836706" version="1" comment="brotli is &lt;1.0.6-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836707" version="1" comment="brotli-devel is &lt;1.0.6-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836708" version="1" comment="python3-brotli is &lt;1.0.6-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836709" version="1" comment="sudo is &lt;1.8.29-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836710" version="1" comment="sane-backends is &lt;1.0.27-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836711" version="1" comment="sane-backends-daemon is &lt;1.0.27-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836712" version="1" comment="sane-backends-devel is &lt;1.0.27-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836713" version="1" comment="sane-backends-doc is &lt;1.0.27-22.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836714" version="1" comment="sane-backends-drivers-cameras is &lt;1.0.27-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836715" version="1" comment="sane-backends-drivers-scanners is &lt;1.0.27-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836716" version="1" comment="sane-backends-libs is &lt;1.0.27-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836717" version="1" comment="delve is &lt;1.5.0-2.module+el8.4.0+8864+58b0fcdb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836718" version="1" comment="go-toolset is &lt;1.15.7-1.module+el8.4.0+9580+3b0e6c24 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836719" version="1" comment="golang is &lt;1.15.7-1.module+el8.4.0+9580+3b0e6c24 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836720" version="1" comment="golang-bin is &lt;1.15.7-1.module+el8.4.0+9580+3b0e6c24 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836721" version="1" comment="golang-docs is &lt;1.15.7-1.module+el8.4.0+9580+3b0e6c24 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836722" version="1" comment="golang-misc is &lt;1.15.7-1.module+el8.4.0+9580+3b0e6c24 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836723" version="1" comment="golang-race is &lt;1.15.7-1.module+el8.4.0+9580+3b0e6c24 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836724" version="1" comment="golang-src is &lt;1.15.7-1.module+el8.4.0+9580+3b0e6c24 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836725" version="1" comment="golang-tests is &lt;1.15.7-1.module+el8.4.0+9580+3b0e6c24 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836726" version="1" comment="mailman is &lt;2.1.29-11.module+el8.4.0+8277+5e2c6e6e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836727" version="1" comment="evolution is &lt;3.28.5-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836728" version="1" comment="evolution-bogofilter is &lt;3.28.5-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836729" version="1" comment="evolution-data-server is &lt;3.28.5-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836730" version="1" comment="evolution-data-server-devel is &lt;3.28.5-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836731" version="1" comment="evolution-data-server-doc is &lt;3.28.5-15.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836732" version="1" comment="evolution-data-server-langpacks is &lt;3.28.5-15.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836733" version="1" comment="evolution-data-server-perl is &lt;3.28.5-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836734" version="1" comment="evolution-data-server-tests is &lt;3.28.5-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836735" version="1" comment="evolution-devel is &lt;3.28.5-16.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836736" version="1" comment="evolution-ews is &lt;3.28.5-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836737" version="1" comment="evolution-ews-langpacks is &lt;3.28.5-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836738" version="1" comment="evolution-help is &lt;3.28.5-16.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836739" version="1" comment="evolution-langpacks is &lt;3.28.5-16.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836740" version="1" comment="evolution-pst is &lt;3.28.5-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836741" version="1" comment="evolution-spamassassin is &lt;3.28.5-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836742" version="1" comment="qt5-qtbase is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836743" version="1" comment="qt5-qtbase-common is &lt;5.12.5-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836744" version="1" comment="qt5-qtbase-devel is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836745" version="1" comment="qt5-qtbase-examples is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836746" version="1" comment="qt5-qtbase-gui is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836747" version="1" comment="qt5-qtbase-mysql is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836748" version="1" comment="qt5-qtbase-odbc is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836749" version="1" comment="qt5-qtbase-postgresql is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836750" version="1" comment="qt5-qtbase-private-devel is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836751" version="1" comment="qt5-qtbase-static is &lt;5.12.5-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836752" version="1" comment="exiv2 is &lt;0.27.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836753" version="1" comment="exiv2-devel is &lt;0.27.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836754" version="1" comment="exiv2-doc is &lt;0.27.3-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836755" version="1" comment="exiv2-libs is &lt;0.27.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836756" version="1" comment="python2 is &lt;2.7.18-4.module+el8.4.0+9577+0b56c8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836757" version="1" comment="python2-backports is &lt;1.0-16.module+el8.4.0+9193+f3daf6ef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836758" version="1" comment="python2-backports-ssl_match_hostname is &lt;3.5.0.1-12.module+el8.4.0+9193+f3daf6ef for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836759" version="1" comment="python2-debug is &lt;2.7.18-4.module+el8.4.0+9577+0b56c8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836760" version="1" comment="python2-devel is &lt;2.7.18-4.module+el8.4.0+9577+0b56c8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836761" version="1" comment="python2-libs is &lt;2.7.18-4.module+el8.4.0+9577+0b56c8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836762" version="1" comment="python2-lxml is &lt;4.2.3-4.module+el8.4.0+9319+a932af88 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836763" version="1" comment="python2-numpy is &lt;1.14.2-16.module+el8.4.0+9406+221a4565 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836764" version="1" comment="python2-numpy-doc is &lt;1.14.2-16.module+el8.4.0+9406+221a4565 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836765" version="1" comment="python2-numpy-f2py is &lt;1.14.2-16.module+el8.4.0+9406+221a4565 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836766" version="1" comment="python2-setuptools is &lt;39.0.1-13.module+el8.4.0+9442+27d0e81c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836767" version="1" comment="python2-setuptools-wheel is &lt;39.0.1-13.module+el8.4.0+9442+27d0e81c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836768" version="1" comment="python2-six is &lt;1.11.0-6.module+el8.4.0+9287+299307c7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836769" version="1" comment="python2-test is &lt;2.7.18-4.module+el8.4.0+9577+0b56c8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836770" version="1" comment="python2-tkinter is &lt;2.7.18-4.module+el8.4.0+9577+0b56c8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836771" version="1" comment="python2-tools is &lt;2.7.18-4.module+el8.4.0+9577+0b56c8de for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836772" version="1" comment="python2-urllib3 is &lt;1.24.2-3.module+el8.4.0+9193+f3daf6ef for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836773" version="1" comment="apache-commons-net is &lt;3.6-3.module+el8.3.0+6805+72837426 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836774" version="1" comment="jss is &lt;4.8.1-2.module+el8.4.0+10451+3e5b5448 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836775" version="1" comment="jss-javadoc is &lt;4.8.1-2.module+el8.4.0+10451+3e5b5448 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836776" version="1" comment="pki-acme is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836777" version="1" comment="pki-base is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836778" version="1" comment="pki-base-java is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836779" version="1" comment="pki-ca is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836780" version="1" comment="pki-kra is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836781" version="1" comment="pki-server is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836782" version="1" comment="pki-servlet-4.0-api is &lt;9.0.30-1.module+el8.3.0+6730+8f9c6254 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836783" version="1" comment="pki-servlet-engine is &lt;9.0.30-1.module+el8.3.0+6730+8f9c6254 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836784" version="1" comment="pki-symkey is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836785" version="1" comment="pki-tools is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836786" version="1" comment="python3-pki is &lt;10.10.5-2.module+el8.4.0+10466+9830f79e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836787" version="1" comment="resteasy is &lt;3.0.26-6.module+el8.4.0+8891+bb8828ef for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836788" version="1" comment="stax-ex is &lt;1.7.7-8.module+el8.2.0+5723+4574fbff for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836789" version="1" comment="tomcatjss is &lt;7.6.1-1.module+el8.4.0+8778+d07929ff for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836790" version="1" comment="xmlstreambuffer is &lt;1.5.4-8.module+el8.2.0+5723+4574fbff for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836791" version="1" comment="tigervnc is &lt;1.11.0-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836792" version="1" comment="tigervnc-icons is &lt;1.11.0-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836793" version="1" comment="tigervnc-license is &lt;1.11.0-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836794" version="1" comment="tigervnc-selinux is &lt;1.11.0-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836795" version="1" comment="tigervnc-server is &lt;1.11.0-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836796" version="1" comment="tigervnc-server-minimal is &lt;1.11.0-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836797" version="1" comment="tigervnc-server-module is &lt;1.11.0-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836798" version="1" comment="gssdp is &lt;1.0.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836799" version="1" comment="gssdp-devel is &lt;1.0.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836800" version="1" comment="gssdp-docs is &lt;1.0.5-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836801" version="1" comment="gupnp is &lt;1.0.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836802" version="1" comment="gupnp-devel is &lt;1.0.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836803" version="1" comment="spice-vdagent is &lt;0.20.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836804" version="1" comment="buildah is &lt;1.19.7-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836805" version="1" comment="buildah-tests is &lt;1.19.7-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836806" version="1" comment="cockpit-podman is &lt;29-2.module+el8.4.0+10607+f4da7515 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836807" version="1" comment="conmon is &lt;2.0.26-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836808" version="1" comment="container-selinux is &lt;2.158.0-1.module+el8.4.0+10607+f4da7515 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836809" version="1" comment="containernetworking-plugins is &lt;0.9.1-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836810" version="1" comment="containers-common is &lt;1.2.2-8.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836811" version="1" comment="crit is &lt;3.15-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836812" version="1" comment="criu is &lt;3.15-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836813" version="1" comment="crun is &lt;0.18-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836814" version="1" comment="fuse-overlayfs is &lt;1.4.0-2.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836815" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836816" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836817" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-2.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836818" version="1" comment="podman is &lt;3.0.1-6.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836819" version="1" comment="podman-catatonit is &lt;3.0.1-6.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836820" version="1" comment="podman-docker is &lt;3.0.1-6.module+el8.4.0+10607+f4da7515 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836821" version="1" comment="podman-plugins is &lt;3.0.1-6.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836822" version="1" comment="podman-remote is &lt;3.0.1-6.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836823" version="1" comment="podman-tests is &lt;3.0.1-6.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836824" version="1" comment="python3-criu is &lt;3.15-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836825" version="1" comment="runc is &lt;1.0.0-70.rc92.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836826" version="1" comment="skopeo is &lt;1.2.2-8.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836827" version="1" comment="skopeo-tests is &lt;1.2.2-8.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836828" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.4.0+10607+f4da7515 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836829" version="1" comment="toolbox is &lt;0.0.8-1.module+el8.4.0+10607+f4da7515 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836830" version="1" comment="udica is &lt;0.2.4-1.module+el8.4.0+10607+f4da7515 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836831" version="1" comment="egl-wayland is &lt;1.1.5-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836832" version="1" comment="libX11 is &lt;1.6.8-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836833" version="1" comment="libX11-common is &lt;1.6.8-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836834" version="1" comment="libX11-devel is &lt;1.6.8-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836835" version="1" comment="libX11-xcb is &lt;1.6.8-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836836" version="1" comment="libdrm is &lt;2.4.103-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836837" version="1" comment="libdrm-devel is &lt;2.4.103-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836838" version="1" comment="libglvnd is &lt;1.3.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836839" version="1" comment="libglvnd-core-devel is &lt;1.3.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836840" version="1" comment="libglvnd-devel is &lt;1.3.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836841" version="1" comment="libglvnd-egl is &lt;1.3.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836842" version="1" comment="libglvnd-gles is &lt;1.3.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836843" version="1" comment="libglvnd-glx is &lt;1.3.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836844" version="1" comment="libglvnd-opengl is &lt;1.3.2-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836845" version="1" comment="libinput is &lt;1.16.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836846" version="1" comment="libinput-devel is &lt;1.16.3-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836847" version="1" comment="libinput-utils is &lt;1.16.3-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836848" version="1" comment="libwacom is &lt;1.6-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836849" version="1" comment="libwacom-data is &lt;1.6-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836850" version="1" comment="libwacom-devel is &lt;1.6-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836851" version="1" comment="mesa-dri-drivers is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836852" version="1" comment="mesa-filesystem is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836853" version="1" comment="mesa-libEGL is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836854" version="1" comment="mesa-libEGL-devel is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836855" version="1" comment="mesa-libGL is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836856" version="1" comment="mesa-libGL-devel is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836857" version="1" comment="mesa-libOSMesa is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836858" version="1" comment="mesa-libOSMesa-devel is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836859" version="1" comment="mesa-libgbm is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836860" version="1" comment="mesa-libgbm-devel is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836861" version="1" comment="mesa-libglapi is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836862" version="1" comment="mesa-libxatracker is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836863" version="1" comment="mesa-vdpau-drivers is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836864" version="1" comment="mesa-vulkan-devel is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836865" version="1" comment="mesa-vulkan-drivers is &lt;20.3.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836866" version="1" comment="xorg-x11-drivers is &lt;7.7-30.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836867" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.10-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836868" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.10-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836869" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.10-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836870" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.10-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836871" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.10-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836872" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.10-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836873" version="1" comment="xorg-x11-server-common is &lt;1.20.10-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836874" version="1" comment="xorg-x11-server-devel is &lt;1.20.10-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836875" version="1" comment="xorg-x11-server-source is &lt;1.20.10-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836876" version="1" comment="httpd is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836877" version="1" comment="httpd-devel is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836878" version="1" comment="httpd-filesystem is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836879" version="1" comment="httpd-manual is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836880" version="1" comment="httpd-tools is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836881" version="1" comment="mod_ldap is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836882" version="1" comment="mod_proxy_html is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836883" version="1" comment="mod_session is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836884" version="1" comment="mod_ssl is &lt;2.4.37-39.module+el8.4.0+9658+b87b2deb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836885" version="1" comment="libvncserver is &lt;0.9.11-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836886" version="1" comment="libvncserver-devel is &lt;0.9.11-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836887" version="1" comment="raptor2 is &lt;2.0.15-16.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836888" version="1" comment="raptor2-devel is &lt;2.0.15-16.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836889" version="1" comment="bind-dyndb-ldap is &lt;11.6-2.module+el8.4.0+9328+4ec4e316 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836890" version="1" comment="custodia is &lt;0.6.0-3.module+el8.1.0+4098+f286395e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836891" version="1" comment="ipa-client is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836892" version="1" comment="ipa-client-common is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836893" version="1" comment="ipa-client-epn is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836894" version="1" comment="ipa-client-samba is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836895" version="1" comment="ipa-common is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836896" version="1" comment="ipa-healthcheck is &lt;0.7-3.module+el8.4.0+9007+5084bdd8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836897" version="1" comment="ipa-healthcheck-core is &lt;0.7-3.module+el8.4.0+9008+94c5103b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836898" version="1" comment="ipa-python-compat is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836899" version="1" comment="ipa-selinux is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836900" version="1" comment="ipa-server is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836901" version="1" comment="ipa-server-common is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836902" version="1" comment="ipa-server-dns is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836903" version="1" comment="ipa-server-trust-ad is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836904" version="1" comment="opendnssec is &lt;2.1.7-1.module+el8.4.0+9007+5084bdd8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836905" version="1" comment="python3-custodia is &lt;0.6.0-3.module+el8.1.0+4098+f286395e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836906" version="1" comment="python3-ipaclient is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836907" version="1" comment="python3-ipalib is &lt;4.9.2-3.module+el8.4.0+10413+a92f1bfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836908" version="1" comment="python3-ipaserver is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836909" version="1" comment="python3-ipatests is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836910" version="1" comment="python3-jwcrypto is &lt;0.5.0-1.module+el8.1.0+4107+4a66eb87 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836911" version="1" comment="python3-kdcproxy is &lt;0.4-5.module+el8.2.0+4691+a05b2456 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836912" version="1" comment="python3-pyusb is &lt;1.0.0-9.module+el8.1.0+4107+4a66eb87 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836913" version="1" comment="python3-qrcode is &lt;5.1-12.module+el8.1.0+4107+4a66eb87 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836914" version="1" comment="python3-qrcode-core is &lt;5.1-12.module+el8.1.0+4107+4a66eb87 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836915" version="1" comment="python3-yubico is &lt;1.3.2-9.module+el8.1.0+4107+4a66eb87 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836916" version="1" comment="slapi-nis is &lt;0.56.6-1.module+el8.4.0+9005+f55ff3e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836917" version="1" comment="softhsm is &lt;2.6.0-5.module+el8.4.0+10227+076cd560 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836918" version="1" comment="softhsm-devel is &lt;2.6.0-5.module+el8.4.0+10227+076cd560 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836919" version="1" comment="freerdp is &lt;2.2.0-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836920" version="1" comment="freerdp-devel is &lt;2.2.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836921" version="1" comment="freerdp-libs is &lt;2.2.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836922" version="1" comment="libwinpr is &lt;2.2.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836923" version="1" comment="libwinpr-devel is &lt;2.2.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836924" version="1" comment="ghostscript is &lt;9.27-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836925" version="1" comment="ghostscript-doc is &lt;9.27-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836926" version="1" comment="ghostscript-tools-dvipdf is &lt;9.27-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836927" version="1" comment="ghostscript-tools-fonts is &lt;9.27-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836928" version="1" comment="ghostscript-tools-printing is &lt;9.27-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836929" version="1" comment="ghostscript-x11 is &lt;9.27-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836930" version="1" comment="libgs is &lt;9.27-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836931" version="1" comment="libgs-devel is &lt;9.27-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836932" version="1" comment="python3-unbound is &lt;1.7.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836933" version="1" comment="unbound is &lt;1.7.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836934" version="1" comment="unbound-devel is &lt;1.7.3-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836935" version="1" comment="unbound-libs is &lt;1.7.3-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836936" version="1" comment="grafana is &lt;7.3.6-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836937" version="1" comment="python38-pyyaml is &lt;5.3.1-1.module+el8.4.0+8888+89bc7e79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836938" version="1" comment="evince is &lt;3.28.4-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836939" version="1" comment="evince-browser-plugin is &lt;3.28.4-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836940" version="1" comment="evince-devel is &lt;3.28.4-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836941" version="1" comment="evince-libs is &lt;3.28.4-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836942" version="1" comment="evince-nautilus is &lt;3.28.4-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836943" version="1" comment="poppler is &lt;20.11.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836944" version="1" comment="poppler-cpp is &lt;20.11.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836945" version="1" comment="poppler-cpp-devel is &lt;20.11.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836946" version="1" comment="poppler-devel is &lt;20.11.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836947" version="1" comment="poppler-glib is &lt;20.11.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836948" version="1" comment="poppler-glib-devel is &lt;20.11.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836949" version="1" comment="poppler-qt5 is &lt;20.11.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836950" version="1" comment="poppler-qt5-devel is &lt;20.11.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836951" version="1" comment="poppler-utils is &lt;20.11.0-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836952" version="1" comment="dovecot is &lt;2.3.8-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836953" version="1" comment="dovecot-devel is &lt;2.3.8-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836954" version="1" comment="dovecot-mysql is &lt;2.3.8-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836955" version="1" comment="dovecot-pgsql is &lt;2.3.8-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836956" version="1" comment="dovecot-pigeonhole is &lt;2.3.8-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836957" version="1" comment="python3-lxml is &lt;4.2.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836958" version="1" comment="spice-server is &lt;0.14.3-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836959" version="1" comment="spice-server-devel is &lt;0.14.3-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836960" version="1" comment="cargo is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836961" version="1" comment="cargo-doc is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836962" version="1" comment="clippy is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836963" version="1" comment="rls is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836964" version="1" comment="rust is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836965" version="1" comment="rust-analysis is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836966" version="1" comment="rust-debugger-common is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836967" version="1" comment="rust-doc is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836968" version="1" comment="rust-gdb is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836969" version="1" comment="rust-lldb is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836970" version="1" comment="rust-src is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836971" version="1" comment="rust-std-static is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836972" version="1" comment="rust-toolset is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836973" version="1" comment="rustfmt is &lt;1.49.0-1.module+el8.4.0+9446+1a463e08 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836974" version="1" comment="mingw-binutils-generic is &lt;2.30-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836975" version="1" comment="mingw-filesystem-base is &lt;104-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836976" version="1" comment="mingw32-binutils is &lt;2.30-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836977" version="1" comment="mingw32-bzip2 is &lt;1.0.6-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836978" version="1" comment="mingw32-bzip2-static is &lt;1.0.6-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836979" version="1" comment="mingw32-filesystem is &lt;104-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836980" version="1" comment="mingw32-sqlite is &lt;3.26.0.0-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836981" version="1" comment="mingw32-sqlite-static is &lt;3.26.0.0-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836982" version="1" comment="mingw64-binutils is &lt;2.30-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836983" version="1" comment="mingw64-bzip2 is &lt;1.0.6-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836984" version="1" comment="mingw64-bzip2-static is &lt;1.0.6-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836985" version="1" comment="mingw64-filesystem is &lt;104-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836986" version="1" comment="mingw64-sqlite is &lt;3.26.0.0-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836987" version="1" comment="mingw64-sqlite-static is &lt;3.26.0.0-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836988" version="1" comment="pandoc is &lt;2.0.6-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836989" version="1" comment="pandoc-common is &lt;2.0.6-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836990" version="1" comment="squid is &lt;4.11-4.module+el8.4.0+10676+a969168e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836991" version="1" comment="ipa-client is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836992" version="1" comment="ipa-client-common is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836993" version="1" comment="ipa-client-epn is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836994" version="1" comment="ipa-client-samba is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836995" version="1" comment="ipa-common is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836996" version="1" comment="ipa-healthcheck-core is &lt;0.7-3.module+el8.4.0+9007+5084bdd8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836997" version="1" comment="ipa-python-compat is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836998" version="1" comment="ipa-selinux is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009836999" version="1" comment="python3-ipaclient is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837000" version="1" comment="python3-ipalib is &lt;4.9.2-3.module+el8.4.0+10412+5ecb5b37 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837001" version="1" comment="python3-jwcrypto is &lt;0.5.0-1.module+el8.1.0+4098+f286395e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837002" version="1" comment="python3-pyusb is &lt;1.0.0-9.module+el8.1.0+4098+f286395e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837003" version="1" comment="python3-qrcode is &lt;5.1-12.module+el8.1.0+4098+f286395e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837004" version="1" comment="python3-qrcode-core is &lt;5.1-12.module+el8.1.0+4098+f286395e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837005" version="1" comment="python3-yubico is &lt;1.3.2-9.module+el8.1.0+4098+f286395e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837006" version="1" comment="slapi-nis is &lt;0.56.6-2.module+el8.4.0+10615+2234cc2c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837007" version="1" comment="bind is &lt;9.11.26-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837008" version="1" comment="bind-chroot is &lt;9.11.26-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837009" version="1" comment="bind-devel is &lt;9.11.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837010" version="1" comment="bind-export-devel is &lt;9.11.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837011" version="1" comment="bind-export-libs is &lt;9.11.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837012" version="1" comment="bind-libs is &lt;9.11.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837013" version="1" comment="bind-libs-lite is &lt;9.11.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837014" version="1" comment="bind-license is &lt;9.11.26-4.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837015" version="1" comment="bind-lite-devel is &lt;9.11.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837016" version="1" comment="bind-pkcs11 is &lt;9.11.26-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837017" version="1" comment="bind-pkcs11-devel is &lt;9.11.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837018" version="1" comment="bind-pkcs11-libs is &lt;9.11.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837019" version="1" comment="bind-pkcs11-utils is &lt;9.11.26-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837020" version="1" comment="bind-sdb is &lt;9.11.26-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837021" version="1" comment="bind-sdb-chroot is &lt;9.11.26-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837022" version="1" comment="bind-utils is &lt;9.11.26-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837023" version="1" comment="python3-bind is &lt;9.11.26-4.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837024" version="1" comment="redis is &lt;6.0.9-3.module+el8.4.0+10984+ed187465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837025" version="1" comment="redis-devel is &lt;6.0.9-3.module+el8.4.0+10984+ed187465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837026" version="1" comment="redis-doc is &lt;6.0.9-3.module+el8.4.0+10984+ed187465 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837027" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.6-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837028" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.6-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837029" version="1" comment="dotnet is &lt;5.0.203-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837030" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.6-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837031" version="1" comment="dotnet-host is &lt;5.0.6-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837032" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.6-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837033" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.6-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837034" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.203-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837035" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.6-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837036" version="1" comment="dotnet-templates-5.0 is &lt;5.0.203-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837037" version="1" comment="netstandard-targeting-pack-2.1 is &lt;5.0.203-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837038" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.15-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837039" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.15-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837040" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.15-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837041" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.15-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837042" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.15-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837043" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.115-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837044" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.15-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837045" version="1" comment="dotnet-templates-3.1 is &lt;3.1.115-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837046" version="1" comment="bpftool is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837047" version="1" comment="kernel is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837048" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-305.3.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837049" version="1" comment="kernel-core is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837050" version="1" comment="kernel-cross-headers is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837051" version="1" comment="kernel-debug is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837052" version="1" comment="kernel-debug-core is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837054" version="1" comment="kernel-debug-modules is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837055" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837057" version="1" comment="kernel-doc is &lt;4.18.0-305.3.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837058" version="1" comment="kernel-headers is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837059" version="1" comment="kernel-modules is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837060" version="1" comment="kernel-modules-extra is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837061" version="1" comment="kernel-tools is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837062" version="1" comment="kernel-tools-libs is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837064" version="1" comment="perf is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837065" version="1" comment="python3-perf is &lt;4.18.0-305.3.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837066" version="1" comment="glib2 is &lt;2.56.4-10.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837067" version="1" comment="glib2-devel is &lt;2.56.4-10.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837068" version="1" comment="glib2-doc is &lt;2.56.4-10.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837069" version="1" comment="glib2-fam is &lt;2.56.4-10.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837070" version="1" comment="glib2-static is &lt;2.56.4-10.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837071" version="1" comment="glib2-tests is &lt;2.56.4-10.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837072" version="1" comment="firefox is &lt;78.11.0-3.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837073" version="1" comment="pki-acme is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837074" version="1" comment="pki-base is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837075" version="1" comment="pki-base-java is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837076" version="1" comment="pki-ca is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837077" version="1" comment="pki-kra is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837078" version="1" comment="pki-server is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837079" version="1" comment="pki-symkey is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837080" version="1" comment="pki-tools is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837081" version="1" comment="python3-pki is &lt;10.10.5-3.module+el8.4.0+11039+635979e4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837082" version="1" comment="polkit is &lt;0.115-11.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837083" version="1" comment="polkit-devel is &lt;0.115-11.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837084" version="1" comment="polkit-docs is &lt;0.115-11.el8_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837085" version="1" comment="polkit-libs is &lt;0.115-11.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837086" version="1" comment="nginx is &lt;1.18.0-3.module+el8.4.0+11152+f736ed63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837087" version="1" comment="nginx-all-modules is &lt;1.18.0-3.module+el8.4.0+11152+f736ed63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837088" version="1" comment="nginx-filesystem is &lt;1.18.0-3.module+el8.4.0+11152+f736ed63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837089" version="1" comment="nginx-mod-http-image-filter is &lt;1.18.0-3.module+el8.4.0+11152+f736ed63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837090" version="1" comment="nginx-mod-http-perl is &lt;1.18.0-3.module+el8.4.0+11152+f736ed63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837091" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.18.0-3.module+el8.4.0+11152+f736ed63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837092" version="1" comment="nginx-mod-mail is &lt;1.18.0-3.module+el8.4.0+11152+f736ed63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837093" version="1" comment="nginx-mod-stream is &lt;1.18.0-3.module+el8.4.0+11152+f736ed63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837094" version="1" comment="thunderbird is &lt;78.11.0-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837095" version="1" comment="nginx is &lt;1.16.1-2.module+el8.4.0+11155+68135136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837096" version="1" comment="nginx-all-modules is &lt;1.16.1-2.module+el8.4.0+11155+68135136.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837097" version="1" comment="nginx-filesystem is &lt;1.16.1-2.module+el8.4.0+11155+68135136.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837098" version="1" comment="nginx-mod-http-image-filter is &lt;1.16.1-2.module+el8.4.0+11155+68135136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837099" version="1" comment="nginx-mod-http-perl is &lt;1.16.1-2.module+el8.4.0+11155+68135136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837100" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.16.1-2.module+el8.4.0+11155+68135136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837101" version="1" comment="nginx-mod-mail is &lt;1.16.1-2.module+el8.4.0+11155+68135136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837102" version="1" comment="nginx-mod-stream is &lt;1.16.1-2.module+el8.4.0+11155+68135136.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837103" version="1" comment="buildah is &lt;1.11.6-8.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837104" version="1" comment="buildah-tests is &lt;1.11.6-8.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837105" version="1" comment="cockpit-podman is &lt;11-1.module+el8.4.0+10193+e90fd8eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837106" version="1" comment="conmon is &lt;2.0.15-1.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837107" version="1" comment="container-selinux is &lt;2.130.0-1.module+el8.4.0+10193+e90fd8eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837108" version="1" comment="containernetworking-plugins is &lt;0.8.3-4.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837109" version="1" comment="containers-common is &lt;0.1.41-4.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837110" version="1" comment="crit is &lt;3.12-9.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837111" version="1" comment="criu is &lt;3.12-9.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837112" version="1" comment="fuse-overlayfs is &lt;0.7.8-1.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837113" version="1" comment="podman is &lt;1.6.4-26.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837114" version="1" comment="podman-docker is &lt;1.6.4-26.module+el8.4.0+10193+e90fd8eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837115" version="1" comment="podman-remote is &lt;1.6.4-26.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837116" version="1" comment="podman-tests is &lt;1.6.4-26.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837117" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.4.0+10193+e90fd8eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837118" version="1" comment="python3-criu is &lt;3.12-9.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837119" version="1" comment="runc is &lt;1.0.0-65.rc10.module+el8.4.0+11031+7edfb656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837120" version="1" comment="skopeo is &lt;0.1.41-4.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837121" version="1" comment="skopeo-tests is &lt;0.1.41-4.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837122" version="1" comment="slirp4netns is &lt;0.4.2-3.git21fdece.module+el8.4.0+10193+e90fd8eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837123" version="1" comment="toolbox is &lt;0.0.7-1.module+el8.4.0+10193+e90fd8eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837124" version="1" comment="udica is &lt;0.2.1-2.module+el8.4.0+10193+e90fd8eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837125" version="1" comment="microcode_ctl is &lt;20210216-1.20210525.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837126" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.16-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837127" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.16-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837128" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.16-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837129" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.16-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837130" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.16-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837131" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.116-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837132" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.16-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837133" version="1" comment="dotnet-templates-3.1 is &lt;3.1.116-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837134" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.7-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837135" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.7-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837136" version="1" comment="dotnet is &lt;5.0.204-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837137" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.7-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837138" version="1" comment="dotnet-host is &lt;5.0.7-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837139" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.7-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837140" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.7-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837141" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.204-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837142" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.7-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837143" version="1" comment="dotnet-templates-5.0 is &lt;5.0.204-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837144" version="1" comment="netstandard-targeting-pack-2.1 is &lt;5.0.204-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837145" version="1" comment="libwebp is &lt;1.0.0-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837146" version="1" comment="libwebp-devel is &lt;1.0.0-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837147" version="1" comment="dhcp-client is &lt;4.3.6-44.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837148" version="1" comment="dhcp-common is &lt;4.3.6-44.el8_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837149" version="1" comment="dhcp-libs is &lt;4.3.6-44.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837150" version="1" comment="dhcp-relay is &lt;4.3.6-44.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837151" version="1" comment="dhcp-server is &lt;4.3.6-44.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837152" version="1" comment="postgresql is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837153" version="1" comment="postgresql-contrib is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837154" version="1" comment="postgresql-docs is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837155" version="1" comment="postgresql-plperl is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837156" version="1" comment="postgresql-plpython3 is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837157" version="1" comment="postgresql-pltcl is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837158" version="1" comment="postgresql-server is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837159" version="1" comment="postgresql-server-devel is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837160" version="1" comment="postgresql-static is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837161" version="1" comment="postgresql-test is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837162" version="1" comment="postgresql-test-rpm-macros is &lt;9.6.22-1.module+el8.4.0+11244+beebcf7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837163" version="1" comment="postgresql is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837164" version="1" comment="postgresql-contrib is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837165" version="1" comment="postgresql-docs is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837166" version="1" comment="postgresql-plperl is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837167" version="1" comment="postgresql-plpython3 is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837168" version="1" comment="postgresql-pltcl is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837169" version="1" comment="postgresql-server is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837170" version="1" comment="postgresql-server-devel is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837171" version="1" comment="postgresql-static is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837172" version="1" comment="postgresql-test is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837173" version="1" comment="postgresql-test-rpm-macros is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837174" version="1" comment="postgresql-upgrade is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837175" version="1" comment="postgresql-upgrade-devel is &lt;10.17-1.module+el8.4.0+11249+895597ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837176" version="1" comment="gupnp is &lt;1.0.6-2.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837177" version="1" comment="gupnp-devel is &lt;1.0.6-2.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837178" version="1" comment="buildah is &lt;1.19.7-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837179" version="1" comment="buildah-tests is &lt;1.19.7-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837180" version="1" comment="cockpit-podman is &lt;29-2.module+el8.4.0+11310+8c67a752 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837181" version="1" comment="conmon is &lt;2.0.26-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837182" version="1" comment="container-selinux is &lt;2.158.0-1.module+el8.4.0+11310+8c67a752 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837183" version="1" comment="containernetworking-plugins is &lt;0.9.1-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837184" version="1" comment="containers-common is &lt;1.2.2-7.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837185" version="1" comment="crit is &lt;3.15-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837186" version="1" comment="criu is &lt;3.15-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837187" version="1" comment="crun is &lt;0.18-2.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837188" version="1" comment="fuse-overlayfs is &lt;1.4.0-2.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837189" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837190" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837191" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837192" version="1" comment="podman is &lt;3.0.1-6.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837193" version="1" comment="podman-catatonit is &lt;3.0.1-6.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837194" version="1" comment="podman-docker is &lt;3.0.1-6.module+el8.4.0+11310+8c67a752 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837195" version="1" comment="podman-plugins is &lt;3.0.1-6.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837196" version="1" comment="podman-remote is &lt;3.0.1-6.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837197" version="1" comment="podman-tests is &lt;3.0.1-6.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837198" version="1" comment="python3-criu is &lt;3.15-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837199" version="1" comment="runc is &lt;1.0.0-71.rc92.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837200" version="1" comment="skopeo is &lt;1.2.2-7.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837201" version="1" comment="skopeo-tests is &lt;1.2.2-7.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837202" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.4.0+11310+8c67a752 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837203" version="1" comment="toolbox is &lt;0.0.8-1.module+el8.4.0+11310+8c67a752 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837204" version="1" comment="udica is &lt;0.2.4-1.module+el8.4.0+11310+8c67a752 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837205" version="1" comment="buildah is &lt;1.19.7-2.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837206" version="1" comment="buildah-tests is &lt;1.19.7-2.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837207" version="1" comment="cockpit-podman is &lt;29-2.module+el8.4.0+11311+9da8acfb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837208" version="1" comment="conmon is &lt;2.0.26-3.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837209" version="1" comment="container-selinux is &lt;2.162.0-1.module+el8.4.0+11311+9da8acfb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837210" version="1" comment="containernetworking-plugins is &lt;0.9.1-1.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837211" version="1" comment="containers-common is &lt;1.2.2-10.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837212" version="1" comment="crit is &lt;3.15-1.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837213" version="1" comment="criu is &lt;3.15-1.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837214" version="1" comment="crun is &lt;0.18-2.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837215" version="1" comment="fuse-overlayfs is &lt;1.4.0-3.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837216" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837217" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837218" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-2.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837219" version="1" comment="podman is &lt;3.0.1-7.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837220" version="1" comment="podman-catatonit is &lt;3.0.1-7.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837221" version="1" comment="podman-docker is &lt;3.0.1-7.module+el8.4.0+11311+9da8acfb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837222" version="1" comment="podman-plugins is &lt;3.0.1-7.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837223" version="1" comment="podman-remote is &lt;3.0.1-7.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837224" version="1" comment="podman-tests is &lt;3.0.1-7.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837225" version="1" comment="python3-criu is &lt;3.15-1.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837226" version="1" comment="runc is &lt;1.0.0-73.rc93.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837227" version="1" comment="skopeo is &lt;1.2.2-10.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837228" version="1" comment="skopeo-tests is &lt;1.2.2-10.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837229" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.4.0+11311+9da8acfb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837230" version="1" comment="toolbox is &lt;0.0.8-1.module+el8.4.0+11311+9da8acfb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837231" version="1" comment="udica is &lt;0.2.4-1.module+el8.4.0+11311+9da8acfb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837232" version="1" comment="pgaudit is &lt;1.4.0-6.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837233" version="1" comment="postgres-decoderbufs is &lt;0.10.0-2.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837234" version="1" comment="postgresql is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837235" version="1" comment="postgresql-contrib is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837236" version="1" comment="postgresql-docs is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837237" version="1" comment="postgresql-plperl is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837238" version="1" comment="postgresql-plpython3 is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837239" version="1" comment="postgresql-pltcl is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837240" version="1" comment="postgresql-server is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837241" version="1" comment="postgresql-server-devel is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837242" version="1" comment="postgresql-static is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837243" version="1" comment="postgresql-test is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837244" version="1" comment="postgresql-test-rpm-macros is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837245" version="1" comment="postgresql-upgrade is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837246" version="1" comment="postgresql-upgrade-devel is &lt;12.7-1.module+el8.4.0+11288+c193d6d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837247" version="1" comment="pgaudit is &lt;1.5.0-1.module+el8.4.0+8873+b821c30a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837248" version="1" comment="postgres-decoderbufs is &lt;0.10.0-2.module+el8.4.0+8873+b821c30a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837249" version="1" comment="postgresql is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837250" version="1" comment="postgresql-contrib is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837251" version="1" comment="postgresql-docs is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837252" version="1" comment="postgresql-plperl is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837253" version="1" comment="postgresql-plpython3 is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837254" version="1" comment="postgresql-pltcl is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837255" version="1" comment="postgresql-server is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837256" version="1" comment="postgresql-server-devel is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837257" version="1" comment="postgresql-static is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837258" version="1" comment="postgresql-test is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837259" version="1" comment="postgresql-test-rpm-macros is &lt;13.3-1.module+el8.4.0+11254+85259292 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837260" version="1" comment="postgresql-upgrade is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837261" version="1" comment="postgresql-upgrade-devel is &lt;13.3-1.module+el8.4.0+11254+85259292 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837262" version="1" comment="fwupd is &lt;1.5.9-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837263" version="1" comment="libxml2 is &lt;2.9.7-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837264" version="1" comment="libxml2-devel is &lt;2.9.7-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837265" version="1" comment="python3-libxml2 is &lt;2.9.7-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837266" version="1" comment="bpftool is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837267" version="1" comment="kernel is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837268" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-305.7.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837269" version="1" comment="kernel-core is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837270" version="1" comment="kernel-cross-headers is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837271" version="1" comment="kernel-debug is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837272" version="1" comment="kernel-debug-core is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837274" version="1" comment="kernel-debug-modules is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837275" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837277" version="1" comment="kernel-doc is &lt;4.18.0-305.7.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837278" version="1" comment="kernel-headers is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837279" version="1" comment="kernel-modules is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837280" version="1" comment="kernel-modules-extra is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837281" version="1" comment="kernel-tools is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837282" version="1" comment="kernel-tools-libs is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837284" version="1" comment="perf is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837285" version="1" comment="python3-perf is &lt;4.18.0-305.7.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837286" version="1" comment="python3-rpm is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837287" version="1" comment="rpm is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837288" version="1" comment="rpm-apidocs is &lt;4.14.3-14.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037646" version="1" comment="rpm-build is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837289" version="1" comment="rpm-build-libs is &lt;4.14.3-14.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837290" version="1" comment="rpm-cron is &lt;4.14.3-14.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837291" version="1" comment="rpm-devel is &lt;4.14.3-14.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837292" version="1" comment="rpm-libs is &lt;4.14.3-14.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037647" version="1" comment="rpm-plugin-fapolicyd is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837293" version="1" comment="rpm-plugin-ima is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837294" version="1" comment="rpm-plugin-prioreset is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837295" version="1" comment="rpm-plugin-selinux is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837296" version="1" comment="rpm-plugin-syslog is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837297" version="1" comment="rpm-plugin-systemd-inhibit is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837298" version="1" comment="rpm-sign is &lt;4.14.3-14.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837299" version="1" comment="lz4 is &lt;1.8.3-3.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837300" version="1" comment="lz4-devel is &lt;1.8.3-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837301" version="1" comment="lz4-libs is &lt;1.8.3-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837302" version="1" comment="ruby is &lt;2.7.3-136.module+el8.4.0+10728+4c884998 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837303" version="1" comment="ruby-default-gems is &lt;2.7.3-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837304" version="1" comment="ruby-devel is &lt;2.7.3-136.module+el8.4.0+10728+4c884998 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837305" version="1" comment="ruby-doc is &lt;2.7.3-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837306" version="1" comment="ruby-libs is &lt;2.7.3-136.module+el8.4.0+10728+4c884998 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837307" version="1" comment="rubygem-abrt is &lt;0.4.0-1.module+el8.3.0+7192+4e3a532a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837308" version="1" comment="rubygem-abrt-doc is &lt;0.4.0-1.module+el8.3.0+7192+4e3a532a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837309" version="1" comment="rubygem-bigdecimal is &lt;2.0.0-136.module+el8.4.0+10728+4c884998 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837310" version="1" comment="rubygem-bson is &lt;4.8.1-1.module+el8.3.0+7192+4e3a532a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837311" version="1" comment="rubygem-bson-doc is &lt;4.8.1-1.module+el8.3.0+7192+4e3a532a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837312" version="1" comment="rubygem-bundler is &lt;2.1.4-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837313" version="1" comment="rubygem-io-console is &lt;0.5.6-136.module+el8.4.0+10728+4c884998 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837314" version="1" comment="rubygem-irb is &lt;1.2.6-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837315" version="1" comment="rubygem-json is &lt;2.3.0-136.module+el8.4.0+10728+4c884998 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837316" version="1" comment="rubygem-minitest is &lt;5.13.0-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837317" version="1" comment="rubygem-mongo is &lt;2.11.3-1.module+el8.3.0+7192+4e3a532a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837318" version="1" comment="rubygem-mongo-doc is &lt;2.11.3-1.module+el8.3.0+7192+4e3a532a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837319" version="1" comment="rubygem-mysql2 is &lt;0.5.3-1.module+el8.3.0+7192+4e3a532a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837320" version="1" comment="rubygem-mysql2-doc is &lt;0.5.3-1.module+el8.3.0+7192+4e3a532a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837321" version="1" comment="rubygem-net-telnet is &lt;0.2.0-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837322" version="1" comment="rubygem-openssl is &lt;2.1.2-136.module+el8.4.0+10728+4c884998 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837323" version="1" comment="rubygem-pg is &lt;1.2.3-1.module+el8.3.0+7192+4e3a532a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837324" version="1" comment="rubygem-pg-doc is &lt;1.2.3-1.module+el8.3.0+7192+4e3a532a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837325" version="1" comment="rubygem-power_assert is &lt;1.1.7-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837326" version="1" comment="rubygem-psych is &lt;3.1.0-136.module+el8.4.0+10728+4c884998 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837327" version="1" comment="rubygem-rake is &lt;13.0.1-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837328" version="1" comment="rubygem-rdoc is &lt;6.2.1-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837329" version="1" comment="rubygem-test-unit is &lt;3.3.4-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837330" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837331" version="1" comment="rubygems is &lt;3.1.6-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837332" version="1" comment="rubygems-devel is &lt;3.1.6-136.module+el8.4.0+10728+4c884998 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837333" version="1" comment="ruby is &lt;2.5.9-107.module+el8.4.0+10822+fe4fffb1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837334" version="1" comment="ruby-devel is &lt;2.5.9-107.module+el8.4.0+10822+fe4fffb1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837335" version="1" comment="ruby-doc is &lt;2.5.9-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837336" version="1" comment="ruby-irb is &lt;2.5.9-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837337" version="1" comment="ruby-libs is &lt;2.5.9-107.module+el8.4.0+10822+fe4fffb1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837338" version="1" comment="rubygem-abrt is &lt;0.3.0-4.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837339" version="1" comment="rubygem-abrt-doc is &lt;0.3.0-4.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837340" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-107.module+el8.4.0+10822+fe4fffb1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837341" version="1" comment="rubygem-bson is &lt;4.3.0-2.module+el8.1.0+3656+f80bfa1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837342" version="1" comment="rubygem-bson-doc is &lt;4.3.0-2.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837343" version="1" comment="rubygem-bundler is &lt;1.16.1-3.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837344" version="1" comment="rubygem-bundler-doc is &lt;1.16.1-3.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837345" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837346" version="1" comment="rubygem-io-console is &lt;0.4.6-107.module+el8.4.0+10822+fe4fffb1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837347" version="1" comment="rubygem-json is &lt;2.1.0-107.module+el8.4.0+10822+fe4fffb1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837348" version="1" comment="rubygem-minitest is &lt;5.10.3-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837349" version="1" comment="rubygem-mongo is &lt;2.5.1-2.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837350" version="1" comment="rubygem-mongo-doc is &lt;2.5.1-2.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837351" version="1" comment="rubygem-mysql2 is &lt;0.4.10-4.module+el8.1.0+3656+f80bfa1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837352" version="1" comment="rubygem-mysql2-doc is &lt;0.4.10-4.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837353" version="1" comment="rubygem-net-telnet is &lt;0.1.1-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837354" version="1" comment="rubygem-openssl is &lt;2.1.2-107.module+el8.4.0+10822+fe4fffb1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837355" version="1" comment="rubygem-pg is &lt;1.0.0-2.module+el8.1.0+3656+f80bfa1d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837356" version="1" comment="rubygem-pg-doc is &lt;1.0.0-2.module+el8.1.0+3656+f80bfa1d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837357" version="1" comment="rubygem-power_assert is &lt;1.1.1-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837358" version="1" comment="rubygem-psych is &lt;3.0.2-107.module+el8.4.0+10822+fe4fffb1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837359" version="1" comment="rubygem-rake is &lt;12.3.3-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837360" version="1" comment="rubygem-rdoc is &lt;6.0.1.1-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837361" version="1" comment="rubygem-test-unit is &lt;3.2.7-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837362" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837363" version="1" comment="rubygems is &lt;2.7.6.3-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837364" version="1" comment="rubygems-devel is &lt;2.7.6.3-107.module+el8.4.0+10822+fe4fffb1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837365" version="1" comment="ruby is &lt;2.6.7-107.module+el8.4.0+10830+bbd85cce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837366" version="1" comment="ruby-devel is &lt;2.6.7-107.module+el8.4.0+10830+bbd85cce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837367" version="1" comment="ruby-doc is &lt;2.6.7-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837368" version="1" comment="ruby-libs is &lt;2.6.7-107.module+el8.4.0+10830+bbd85cce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837369" version="1" comment="rubygem-abrt is &lt;0.3.0-4.module+el8.1.0+3653+beb38eb0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837370" version="1" comment="rubygem-abrt-doc is &lt;0.3.0-4.module+el8.1.0+3653+beb38eb0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837371" version="1" comment="rubygem-bigdecimal is &lt;1.4.1-107.module+el8.4.0+10830+bbd85cce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837372" version="1" comment="rubygem-bson is &lt;4.5.0-1.module+el8.1.0+3653+beb38eb0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837373" version="1" comment="rubygem-bson-doc is &lt;4.5.0-1.module+el8.1.0+3653+beb38eb0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837374" version="1" comment="rubygem-bundler is &lt;1.17.2-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837375" version="1" comment="rubygem-did_you_mean is &lt;1.3.0-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837376" version="1" comment="rubygem-io-console is &lt;0.4.7-107.module+el8.4.0+10830+bbd85cce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837377" version="1" comment="rubygem-irb is &lt;1.0.0-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837378" version="1" comment="rubygem-json is &lt;2.1.0-107.module+el8.4.0+10830+bbd85cce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837379" version="1" comment="rubygem-minitest is &lt;5.11.3-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837380" version="1" comment="rubygem-mongo is &lt;2.8.0-1.module+el8.1.0+3653+beb38eb0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837381" version="1" comment="rubygem-mongo-doc is &lt;2.8.0-1.module+el8.1.0+3653+beb38eb0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837382" version="1" comment="rubygem-mysql2 is &lt;0.5.2-1.module+el8.1.0+3653+beb38eb0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837383" version="1" comment="rubygem-mysql2-doc is &lt;0.5.2-1.module+el8.1.0+3653+beb38eb0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837384" version="1" comment="rubygem-net-telnet is &lt;0.2.0-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837385" version="1" comment="rubygem-openssl is &lt;2.1.2-107.module+el8.4.0+10830+bbd85cce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837386" version="1" comment="rubygem-pg is &lt;1.1.4-1.module+el8.1.0+3653+beb38eb0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837387" version="1" comment="rubygem-pg-doc is &lt;1.1.4-1.module+el8.1.0+3653+beb38eb0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837388" version="1" comment="rubygem-power_assert is &lt;1.1.3-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837389" version="1" comment="rubygem-psych is &lt;3.1.0-107.module+el8.4.0+10830+bbd85cce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837390" version="1" comment="rubygem-rake is &lt;12.3.3-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837391" version="1" comment="rubygem-rdoc is &lt;6.1.2-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837392" version="1" comment="rubygem-test-unit is &lt;3.2.9-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837393" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837394" version="1" comment="rubygems is &lt;3.0.3.1-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837395" version="1" comment="rubygems-devel is &lt;3.0.3.1-107.module+el8.4.0+10830+bbd85cce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837396" version="1" comment="edk2-ovmf is &lt;20200602gitca407c7246bf-4.el8_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837397" version="1" comment="389-ds-base is &lt;1.4.3.16-16.module+el8.4.0+11446+fc96bc48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837398" version="1" comment="389-ds-base-devel is &lt;1.4.3.16-16.module+el8.4.0+11446+fc96bc48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837399" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.16-16.module+el8.4.0+11446+fc96bc48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837400" version="1" comment="389-ds-base-libs is &lt;1.4.3.16-16.module+el8.4.0+11446+fc96bc48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837401" version="1" comment="389-ds-base-snmp is &lt;1.4.3.16-16.module+el8.4.0+11446+fc96bc48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837402" version="1" comment="python3-lib389 is &lt;1.4.3.16-16.module+el8.4.0+11446+fc96bc48 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837403" version="1" comment="linuxptp is &lt;2.0-5.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837404" version="1" comment="bpftool is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837405" version="1" comment="kernel is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837406" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-305.10.2.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837407" version="1" comment="kernel-core is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837408" version="1" comment="kernel-cross-headers is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837409" version="1" comment="kernel-debug is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837410" version="1" comment="kernel-debug-core is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837412" version="1" comment="kernel-debug-modules is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837413" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837415" version="1" comment="kernel-doc is &lt;4.18.0-305.10.2.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837416" version="1" comment="kernel-headers is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837417" version="1" comment="kernel-modules is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837418" version="1" comment="kernel-modules-extra is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837419" version="1" comment="kernel-tools is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837420" version="1" comment="kernel-tools-libs is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837422" version="1" comment="perf is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837423" version="1" comment="python3-perf is &lt;4.18.0-305.10.2.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837424" version="1" comment="systemd is &lt;239-45.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837425" version="1" comment="systemd-container is &lt;239-45.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837426" version="1" comment="systemd-devel is &lt;239-45.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837427" version="1" comment="systemd-journal-remote is &lt;239-45.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837428" version="1" comment="systemd-libs is &lt;239-45.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837429" version="1" comment="systemd-pam is &lt;239-45.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837430" version="1" comment="systemd-tests is &lt;239-45.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837431" version="1" comment="systemd-udev is &lt;239-45.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837432" version="1" comment="firefox is &lt;78.12.0-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837433" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837434" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837435" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837436" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837437" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837438" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837439" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837440" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837441" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837442" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837443" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837444" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837445" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837446" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837447" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.302.b08-0.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837448" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.302.b08-0.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837449" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837450" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837451" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837452" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.302.b08-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837453" version="1" comment="java-11-openjdk is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837454" version="1" comment="java-11-openjdk-demo is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837455" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837456" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837457" version="1" comment="java-11-openjdk-devel is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837458" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837459" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837460" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837461" version="1" comment="java-11-openjdk-headless is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837462" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837463" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837464" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837465" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837466" version="1" comment="java-11-openjdk-jmods is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837467" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837468" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837469" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837470" version="1" comment="java-11-openjdk-src is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837471" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837472" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837473" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837474" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837475" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.12.0.7-0.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837476" version="1" comment="thunderbird is &lt;78.12.0-3.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837477" version="1" comment="ruby is &lt;2.7.4-137.module+el8.4.0+12025+f744ca41 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837478" version="1" comment="ruby-default-gems is &lt;2.7.4-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837479" version="1" comment="ruby-devel is &lt;2.7.4-137.module+el8.4.0+12025+f744ca41 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837480" version="1" comment="ruby-doc is &lt;2.7.4-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837481" version="1" comment="ruby-libs is &lt;2.7.4-137.module+el8.4.0+12025+f744ca41 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837482" version="1" comment="rubygem-bigdecimal is &lt;2.0.0-137.module+el8.4.0+12025+f744ca41 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837483" version="1" comment="rubygem-bundler is &lt;2.2.24-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837484" version="1" comment="rubygem-io-console is &lt;0.5.6-137.module+el8.4.0+12025+f744ca41 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837485" version="1" comment="rubygem-irb is &lt;1.2.6-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837486" version="1" comment="rubygem-json is &lt;2.3.0-137.module+el8.4.0+12025+f744ca41 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837487" version="1" comment="rubygem-minitest is &lt;5.13.0-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837488" version="1" comment="rubygem-net-telnet is &lt;0.2.0-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837489" version="1" comment="rubygem-openssl is &lt;2.1.2-137.module+el8.4.0+12025+f744ca41 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837490" version="1" comment="rubygem-power_assert is &lt;1.1.7-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837491" version="1" comment="rubygem-psych is &lt;3.1.0-137.module+el8.4.0+12025+f744ca41 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837492" version="1" comment="rubygem-rake is &lt;13.0.1-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837493" version="1" comment="rubygem-rdoc is &lt;6.2.1.1-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837494" version="1" comment="rubygem-test-unit is &lt;3.3.4-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837495" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837496" version="1" comment="rubygems is &lt;3.1.6-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837497" version="1" comment="rubygems-devel is &lt;3.1.6-137.module+el8.4.0+12025+f744ca41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837498" version="1" comment="microcode_ctl is &lt;20210216-1.20210608.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837499" version="1" comment="bpftool is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837500" version="1" comment="kernel is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837501" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-305.12.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837502" version="1" comment="kernel-core is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837503" version="1" comment="kernel-cross-headers is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837504" version="1" comment="kernel-debug is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837505" version="1" comment="kernel-debug-core is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837507" version="1" comment="kernel-debug-modules is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837508" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837510" version="1" comment="kernel-doc is &lt;4.18.0-305.12.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837511" version="1" comment="kernel-headers is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837512" version="1" comment="kernel-modules is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837513" version="1" comment="kernel-modules-extra is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837514" version="1" comment="kernel-tools is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837515" version="1" comment="kernel-tools-libs is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837517" version="1" comment="perf is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837518" version="1" comment="python3-perf is &lt;4.18.0-305.12.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837519" version="1" comment="glib2 is &lt;2.56.4-10.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837520" version="1" comment="glib2-devel is &lt;2.56.4-10.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837521" version="1" comment="glib2-doc is &lt;2.56.4-10.el8_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837522" version="1" comment="glib2-fam is &lt;2.56.4-10.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837523" version="1" comment="glib2-static is &lt;2.56.4-10.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837524" version="1" comment="glib2-tests is &lt;2.56.4-10.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837525" version="1" comment="cargo is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837526" version="1" comment="cargo-doc is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837527" version="1" comment="clippy is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837528" version="1" comment="rls is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837529" version="1" comment="rust is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837530" version="1" comment="rust-analysis is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837531" version="1" comment="rust-debugger-common is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837532" version="1" comment="rust-doc is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837533" version="1" comment="rust-gdb is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837534" version="1" comment="rust-lldb is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837535" version="1" comment="rust-src is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837536" version="1" comment="rust-std-static is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837537" version="1" comment="rust-toolset is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837538" version="1" comment="rustfmt is &lt;1.52.1-1.module+el8.4.0+11282+0729bac9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837539" version="1" comment="edk2-ovmf is &lt;20200602gitca407c7246bf-4.el8_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837540" version="1" comment="nodejs is &lt;12.22.3-2.module+el8.4.0+11732+c668cc9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837541" version="1" comment="nodejs-devel is &lt;12.22.3-2.module+el8.4.0+11732+c668cc9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837542" version="1" comment="nodejs-docs is &lt;12.22.3-2.module+el8.4.0+11732+c668cc9f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837543" version="1" comment="nodejs-full-i18n is &lt;12.22.3-2.module+el8.4.0+11732+c668cc9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837545" version="1" comment="npm is &lt;6.14.13-1.12.22.3.2.module+el8.4.0+11732+c668cc9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837546" version="1" comment="nodejs is &lt;14.17.3-2.module+el8.4.0+11738+3bd42762 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837547" version="1" comment="nodejs-devel is &lt;14.17.3-2.module+el8.4.0+11738+3bd42762 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837548" version="1" comment="nodejs-docs is &lt;14.17.3-2.module+el8.4.0+11738+3bd42762 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837549" version="1" comment="nodejs-full-i18n is &lt;14.17.3-2.module+el8.4.0+11738+3bd42762 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837550" version="1" comment="npm is &lt;6.14.13-1.14.17.3.2.module+el8.4.0+11738+3bd42762 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837551" version="1" comment="libuv is &lt;1.41.1-1.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837552" version="1" comment="libuv-devel is &lt;1.41.1-1.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837553" version="1" comment="go-toolset is &lt;1.15.14-1.module+el8.4.0+11833+614b07b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837554" version="1" comment="golang is &lt;1.15.14-1.module+el8.4.0+11833+614b07b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837555" version="1" comment="golang-bin is &lt;1.15.14-1.module+el8.4.0+11833+614b07b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837556" version="1" comment="golang-docs is &lt;1.15.14-1.module+el8.4.0+11833+614b07b8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837557" version="1" comment="golang-misc is &lt;1.15.14-1.module+el8.4.0+11833+614b07b8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837558" version="1" comment="golang-race is &lt;1.15.14-1.module+el8.4.0+11833+614b07b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837559" version="1" comment="golang-src is &lt;1.15.14-1.module+el8.4.0+11833+614b07b8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837560" version="1" comment="golang-tests is &lt;1.15.14-1.module+el8.4.0+11833+614b07b8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837561" version="1" comment="389-ds-base is &lt;1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837562" version="1" comment="389-ds-base-devel is &lt;1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837563" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837564" version="1" comment="389-ds-base-libs is &lt;1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837565" version="1" comment="389-ds-base-snmp is &lt;1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837566" version="1" comment="python3-lib389 is &lt;1.4.3.16-19.module+el8.4.0+11894+f5bb5c43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837567" version="1" comment="cloud-init is &lt;20.3-10.el8_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837568" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.18-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837569" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.18-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837570" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.18-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837571" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.18-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837572" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.18-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837573" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.118-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837574" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.18-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837575" version="1" comment="dotnet-templates-3.1 is &lt;3.1.118-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837576" version="1" comment="dotnet-host-fxr-2.1 is &lt;2.1.29-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837577" version="1" comment="dotnet-runtime-2.1 is &lt;2.1.29-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837578" version="1" comment="dotnet-sdk-2.1 is &lt;2.1.525-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837579" version="1" comment="dotnet-sdk-2.1.5xx is &lt;2.1.525-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837580" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.9-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837581" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.9-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837582" version="1" comment="dotnet is &lt;5.0.206-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837583" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.9-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837584" version="1" comment="dotnet-host is &lt;5.0.9-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837585" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.9-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837586" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.9-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837587" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.206-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837588" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.9-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837589" version="1" comment="dotnet-templates-5.0 is &lt;5.0.206-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837590" version="1" comment="netstandard-targeting-pack-2.1 is &lt;5.0.206-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837591" version="1" comment="libipa_hbac is &lt;2.4.0-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837592" version="1" comment="libsss_autofs is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837593" version="1" comment="libsss_certmap is &lt;2.4.0-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837594" version="1" comment="libsss_idmap is &lt;2.4.0-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837595" version="1" comment="libsss_nss_idmap is &lt;2.4.0-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837596" version="1" comment="libsss_nss_idmap-devel is &lt;2.4.0-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837597" version="1" comment="libsss_simpleifp is &lt;2.4.0-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837598" version="1" comment="libsss_sudo is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837599" version="1" comment="python3-libipa_hbac is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837600" version="1" comment="python3-libsss_nss_idmap is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837601" version="1" comment="python3-sss is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837602" version="1" comment="python3-sss-murmur is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837603" version="1" comment="python3-sssdconfig is &lt;2.4.0-9.el8_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837604" version="1" comment="sssd is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837605" version="1" comment="sssd-ad is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837606" version="1" comment="sssd-client is &lt;2.4.0-9.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837607" version="1" comment="sssd-common is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837608" version="1" comment="sssd-common-pac is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837609" version="1" comment="sssd-dbus is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837610" version="1" comment="sssd-ipa is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837611" version="1" comment="sssd-kcm is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837612" version="1" comment="sssd-krb5 is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837613" version="1" comment="sssd-krb5-common is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837614" version="1" comment="sssd-ldap is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837615" version="1" comment="sssd-libwbclient is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837616" version="1" comment="sssd-nfs-idmap is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837617" version="1" comment="sssd-polkit-rules is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837618" version="1" comment="sssd-proxy is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837619" version="1" comment="sssd-tools is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837620" version="1" comment="sssd-winbind-idmap is &lt;2.4.0-9.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837621" version="1" comment="exiv2 is &lt;0.27.3-3.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837622" version="1" comment="exiv2-devel is &lt;0.27.3-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837623" version="1" comment="exiv2-doc is &lt;0.27.3-3.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837624" version="1" comment="exiv2-libs is &lt;0.27.3-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837625" version="1" comment="compat-exiv2-026 is &lt;0.26-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837626" version="1" comment="thunderbird is &lt;78.13.0-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837627" version="1" comment="firefox is &lt;78.13.0-2.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837628" version="1" comment="libsndfile is &lt;1.0.28-10.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837629" version="1" comment="libsndfile-devel is &lt;1.0.28-10.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837630" version="1" comment="bpftool is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837631" version="1" comment="kernel is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837632" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-305.17.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837633" version="1" comment="kernel-core is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837634" version="1" comment="kernel-cross-headers is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837635" version="1" comment="kernel-debug is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837636" version="1" comment="kernel-debug-core is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837638" version="1" comment="kernel-debug-modules is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837639" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837641" version="1" comment="kernel-doc is &lt;4.18.0-305.17.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837642" version="1" comment="kernel-headers is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837643" version="1" comment="kernel-modules is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837644" version="1" comment="kernel-modules-extra is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837645" version="1" comment="kernel-tools is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837646" version="1" comment="kernel-tools-libs is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837648" version="1" comment="perf is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837649" version="1" comment="python3-perf is &lt;4.18.0-305.17.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837650" version="1" comment="cyrus-imapd is &lt;3.0.7-20.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837651" version="1" comment="cyrus-imapd-utils is &lt;3.0.7-20.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837652" version="1" comment="cyrus-imapd-vzic is &lt;3.0.7-20.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837653" version="1" comment="firefox is &lt;78.14.0-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837654" version="1" comment="thunderbird is &lt;78.14.0-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837655" version="1" comment="bpftool is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837656" version="1" comment="kernel is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837657" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-305.19.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837658" version="1" comment="kernel-core is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837659" version="1" comment="kernel-cross-headers is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837660" version="1" comment="kernel-debug is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837661" version="1" comment="kernel-debug-core is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837663" version="1" comment="kernel-debug-modules is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837664" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837666" version="1" comment="kernel-doc is &lt;4.18.0-305.19.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837667" version="1" comment="kernel-headers is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837668" version="1" comment="kernel-modules is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837669" version="1" comment="kernel-modules-extra is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837670" version="1" comment="kernel-tools is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837671" version="1" comment="kernel-tools-libs is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837673" version="1" comment="perf is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837674" version="1" comment="python3-perf is &lt;4.18.0-305.19.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837675" version="1" comment="nspr is &lt;4.32.0-1.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837676" version="1" comment="nspr-devel is &lt;4.32.0-1.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837677" version="1" comment="nss is &lt;3.67.0-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837678" version="1" comment="nss-devel is &lt;3.67.0-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837679" version="1" comment="nss-softokn is &lt;3.67.0-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837680" version="1" comment="nss-softokn-devel is &lt;3.67.0-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837681" version="1" comment="nss-softokn-freebl is &lt;3.67.0-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837682" version="1" comment="nss-softokn-freebl-devel is &lt;3.67.0-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837683" version="1" comment="nss-sysinit is &lt;3.67.0-6.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837684" version="1" comment="nss-tools is &lt;3.67.0-6.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837685" version="1" comment="nss-util is &lt;3.67.0-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837686" version="1" comment="nss-util-devel is &lt;3.67.0-6.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837687" version="1" comment="krb5-devel is &lt;1.18.2-8.3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837688" version="1" comment="krb5-libs is &lt;1.18.2-8.3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837689" version="1" comment="krb5-pkinit is &lt;1.18.2-8.3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837690" version="1" comment="krb5-server is &lt;1.18.2-8.3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837691" version="1" comment="krb5-server-ldap is &lt;1.18.2-8.3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837692" version="1" comment="krb5-workstation is &lt;1.18.2-8.3.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837693" version="1" comment="libkadm5 is &lt;1.18.2-8.3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837694" version="1" comment="curl is &lt;7.61.1-18.el8_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837695" version="1" comment="libcurl is &lt;7.61.1-18.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837696" version="1" comment="libcurl-devel is &lt;7.61.1-18.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837697" version="1" comment="libcurl-minimal is &lt;7.61.1-18.el8_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837698" version="1" comment="go-toolset is &lt;1.15.14-2.module+el8.4.0+12542+e3fec473 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837699" version="1" comment="golang is &lt;1.15.14-2.module+el8.4.0+12542+e3fec473 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837700" version="1" comment="golang-bin is &lt;1.15.14-2.module+el8.4.0+12542+e3fec473 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837701" version="1" comment="golang-docs is &lt;1.15.14-2.module+el8.4.0+12542+e3fec473 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837702" version="1" comment="golang-misc is &lt;1.15.14-2.module+el8.4.0+12542+e3fec473 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837703" version="1" comment="golang-race is &lt;1.15.14-2.module+el8.4.0+12542+e3fec473 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837704" version="1" comment="golang-src is &lt;1.15.14-2.module+el8.4.0+12542+e3fec473 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837705" version="1" comment="golang-tests is &lt;1.15.14-2.module+el8.4.0+12542+e3fec473 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837706" version="1" comment="mysql is &lt;8.0.26-1.module+el8.4.0+12359+b8928c02 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837707" version="1" comment="mysql-common is &lt;8.0.26-1.module+el8.4.0+12359+b8928c02 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837708" version="1" comment="mysql-devel is &lt;8.0.26-1.module+el8.4.0+12359+b8928c02 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837709" version="1" comment="mysql-errmsg is &lt;8.0.26-1.module+el8.4.0+12359+b8928c02 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837710" version="1" comment="mysql-libs is &lt;8.0.26-1.module+el8.4.0+12359+b8928c02 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837711" version="1" comment="mysql-server is &lt;8.0.26-1.module+el8.4.0+12359+b8928c02 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837712" version="1" comment="mysql-test is &lt;8.0.26-1.module+el8.4.0+12359+b8928c02 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837713" version="1" comment="nodejs is &lt;12.22.5-1.module+el8.4.0+12242+af52a4c7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837714" version="1" comment="nodejs-devel is &lt;12.22.5-1.module+el8.4.0+12242+af52a4c7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837715" version="1" comment="nodejs-docs is &lt;12.22.5-1.module+el8.4.0+12242+af52a4c7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837716" version="1" comment="nodejs-full-i18n is &lt;12.22.5-1.module+el8.4.0+12242+af52a4c7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837717" version="1" comment="npm is &lt;6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837718" version="1" comment="nodejs is &lt;14.17.5-1.module+el8.4.0+12247+e2879e58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837719" version="1" comment="nodejs-devel is &lt;14.17.5-1.module+el8.4.0+12247+e2879e58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837720" version="1" comment="nodejs-docs is &lt;14.17.5-1.module+el8.4.0+12247+e2879e58 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837721" version="1" comment="nodejs-full-i18n is &lt;14.17.5-1.module+el8.4.0+12247+e2879e58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837722" version="1" comment="npm is &lt;6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837723" version="1" comment="firefox is &lt;91.2.0-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837724" version="1" comment="grafana is &lt;7.3.6-3.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837725" version="1" comment="httpd is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837726" version="1" comment="httpd-devel is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837727" version="1" comment="httpd-filesystem is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837728" version="1" comment="httpd-manual is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837729" version="1" comment="httpd-tools is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837730" version="1" comment="mod_ldap is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837731" version="1" comment="mod_proxy_html is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837732" version="1" comment="mod_session is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837733" version="1" comment="mod_ssl is &lt;2.4.37-39.module+el8.4.0+12865+a7065a39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837734" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.11-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837735" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.11-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837736" version="1" comment="dotnet is &lt;5.0.208-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837737" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.11-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837738" version="1" comment="dotnet-host is &lt;5.0.11-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837739" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.11-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837740" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.11-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837741" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.208-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837742" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.11-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837743" version="1" comment="dotnet-templates-5.0 is &lt;5.0.208-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837744" version="1" comment="netstandard-targeting-pack-2.1 is &lt;5.0.208-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837745" version="1" comment="thunderbird is &lt;91.2.0-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837746" version="1" comment="java-11-openjdk is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837747" version="1" comment="java-11-openjdk-demo is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837748" version="1" comment="java-11-openjdk-devel is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837749" version="1" comment="java-11-openjdk-headless is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837750" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837751" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837752" version="1" comment="java-11-openjdk-jmods is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837753" version="1" comment="java-11-openjdk-src is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837754" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.13.0.8-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837755" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837756" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837757" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837758" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837759" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837760" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837761" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837762" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837763" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837764" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837765" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837766" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837767" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837768" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837769" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.312.b07-1.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837770" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.312.b07-1.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837771" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837772" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837773" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837774" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.312.b07-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837775" version="1" comment="redis is &lt;5.0.3-5.module+el8.4.0+12927+b9845322 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837776" version="1" comment="redis-devel is &lt;5.0.3-5.module+el8.4.0+12927+b9845322 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837777" version="1" comment="redis-doc is &lt;5.0.3-5.module+el8.4.0+12927+b9845322 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837778" version="1" comment="redis is &lt;6.0.9-5.module+el8.4.0+12929+1bb0d2aa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837779" version="1" comment="redis-devel is &lt;6.0.9-5.module+el8.4.0+12929+1bb0d2aa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837780" version="1" comment="redis-doc is &lt;6.0.9-5.module+el8.4.0+12929+1bb0d2aa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837781" version="1" comment="flatpak is &lt;1.8.5-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837782" version="1" comment="flatpak-libs is &lt;1.8.5-4.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837783" version="1" comment="flatpak-selinux is &lt;1.8.5-4.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837784" version="1" comment="flatpak-session-helper is &lt;1.8.5-4.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837785" version="1" comment="bpftool is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837786" version="1" comment="kernel is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837787" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-305.25.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837788" version="1" comment="kernel-core is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837789" version="1" comment="kernel-cross-headers is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837790" version="1" comment="kernel-debug is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837791" version="1" comment="kernel-debug-core is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837793" version="1" comment="kernel-debug-modules is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837794" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837796" version="1" comment="kernel-doc is &lt;4.18.0-305.25.1.el8_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837797" version="1" comment="kernel-headers is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837798" version="1" comment="kernel-modules is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837799" version="1" comment="kernel-modules-extra is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837800" version="1" comment="kernel-tools is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837801" version="1" comment="kernel-tools-libs is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837803" version="1" comment="perf is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837804" version="1" comment="python3-perf is &lt;4.18.0-305.25.1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837805" version="1" comment="platform-python is &lt;3.6.8-39.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837806" version="1" comment="platform-python-debug is &lt;3.6.8-39.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837807" version="1" comment="platform-python-devel is &lt;3.6.8-39.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837808" version="1" comment="python3-idle is &lt;3.6.8-39.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837809" version="1" comment="python3-libs is &lt;3.6.8-39.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837810" version="1" comment="python3-test is &lt;3.6.8-39.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837811" version="1" comment="python3-tkinter is &lt;3.6.8-39.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837812" version="1" comment="ctdb is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837813" version="1" comment="ctdb-tests is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837814" version="1" comment="libsmbclient is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837815" version="1" comment="libsmbclient-devel is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837816" version="1" comment="libwbclient is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837817" version="1" comment="libwbclient-devel is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837818" version="1" comment="python3-samba is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837819" version="1" comment="python3-samba-test is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837820" version="1" comment="samba is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837821" version="1" comment="samba-client is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837822" version="1" comment="samba-client-libs is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837823" version="1" comment="samba-common is &lt;4.13.3-5.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837824" version="1" comment="samba-common-libs is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837825" version="1" comment="samba-common-tools is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837826" version="1" comment="samba-devel is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837827" version="1" comment="samba-krb5-printing is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837828" version="1" comment="samba-libs is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837829" version="1" comment="samba-pidl is &lt;4.13.3-5.el8_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837830" version="1" comment="samba-test is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837831" version="1" comment="samba-test-libs is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837832" version="1" comment="samba-winbind is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837833" version="1" comment="samba-winbind-clients is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837834" version="1" comment="samba-winbind-krb5-locator is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837835" version="1" comment="samba-winbind-modules is &lt;4.13.3-5.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837836" version="1" comment="samba-winexe is &lt;4.13.3-5.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837837" version="1" comment="curl is &lt;7.61.1-18.el8_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837838" version="1" comment="libcurl is &lt;7.61.1-18.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837839" version="1" comment="libcurl-devel is &lt;7.61.1-18.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837840" version="1" comment="libcurl-minimal is &lt;7.61.1-18.el8_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837841" version="1" comment="libsolv is &lt;0.7.16-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837842" version="1" comment="libsolv-devel is &lt;0.7.16-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837843" version="1" comment="libsolv-tools is &lt;0.7.16-3.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837844" version="1" comment="python3-solv is &lt;0.7.16-3.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837845" version="1" comment="webkit2gtk3 is &lt;2.30.4-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837846" version="1" comment="webkit2gtk3-devel is &lt;2.30.4-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837847" version="1" comment="webkit2gtk3-jsc is &lt;2.30.4-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837848" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.30.4-3.el8_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837849" version="1" comment="firefox is &lt;91.3.0-1.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837850" version="1" comment="thunderbird is &lt;91.3.0-2.el8_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837851" version="1" comment="java-17-openjdk is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837852" version="1" comment="java-17-openjdk-demo is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837853" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837854" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837855" version="1" comment="java-17-openjdk-devel is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837856" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837857" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837858" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837859" version="1" comment="java-17-openjdk-headless is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837860" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837861" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837862" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837863" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837864" version="1" comment="java-17-openjdk-jmods is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837865" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837866" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837867" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837868" version="1" comment="java-17-openjdk-src is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837869" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837870" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837871" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837872" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837873" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.1.0.12-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837874" version="1" comment="resource-agents is &lt;4.1.1-98.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837875" version="1" comment="resource-agents-aliyun is &lt;4.1.1-98.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837876" version="1" comment="resource-agents-gcp is &lt;4.1.1-98.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837877" version="1" comment="resource-agents-paf is &lt;4.1.1-98.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837878" version="1" comment="pcs is &lt;0.10.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837879" version="1" comment="pcs-snmp is &lt;0.10.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837880" version="1" comment="python3-pillow is &lt;5.1.1-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837881" version="1" comment="python-nose-docs is &lt;1.3.7-31.module+el8.5.0+12207+5c5719bc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837882" version="1" comment="python-pymongo-doc is &lt;3.7.0-1.module+el8.4.0+9670+1849b5f9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837883" version="1" comment="python-sqlalchemy-doc is &lt;1.3.2-2.module+el8.3.0+6646+6b4b10ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837884" version="1" comment="python-virtualenv-doc is &lt;15.1.0-21.module+el8.5.0+12207+5c5719bc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837885" version="1" comment="python3-PyMySQL is &lt;0.10.1-2.module+el8.4.0+9657+a4b6a102 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837886" version="1" comment="python3-bson is &lt;3.7.0-1.module+el8.4.0+9670+1849b5f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837887" version="1" comment="python3-distro is &lt;1.4.0-2.module+el8.1.0+3334+5cb623d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837888" version="1" comment="python3-docs is &lt;3.6.7-2.module+el8.1.0+3334+5cb623d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837889" version="1" comment="python3-docutils is &lt;0.14-12.module+el8.1.0+3334+5cb623d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837890" version="1" comment="python3-nose is &lt;1.3.7-31.module+el8.5.0+12207+5c5719bc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837891" version="1" comment="python3-pygments is &lt;2.2.0-22.module+el8.5.0+10789+e4939b94 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837892" version="1" comment="python3-pymongo is &lt;3.7.0-1.module+el8.4.0+9670+1849b5f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837893" version="1" comment="python3-pymongo-gridfs is &lt;3.7.0-1.module+el8.4.0+9670+1849b5f9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837894" version="1" comment="python3-scipy is &lt;1.0.0-21.module+el8.5.0+10916+41bd434d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837895" version="1" comment="python3-sqlalchemy is &lt;1.3.2-2.module+el8.3.0+6646+6b4b10ec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837896" version="1" comment="python3-virtualenv is &lt;15.1.0-21.module+el8.5.0+12207+5c5719bc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837897" version="1" comment="python3-wheel is &lt;0.31.1-3.module+el8.5.0+12207+5c5719bc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837898" version="1" comment="python3-wheel-wheel is &lt;0.31.1-3.module+el8.5.0+12207+5c5719bc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837899" version="1" comment="python36 is &lt;3.6.8-38.module+el8.5.0+12207+5c5719bc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837900" version="1" comment="python36-debug is &lt;3.6.8-38.module+el8.5.0+12207+5c5719bc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837901" version="1" comment="python36-devel is &lt;3.6.8-38.module+el8.5.0+12207+5c5719bc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837902" version="1" comment="python36-rpm-macros is &lt;3.6.8-38.module+el8.5.0+12207+5c5719bc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837903" version="1" comment="babel is &lt;2.5.1-10.module+el8.5.0+11014+88fc0d0b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837904" version="1" comment="python-nose-docs is &lt;1.3.7-31.module+el8.5.0+12203+77770ab7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837905" version="1" comment="python2 is &lt;2.7.18-7.module+el8.5.0+12203+77770ab7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837906" version="1" comment="python2-babel is &lt;2.5.1-10.module+el8.5.0+11014+88fc0d0b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837907" version="1" comment="python2-bson is &lt;3.7.0-1.module+el8.5.0+10264+e5753a40 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837908" version="1" comment="python2-debug is &lt;2.7.18-7.module+el8.5.0+12203+77770ab7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837909" version="1" comment="python2-devel is &lt;2.7.18-7.module+el8.5.0+12203+77770ab7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837910" version="1" comment="python2-jinja2 is &lt;2.10-9.module+el8.5.0+10541+706bb066 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837911" version="1" comment="python2-libs is &lt;2.7.18-7.module+el8.5.0+12203+77770ab7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837912" version="1" comment="python2-lxml is &lt;4.2.3-5.module+el8.5.0+10534+22332931 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837913" version="1" comment="python2-nose is &lt;1.3.7-31.module+el8.5.0+12203+77770ab7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837914" version="1" comment="python2-pygments is &lt;2.2.0-22.module+el8.5.0+10788+a4cea9e0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837915" version="1" comment="python2-pymongo is &lt;3.7.0-1.module+el8.5.0+10264+e5753a40 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837916" version="1" comment="python2-pymongo-gridfs is &lt;3.7.0-1.module+el8.5.0+10264+e5753a40 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837917" version="1" comment="python2-scipy is &lt;1.0.0-21.module+el8.5.0+10858+05337455 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837918" version="1" comment="python2-test is &lt;2.7.18-7.module+el8.5.0+12203+77770ab7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837919" version="1" comment="python2-tkinter is &lt;2.7.18-7.module+el8.5.0+12203+77770ab7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837920" version="1" comment="python2-tools is &lt;2.7.18-7.module+el8.5.0+12203+77770ab7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837921" version="1" comment="python2-virtualenv is &lt;15.1.0-21.module+el8.5.0+12203+77770ab7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837922" version="1" comment="python2-wheel is &lt;0.31.1-3.module+el8.5.0+12203+77770ab7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837923" version="1" comment="python2-wheel-wheel is &lt;0.31.1-3.module+el8.5.0+12203+77770ab7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837924" version="1" comment="dnsmasq is &lt;2.79-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837925" version="1" comment="dnsmasq-utils is &lt;2.79-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837926" version="1" comment="buildah is &lt;1.22.3-2.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837927" version="1" comment="buildah-tests is &lt;1.22.3-2.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837928" version="1" comment="cockpit-podman is &lt;33-1.module+el8.5.0+12582+56d94c81 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837929" version="1" comment="conmon is &lt;2.0.29-1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837930" version="1" comment="container-selinux is &lt;2.167.0-1.module+el8.5.0+12582+56d94c81 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837931" version="1" comment="containernetworking-plugins is &lt;1.0.0-1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837932" version="1" comment="containers-common is &lt;1-2.module+el8.5.0+12582+56d94c81 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837933" version="1" comment="crit is &lt;3.15-3.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837934" version="1" comment="criu is &lt;3.15-3.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837935" version="1" comment="criu-devel is &lt;3.15-3.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837936" version="1" comment="criu-libs is &lt;3.15-3.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837937" version="1" comment="crun is &lt;1.0-1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837938" version="1" comment="fuse-overlayfs is &lt;1.7.1-1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837939" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837940" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837941" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.3-3.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837942" version="1" comment="podman is &lt;3.3.1-9.module+el8.5.0+12697+018f24d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837943" version="1" comment="podman-catatonit is &lt;3.3.1-9.module+el8.5.0+12697+018f24d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837944" version="1" comment="podman-docker is &lt;3.3.1-9.module+el8.5.0+12697+018f24d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837945" version="1" comment="podman-gvproxy is &lt;3.3.1-9.module+el8.5.0+12697+018f24d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837946" version="1" comment="podman-plugins is &lt;3.3.1-9.module+el8.5.0+12697+018f24d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837947" version="1" comment="podman-remote is &lt;3.3.1-9.module+el8.5.0+12697+018f24d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837948" version="1" comment="podman-tests is &lt;3.3.1-9.module+el8.5.0+12697+018f24d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837949" version="1" comment="python3-criu is &lt;3.15-3.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837950" version="1" comment="python3-podman is &lt;3.2.0-2.module+el8.5.0+12582+56d94c81 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837951" version="1" comment="runc is &lt;1.0.2-1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837952" version="1" comment="skopeo is &lt;1.4.2-0.1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837953" version="1" comment="skopeo-tests is &lt;1.4.2-0.1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837954" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.5.0+12582+56d94c81 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837955" version="1" comment="toolbox is &lt;0.0.99.3-0.4.module+el8.5.0+12682+a4eeb084 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837956" version="1" comment="toolbox-tests is &lt;0.0.99.3-0.4.module+el8.5.0+12682+a4eeb084 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837957" version="1" comment="udica is &lt;0.2.5-2.module+el8.5.0+12582+56d94c81 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837958" version="1" comment="delve is &lt;1.6.0-1.module+el8.5.0+10379+d6b83bd0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837959" version="1" comment="go-toolset is &lt;1.16.7-1.module+el8.5.0+12246+1aac4e3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837960" version="1" comment="golang is &lt;1.16.7-1.module+el8.5.0+12246+1aac4e3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837961" version="1" comment="golang-bin is &lt;1.16.7-1.module+el8.5.0+12246+1aac4e3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837962" version="1" comment="golang-docs is &lt;1.16.7-1.module+el8.5.0+12246+1aac4e3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837963" version="1" comment="golang-misc is &lt;1.16.7-1.module+el8.5.0+12246+1aac4e3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837964" version="1" comment="golang-race is &lt;1.16.7-1.module+el8.5.0+12246+1aac4e3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837965" version="1" comment="golang-src is &lt;1.16.7-1.module+el8.5.0+12246+1aac4e3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837966" version="1" comment="golang-tests is &lt;1.16.7-1.module+el8.5.0+12246+1aac4e3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837967" version="1" comment="python3-lxml is &lt;4.2.3-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837968" version="1" comment="python3-jinja2 is &lt;2.10.1-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837969" version="1" comment="adwaita-qt5 is &lt;1.2.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837970" version="1" comment="libadwaita-qt5 is &lt;1.2.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837971" version="1" comment="python-qt5-rpm-macros is &lt;5.15.0-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837972" version="1" comment="python3-pyqt5-sip is &lt;4.19.24-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837973" version="1" comment="python3-qt5 is &lt;5.15.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837974" version="1" comment="python3-qt5-base is &lt;5.15.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837975" version="1" comment="python3-qt5-devel is &lt;5.15.0-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837976" version="1" comment="python3-sip-devel is &lt;4.19.24-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837977" version="1" comment="python3-wx-siplib is &lt;4.19.24-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837978" version="1" comment="qgnomeplatform is &lt;0.7.1-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837979" version="1" comment="qt5-assistant is &lt;5.15.2-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837980" version="1" comment="qt5-designer is &lt;5.15.2-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837981" version="1" comment="qt5-devel is &lt;5.15.2-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837982" version="1" comment="qt5-doctools is &lt;5.15.2-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837983" version="1" comment="qt5-linguist is &lt;5.15.2-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837984" version="1" comment="qt5-qdbusviewer is &lt;5.15.2-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837985" version="1" comment="qt5-qt3d is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837986" version="1" comment="qt5-qt3d-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837987" version="1" comment="qt5-qt3d-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837988" version="1" comment="qt5-qtbase is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837989" version="1" comment="qt5-qtbase-common is &lt;5.15.2-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837990" version="1" comment="qt5-qtbase-devel is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837991" version="1" comment="qt5-qtbase-examples is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837992" version="1" comment="qt5-qtbase-gui is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837993" version="1" comment="qt5-qtbase-mysql is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837994" version="1" comment="qt5-qtbase-odbc is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837995" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837996" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837997" version="1" comment="qt5-qtbase-static is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837998" version="1" comment="qt5-qtcanvas3d is &lt;5.12.5-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009837999" version="1" comment="qt5-qtcanvas3d-examples is &lt;5.12.5-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838000" version="1" comment="qt5-qtconnectivity is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838001" version="1" comment="qt5-qtconnectivity-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838002" version="1" comment="qt5-qtconnectivity-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838003" version="1" comment="qt5-qtdeclarative is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838004" version="1" comment="qt5-qtdeclarative-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838005" version="1" comment="qt5-qtdeclarative-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838006" version="1" comment="qt5-qtdeclarative-static is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838007" version="1" comment="qt5-qtdoc is &lt;5.15.2-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838008" version="1" comment="qt5-qtgraphicaleffects is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838009" version="1" comment="qt5-qtimageformats is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838010" version="1" comment="qt5-qtlocation is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838011" version="1" comment="qt5-qtlocation-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838012" version="1" comment="qt5-qtlocation-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838013" version="1" comment="qt5-qtmultimedia is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838014" version="1" comment="qt5-qtmultimedia-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838015" version="1" comment="qt5-qtmultimedia-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838016" version="1" comment="qt5-qtquickcontrols is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838017" version="1" comment="qt5-qtquickcontrols-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838018" version="1" comment="qt5-qtquickcontrols2 is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838019" version="1" comment="qt5-qtquickcontrols2-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838020" version="1" comment="qt5-qtquickcontrols2-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838021" version="1" comment="qt5-qtscript is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838022" version="1" comment="qt5-qtscript-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838023" version="1" comment="qt5-qtscript-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838024" version="1" comment="qt5-qtsensors is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838025" version="1" comment="qt5-qtsensors-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838026" version="1" comment="qt5-qtsensors-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838027" version="1" comment="qt5-qtserialbus is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838028" version="1" comment="qt5-qtserialbus-devel is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838029" version="1" comment="qt5-qtserialbus-examples is &lt;5.15.2-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838030" version="1" comment="qt5-qtserialport is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838031" version="1" comment="qt5-qtserialport-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838032" version="1" comment="qt5-qtserialport-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838033" version="1" comment="qt5-qtsvg is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838034" version="1" comment="qt5-qtsvg-devel is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838035" version="1" comment="qt5-qtsvg-examples is &lt;5.15.2-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838036" version="1" comment="qt5-qttools is &lt;5.15.2-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838037" version="1" comment="qt5-qttools-common is &lt;5.15.2-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838038" version="1" comment="qt5-qttools-devel is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838039" version="1" comment="qt5-qttools-examples is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838040" version="1" comment="qt5-qttools-libs-designer is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838041" version="1" comment="qt5-qttools-libs-designercomponents is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838042" version="1" comment="qt5-qttools-libs-help is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838043" version="1" comment="qt5-qttools-static is &lt;5.15.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838044" version="1" comment="qt5-qttranslations is &lt;5.15.2-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838045" version="1" comment="qt5-qtwayland is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838046" version="1" comment="qt5-qtwayland-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838047" version="1" comment="qt5-qtwayland-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838048" version="1" comment="qt5-qtwebchannel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838049" version="1" comment="qt5-qtwebchannel-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838050" version="1" comment="qt5-qtwebchannel-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838051" version="1" comment="qt5-qtwebsockets is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838052" version="1" comment="qt5-qtwebsockets-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838053" version="1" comment="qt5-qtwebsockets-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838054" version="1" comment="qt5-qtx11extras is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838055" version="1" comment="qt5-qtx11extras-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838056" version="1" comment="qt5-qtxmlpatterns is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838057" version="1" comment="qt5-qtxmlpatterns-devel is &lt;5.15.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838058" version="1" comment="qt5-qtxmlpatterns-examples is &lt;5.15.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838059" version="1" comment="qt5-rpm-macros is &lt;5.15.2-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838060" version="1" comment="qt5-srpm-macros is &lt;5.15.2-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838061" version="1" comment="sip is &lt;4.19.24-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838062" version="1" comment="exiv2 is &lt;0.27.4-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838063" version="1" comment="exiv2-devel is &lt;0.27.4-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838064" version="1" comment="exiv2-doc is &lt;0.27.4-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838065" version="1" comment="exiv2-libs is &lt;0.27.4-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838066" version="1" comment="file-roller is &lt;3.28.1-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838067" version="1" comment="mutt is &lt;2.0.7-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838068" version="1" comment="edk2-ovmf is &lt;20210527gite1999b264f1f-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838069" version="1" comment="python3-babel is &lt;2.5.1-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838070" version="1" comment="apcu-panel is &lt;5.1.18-1.module+el8.3.0+6678+b09f589e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838071" version="1" comment="libzip is &lt;1.6.1-1.module+el8.3.0+6678+b09f589e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838072" version="1" comment="libzip-devel is &lt;1.6.1-1.module+el8.3.0+6678+b09f589e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838073" version="1" comment="libzip-tools is &lt;1.6.1-1.module+el8.3.0+6678+b09f589e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838074" version="1" comment="php is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838075" version="1" comment="php-bcmath is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838076" version="1" comment="php-cli is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838077" version="1" comment="php-common is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838078" version="1" comment="php-dba is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838079" version="1" comment="php-dbg is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838080" version="1" comment="php-devel is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838081" version="1" comment="php-embedded is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838082" version="1" comment="php-enchant is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838083" version="1" comment="php-ffi is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838084" version="1" comment="php-fpm is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838085" version="1" comment="php-gd is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838086" version="1" comment="php-gmp is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838087" version="1" comment="php-intl is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838088" version="1" comment="php-json is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838089" version="1" comment="php-ldap is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838090" version="1" comment="php-mbstring is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838091" version="1" comment="php-mysqlnd is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838092" version="1" comment="php-odbc is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838093" version="1" comment="php-opcache is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838094" version="1" comment="php-pdo is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838095" version="1" comment="php-pear is &lt;1.10.12-1.module+el8.3.0+6678+b09f589e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838096" version="1" comment="php-pecl-apcu is &lt;5.1.18-1.module+el8.3.0+6678+b09f589e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838097" version="1" comment="php-pecl-apcu-devel is &lt;5.1.18-1.module+el8.3.0+6678+b09f589e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838098" version="1" comment="php-pecl-rrd is &lt;2.0.1-1.module+el8.3.0+6678+b09f589e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838099" version="1" comment="php-pecl-xdebug is &lt;2.9.5-1.module+el8.3.0+6678+b09f589e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838100" version="1" comment="php-pecl-zip is &lt;1.18.2-1.module+el8.3.0+6678+b09f589e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838101" version="1" comment="php-pgsql is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838102" version="1" comment="php-process is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838103" version="1" comment="php-snmp is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838104" version="1" comment="php-soap is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838105" version="1" comment="php-xml is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838106" version="1" comment="php-xmlrpc is &lt;7.4.19-1.module+el8.5.0+11143+cc873159 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838107" version="1" comment="buildah is &lt;1.11.6-9.module+el8.5.0+12239+ec01067b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838108" version="1" comment="buildah-tests is &lt;1.11.6-9.module+el8.5.0+12239+ec01067b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838109" version="1" comment="cockpit-podman is &lt;11-1.module+el8.5.0+10223+f7559c42 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838110" version="1" comment="conmon is &lt;2.0.15-1.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838111" version="1" comment="container-selinux is &lt;2.130.0-1.module+el8.5.0+10223+f7559c42 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838112" version="1" comment="containernetworking-plugins is &lt;0.8.3-4.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838113" version="1" comment="containers-common is &lt;0.1.41-4.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838114" version="1" comment="crit is &lt;3.12-9.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838115" version="1" comment="criu is &lt;3.12-9.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838116" version="1" comment="fuse-overlayfs is &lt;0.7.8-1.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838117" version="1" comment="podman is &lt;1.6.4-26.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838118" version="1" comment="podman-docker is &lt;1.6.4-26.module+el8.5.0+10223+f7559c42 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838119" version="1" comment="podman-remote is &lt;1.6.4-26.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838120" version="1" comment="podman-tests is &lt;1.6.4-26.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838121" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.5.0+10223+f7559c42 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838122" version="1" comment="python3-criu is &lt;3.12-9.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838123" version="1" comment="runc is &lt;1.0.0-66.rc10.module+el8.5.0+11041+627a5cdc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838124" version="1" comment="skopeo is &lt;0.1.41-4.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838125" version="1" comment="skopeo-tests is &lt;0.1.41-4.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838126" version="1" comment="slirp4netns is &lt;0.4.2-3.git21fdece.module+el8.5.0+10223+f7559c42 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838127" version="1" comment="toolbox is &lt;0.0.7-1.module+el8.5.0+10223+f7559c42 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838128" version="1" comment="udica is &lt;0.2.1-2.module+el8.5.0+10223+f7559c42 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838135" version="1" comment="containers-common is &lt;1.2.2-10.module+el8.5.0+11808+4e1db630 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838143" version="1" comment="podman is &lt;3.0.1-6.module+el8.5.0+12609+beaa716d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838144" version="1" comment="podman-catatonit is &lt;3.0.1-6.module+el8.5.0+12609+beaa716d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838145" version="1" comment="podman-docker is &lt;3.0.1-6.module+el8.5.0+12609+beaa716d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838146" version="1" comment="podman-plugins is &lt;3.0.1-6.module+el8.5.0+12609+beaa716d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838147" version="1" comment="podman-remote is &lt;3.0.1-6.module+el8.5.0+12609+beaa716d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838148" version="1" comment="podman-tests is &lt;3.0.1-6.module+el8.5.0+12609+beaa716d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838151" version="1" comment="skopeo is &lt;1.2.2-10.module+el8.5.0+11808+4e1db630 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838152" version="1" comment="skopeo-tests is &lt;1.2.2-10.module+el8.5.0+11808+4e1db630 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838154" version="1" comment="toolbox is &lt;0.0.99-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838155" version="1" comment="toolbox-tests is &lt;0.0.99-1.module+el8.5.0+10306+3f72d66d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838157" version="1" comment="grafana is &lt;7.5.9-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838158" version="1" comment="libwebp is &lt;1.0.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838159" version="1" comment="libwebp-devel is &lt;1.0.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838160" version="1" comment="jasper-devel is &lt;2.0.14-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838161" version="1" comment="jasper-libs is &lt;2.0.14-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838162" version="1" comment="tcpdump is &lt;4.9.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838163" version="1" comment="libtiff is &lt;4.0.9-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838164" version="1" comment="libtiff-devel is &lt;4.0.9-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838165" version="1" comment="libtiff-tools is &lt;4.0.9-20.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838166" version="1" comment="openjpeg2 is &lt;2.4.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838167" version="1" comment="openjpeg2-devel is &lt;2.4.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838168" version="1" comment="openjpeg2-devel-docs is &lt;2.4.0-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838169" version="1" comment="openjpeg2-tools is &lt;2.4.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838170" version="1" comment="graphviz is &lt;2.40.1-43.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838171" version="1" comment="graphviz-devel is &lt;2.40.1-43.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838172" version="1" comment="graphviz-doc is &lt;2.40.1-43.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838173" version="1" comment="graphviz-gd is &lt;2.40.1-43.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838174" version="1" comment="graphviz-python3 is &lt;2.40.1-43.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838175" version="1" comment="httpd is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838176" version="1" comment="httpd-devel is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838177" version="1" comment="httpd-filesystem is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838178" version="1" comment="httpd-manual is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838179" version="1" comment="httpd-tools is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838180" version="1" comment="mod_ldap is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838181" version="1" comment="mod_proxy_html is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838182" version="1" comment="mod_session is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838183" version="1" comment="mod_ssl is &lt;2.4.37-41.module+el8.5.0+11772+c8e0c271 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838184" version="1" comment="cargo is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838185" version="1" comment="cargo-doc is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838186" version="1" comment="clippy is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838187" version="1" comment="rls is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838188" version="1" comment="rust is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838189" version="1" comment="rust-analysis is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838190" version="1" comment="rust-debugger-common is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838191" version="1" comment="rust-doc is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838192" version="1" comment="rust-gdb is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838193" version="1" comment="rust-lldb is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838194" version="1" comment="rust-src is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838195" version="1" comment="rust-std-static is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838196" version="1" comment="rust-std-static-wasm32-unknown-unknown is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838197" version="1" comment="rust-toolset is &lt;1.54.0-1.module+el8.5.0+12195+effd8a03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838198" version="1" comment="rustfmt is &lt;1.54.0-2.module+el8.5.0+12254+dc27bae9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838199" version="1" comment="libjpeg-turbo is &lt;1.5.3-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838200" version="1" comment="libjpeg-turbo-devel is &lt;1.5.3-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838201" version="1" comment="libjpeg-turbo-utils is &lt;1.5.3-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838202" version="1" comment="turbojpeg is &lt;1.5.3-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838203" version="1" comment="turbojpeg-devel is &lt;1.5.3-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838204" version="1" comment="squid is &lt;4.15-1.module+el8.5.0+11469+24c223d9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838205" version="1" comment="spamassassin is &lt;3.4.4-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838206" version="1" comment="zziplib is &lt;0.13.68-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838207" version="1" comment="zziplib-devel is &lt;0.13.68-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838208" version="1" comment="zziplib-utils is &lt;0.13.68-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838209" version="1" comment="compat-exiv2-026 is &lt;0.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838210" version="1" comment="linuxptp is &lt;3.1.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838211" version="1" comment="python3-psutil is &lt;5.4.3-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838212" version="1" comment="lasso is &lt;2.6.0-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838213" version="1" comment="lasso-devel is &lt;2.6.0-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838214" version="1" comment="libX11 is &lt;1.6.8-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838215" version="1" comment="libX11-common is &lt;1.6.8-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838216" version="1" comment="libX11-devel is &lt;1.6.8-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838217" version="1" comment="libX11-xcb is &lt;1.6.8-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838218" version="1" comment="grilo is &lt;0.3.6-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838219" version="1" comment="grilo-devel is &lt;0.3.6-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838220" version="1" comment="bpftool is &lt;4.18.0-348.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838221" version="1" comment="kernel is &lt;4.18.0-348.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838222" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-348.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838223" version="1" comment="kernel-core is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838224" version="1" comment="kernel-cross-headers is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838225" version="1" comment="kernel-debug is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838226" version="1" comment="kernel-debug-core is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838228" version="1" comment="kernel-debug-modules is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838229" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838231" version="1" comment="kernel-doc is &lt;4.18.0-348.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838232" version="1" comment="kernel-headers is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838233" version="1" comment="kernel-modules is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838234" version="1" comment="kernel-modules-extra is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838235" version="1" comment="kernel-tools is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838236" version="1" comment="kernel-tools-libs is &lt;4.18.0-348.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838238" version="1" comment="perf is &lt;4.18.0-348.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838239" version="1" comment="python3-perf is &lt;4.18.0-348.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838240" version="1" comment="compat-libpthread-nonshared is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838241" version="1" comment="glibc is &lt;2.28-164.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838242" version="1" comment="glibc-all-langpacks is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838243" version="1" comment="glibc-benchtests is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838244" version="1" comment="glibc-common is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838245" version="1" comment="glibc-devel is &lt;2.28-164.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838246" version="1" comment="glibc-headers is &lt;2.28-164.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838247" version="1" comment="glibc-langpack-aa is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838248" version="1" comment="glibc-langpack-af is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838249" version="1" comment="glibc-langpack-agr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838250" version="1" comment="glibc-langpack-ak is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838251" version="1" comment="glibc-langpack-am is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838252" version="1" comment="glibc-langpack-an is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838253" version="1" comment="glibc-langpack-anp is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838254" version="1" comment="glibc-langpack-ar is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838255" version="1" comment="glibc-langpack-as is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838256" version="1" comment="glibc-langpack-ast is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838257" version="1" comment="glibc-langpack-ayc is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838258" version="1" comment="glibc-langpack-az is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838259" version="1" comment="glibc-langpack-be is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838260" version="1" comment="glibc-langpack-bem is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838261" version="1" comment="glibc-langpack-ber is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838262" version="1" comment="glibc-langpack-bg is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838263" version="1" comment="glibc-langpack-bhb is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838264" version="1" comment="glibc-langpack-bho is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838265" version="1" comment="glibc-langpack-bi is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838266" version="1" comment="glibc-langpack-bn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838267" version="1" comment="glibc-langpack-bo is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838268" version="1" comment="glibc-langpack-br is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838269" version="1" comment="glibc-langpack-brx is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838270" version="1" comment="glibc-langpack-bs is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838271" version="1" comment="glibc-langpack-byn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838272" version="1" comment="glibc-langpack-ca is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838273" version="1" comment="glibc-langpack-ce is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838274" version="1" comment="glibc-langpack-chr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838275" version="1" comment="glibc-langpack-cmn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838276" version="1" comment="glibc-langpack-crh is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838277" version="1" comment="glibc-langpack-cs is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838278" version="1" comment="glibc-langpack-csb is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838279" version="1" comment="glibc-langpack-cv is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838280" version="1" comment="glibc-langpack-cy is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838281" version="1" comment="glibc-langpack-da is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838282" version="1" comment="glibc-langpack-de is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838283" version="1" comment="glibc-langpack-doi is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838284" version="1" comment="glibc-langpack-dsb is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838285" version="1" comment="glibc-langpack-dv is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838286" version="1" comment="glibc-langpack-dz is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838287" version="1" comment="glibc-langpack-el is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838288" version="1" comment="glibc-langpack-en is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838289" version="1" comment="glibc-langpack-eo is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838290" version="1" comment="glibc-langpack-es is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838291" version="1" comment="glibc-langpack-et is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838292" version="1" comment="glibc-langpack-eu is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838293" version="1" comment="glibc-langpack-fa is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838294" version="1" comment="glibc-langpack-ff is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838295" version="1" comment="glibc-langpack-fi is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838296" version="1" comment="glibc-langpack-fil is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838297" version="1" comment="glibc-langpack-fo is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838298" version="1" comment="glibc-langpack-fr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838299" version="1" comment="glibc-langpack-fur is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838300" version="1" comment="glibc-langpack-fy is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838301" version="1" comment="glibc-langpack-ga is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838302" version="1" comment="glibc-langpack-gd is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838303" version="1" comment="glibc-langpack-gez is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838304" version="1" comment="glibc-langpack-gl is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838305" version="1" comment="glibc-langpack-gu is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838306" version="1" comment="glibc-langpack-gv is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838307" version="1" comment="glibc-langpack-ha is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838308" version="1" comment="glibc-langpack-hak is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838309" version="1" comment="glibc-langpack-he is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838310" version="1" comment="glibc-langpack-hi is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838311" version="1" comment="glibc-langpack-hif is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838312" version="1" comment="glibc-langpack-hne is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838313" version="1" comment="glibc-langpack-hr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838314" version="1" comment="glibc-langpack-hsb is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838315" version="1" comment="glibc-langpack-ht is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838316" version="1" comment="glibc-langpack-hu is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838317" version="1" comment="glibc-langpack-hy is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838318" version="1" comment="glibc-langpack-ia is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838319" version="1" comment="glibc-langpack-id is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838320" version="1" comment="glibc-langpack-ig is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838321" version="1" comment="glibc-langpack-ik is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838322" version="1" comment="glibc-langpack-is is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838323" version="1" comment="glibc-langpack-it is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838324" version="1" comment="glibc-langpack-iu is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838325" version="1" comment="glibc-langpack-ja is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838326" version="1" comment="glibc-langpack-ka is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838327" version="1" comment="glibc-langpack-kab is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838328" version="1" comment="glibc-langpack-kk is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838329" version="1" comment="glibc-langpack-kl is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838330" version="1" comment="glibc-langpack-km is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838331" version="1" comment="glibc-langpack-kn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838332" version="1" comment="glibc-langpack-ko is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838333" version="1" comment="glibc-langpack-kok is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838334" version="1" comment="glibc-langpack-ks is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838335" version="1" comment="glibc-langpack-ku is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838336" version="1" comment="glibc-langpack-kw is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838337" version="1" comment="glibc-langpack-ky is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838338" version="1" comment="glibc-langpack-lb is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838339" version="1" comment="glibc-langpack-lg is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838340" version="1" comment="glibc-langpack-li is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838341" version="1" comment="glibc-langpack-lij is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838342" version="1" comment="glibc-langpack-ln is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838343" version="1" comment="glibc-langpack-lo is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838344" version="1" comment="glibc-langpack-lt is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838345" version="1" comment="glibc-langpack-lv is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838346" version="1" comment="glibc-langpack-lzh is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838347" version="1" comment="glibc-langpack-mag is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838348" version="1" comment="glibc-langpack-mai is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838349" version="1" comment="glibc-langpack-mfe is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838350" version="1" comment="glibc-langpack-mg is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838351" version="1" comment="glibc-langpack-mhr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838352" version="1" comment="glibc-langpack-mi is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838353" version="1" comment="glibc-langpack-miq is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838354" version="1" comment="glibc-langpack-mjw is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838355" version="1" comment="glibc-langpack-mk is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838356" version="1" comment="glibc-langpack-ml is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838357" version="1" comment="glibc-langpack-mn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838358" version="1" comment="glibc-langpack-mni is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838359" version="1" comment="glibc-langpack-mr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838360" version="1" comment="glibc-langpack-ms is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838361" version="1" comment="glibc-langpack-mt is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838362" version="1" comment="glibc-langpack-my is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838363" version="1" comment="glibc-langpack-nan is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838364" version="1" comment="glibc-langpack-nb is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838365" version="1" comment="glibc-langpack-nds is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838366" version="1" comment="glibc-langpack-ne is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838367" version="1" comment="glibc-langpack-nhn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838368" version="1" comment="glibc-langpack-niu is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838369" version="1" comment="glibc-langpack-nl is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838370" version="1" comment="glibc-langpack-nn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838371" version="1" comment="glibc-langpack-nr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838372" version="1" comment="glibc-langpack-nso is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838373" version="1" comment="glibc-langpack-oc is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838374" version="1" comment="glibc-langpack-om is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838375" version="1" comment="glibc-langpack-or is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838376" version="1" comment="glibc-langpack-os is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838377" version="1" comment="glibc-langpack-pa is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838378" version="1" comment="glibc-langpack-pap is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838379" version="1" comment="glibc-langpack-pl is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838380" version="1" comment="glibc-langpack-ps is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838381" version="1" comment="glibc-langpack-pt is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838382" version="1" comment="glibc-langpack-quz is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838383" version="1" comment="glibc-langpack-raj is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838384" version="1" comment="glibc-langpack-ro is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838385" version="1" comment="glibc-langpack-ru is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838386" version="1" comment="glibc-langpack-rw is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838387" version="1" comment="glibc-langpack-sa is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838388" version="1" comment="glibc-langpack-sah is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838389" version="1" comment="glibc-langpack-sat is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838390" version="1" comment="glibc-langpack-sc is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838391" version="1" comment="glibc-langpack-sd is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838392" version="1" comment="glibc-langpack-se is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838393" version="1" comment="glibc-langpack-sgs is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838394" version="1" comment="glibc-langpack-shn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838395" version="1" comment="glibc-langpack-shs is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838396" version="1" comment="glibc-langpack-si is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838397" version="1" comment="glibc-langpack-sid is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838398" version="1" comment="glibc-langpack-sk is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838399" version="1" comment="glibc-langpack-sl is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838400" version="1" comment="glibc-langpack-sm is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838401" version="1" comment="glibc-langpack-so is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838402" version="1" comment="glibc-langpack-sq is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838403" version="1" comment="glibc-langpack-sr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838404" version="1" comment="glibc-langpack-ss is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838405" version="1" comment="glibc-langpack-st is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838406" version="1" comment="glibc-langpack-sv is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838407" version="1" comment="glibc-langpack-sw is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838408" version="1" comment="glibc-langpack-szl is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838409" version="1" comment="glibc-langpack-ta is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838410" version="1" comment="glibc-langpack-tcy is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838411" version="1" comment="glibc-langpack-te is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838412" version="1" comment="glibc-langpack-tg is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838413" version="1" comment="glibc-langpack-th is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838414" version="1" comment="glibc-langpack-the is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838415" version="1" comment="glibc-langpack-ti is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838416" version="1" comment="glibc-langpack-tig is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838417" version="1" comment="glibc-langpack-tk is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838418" version="1" comment="glibc-langpack-tl is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838419" version="1" comment="glibc-langpack-tn is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838420" version="1" comment="glibc-langpack-to is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838421" version="1" comment="glibc-langpack-tpi is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838422" version="1" comment="glibc-langpack-tr is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838423" version="1" comment="glibc-langpack-ts is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838424" version="1" comment="glibc-langpack-tt is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838425" version="1" comment="glibc-langpack-ug is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838426" version="1" comment="glibc-langpack-uk is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838427" version="1" comment="glibc-langpack-unm is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838428" version="1" comment="glibc-langpack-ur is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838429" version="1" comment="glibc-langpack-uz is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838430" version="1" comment="glibc-langpack-ve is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838431" version="1" comment="glibc-langpack-vi is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838432" version="1" comment="glibc-langpack-wa is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838433" version="1" comment="glibc-langpack-wae is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838434" version="1" comment="glibc-langpack-wal is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838435" version="1" comment="glibc-langpack-wo is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838436" version="1" comment="glibc-langpack-xh is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838437" version="1" comment="glibc-langpack-yi is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838438" version="1" comment="glibc-langpack-yo is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838439" version="1" comment="glibc-langpack-yue is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838440" version="1" comment="glibc-langpack-yuw is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838441" version="1" comment="glibc-langpack-zh is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838442" version="1" comment="glibc-langpack-zu is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838443" version="1" comment="glibc-locale-source is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838444" version="1" comment="glibc-minimal-langpack is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838445" version="1" comment="glibc-nss-devel is &lt;2.28-164.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838446" version="1" comment="glibc-static is &lt;2.28-164.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838447" version="1" comment="glibc-utils is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838448" version="1" comment="libnsl is &lt;2.28-164.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838449" version="1" comment="nscd is &lt;2.28-164.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838450" version="1" comment="nss_db is &lt;2.28-164.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838451" version="1" comment="nss_hesiod is &lt;2.28-164.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838452" version="1" comment="NetworkManager is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838453" version="1" comment="NetworkManager-adsl is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838454" version="1" comment="NetworkManager-bluetooth is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838455" version="1" comment="NetworkManager-cloud-setup is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838456" version="1" comment="NetworkManager-config-connectivity-suse is &lt;1.32.10-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838457" version="1" comment="NetworkManager-config-server is &lt;1.32.10-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838458" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.32.10-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838459" version="1" comment="NetworkManager-libnm is &lt;1.32.10-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838460" version="1" comment="NetworkManager-libnm-devel is &lt;1.32.10-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838461" version="1" comment="NetworkManager-ovs is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838462" version="1" comment="NetworkManager-ppp is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838463" version="1" comment="NetworkManager-team is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838464" version="1" comment="NetworkManager-tui is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838465" version="1" comment="NetworkManager-wifi is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838466" version="1" comment="NetworkManager-wwan is &lt;1.32.10-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838467" version="1" comment="binutils is &lt;2.30-108.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838468" version="1" comment="binutils-devel is &lt;2.30-108.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838469" version="1" comment="openssh is &lt;8.0p1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838470" version="1" comment="openssh-askpass is &lt;8.0p1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838471" version="1" comment="openssh-cavs is &lt;8.0p1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838472" version="1" comment="openssh-clients is &lt;8.0p1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838473" version="1" comment="openssh-keycat is &lt;8.0p1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838474" version="1" comment="openssh-ldap is &lt;8.0p1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838475" version="1" comment="openssh-server is &lt;8.0p1-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838476" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838477" version="1" comment="pcre is &lt;8.42-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838478" version="1" comment="pcre-cpp is &lt;8.42-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838479" version="1" comment="pcre-devel is &lt;8.42-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838480" version="1" comment="pcre-static is &lt;8.42-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838481" version="1" comment="pcre-utf16 is &lt;8.42-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838482" version="1" comment="pcre-utf32 is &lt;8.42-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838483" version="1" comment="file is &lt;5.33-20.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838484" version="1" comment="file-devel is &lt;5.33-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838485" version="1" comment="file-libs is &lt;5.33-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838486" version="1" comment="python3-magic is &lt;5.33-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838487" version="1" comment="LibRaw is &lt;0.19.5-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838488" version="1" comment="LibRaw-devel is &lt;0.19.5-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838489" version="1" comment="accountsservice is &lt;0.6.55-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838490" version="1" comment="accountsservice-devel is &lt;0.6.55-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838491" version="1" comment="accountsservice-libs is &lt;0.6.55-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838492" version="1" comment="gdm is &lt;40.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838493" version="1" comment="gnome-autoar is &lt;0.2.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838494" version="1" comment="gnome-calculator is &lt;3.28.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838495" version="1" comment="gnome-classic-session is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838496" version="1" comment="gnome-control-center is &lt;3.28.2-28.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838497" version="1" comment="gnome-control-center-filesystem is &lt;3.28.2-28.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838498" version="1" comment="gnome-online-accounts is &lt;3.28.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838499" version="1" comment="gnome-online-accounts-devel is &lt;3.28.2-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838500" version="1" comment="gnome-session is &lt;3.28.1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838501" version="1" comment="gnome-session-kiosk-session is &lt;3.28.1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838502" version="1" comment="gnome-session-wayland-session is &lt;3.28.1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838503" version="1" comment="gnome-session-xsession is &lt;3.28.1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838504" version="1" comment="gnome-settings-daemon is &lt;3.32.0-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838505" version="1" comment="gnome-shell is &lt;3.32.2-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838506" version="1" comment="gnome-shell-extension-apps-menu is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838507" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838508" version="1" comment="gnome-shell-extension-common is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838509" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838510" version="1" comment="gnome-shell-extension-desktop-icons is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838511" version="1" comment="gnome-shell-extension-disable-screenshield is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838512" version="1" comment="gnome-shell-extension-drive-menu is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838513" version="1" comment="gnome-shell-extension-gesture-inhibitor is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838514" version="1" comment="gnome-shell-extension-horizontal-workspaces is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838515" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838516" version="1" comment="gnome-shell-extension-native-window-placement is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838517" version="1" comment="gnome-shell-extension-no-hot-corner is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838518" version="1" comment="gnome-shell-extension-panel-favorites is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838519" version="1" comment="gnome-shell-extension-places-menu is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838520" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838521" version="1" comment="gnome-shell-extension-systemMonitor is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838522" version="1" comment="gnome-shell-extension-top-icons is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838523" version="1" comment="gnome-shell-extension-updates-dialog is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838524" version="1" comment="gnome-shell-extension-user-theme is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838525" version="1" comment="gnome-shell-extension-window-grouper is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838526" version="1" comment="gnome-shell-extension-window-list is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838527" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838528" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;3.32.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838529" version="1" comment="gnome-software is &lt;3.36.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838530" version="1" comment="gnome-software-devel is &lt;3.36.1-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838531" version="1" comment="gsettings-desktop-schemas is &lt;3.32.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838532" version="1" comment="gsettings-desktop-schemas-devel is &lt;3.32.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838533" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838534" version="1" comment="gtk3 is &lt;3.22.30-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838535" version="1" comment="gtk3-devel is &lt;3.22.30-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838536" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838537" version="1" comment="mutter is &lt;3.32.2-60.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838538" version="1" comment="mutter-devel is &lt;3.32.2-60.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838539" version="1" comment="vino is &lt;3.22.0-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838540" version="1" comment="webkit2gtk3 is &lt;2.32.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838541" version="1" comment="webkit2gtk3-devel is &lt;2.32.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838542" version="1" comment="webkit2gtk3-jsc is &lt;2.32.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838543" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.32.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838544" version="1" comment="json-c is &lt;0.13.1-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838545" version="1" comment="json-c-devel is &lt;0.13.1-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838546" version="1" comment="json-c-doc is &lt;0.13.1-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838547" version="1" comment="bind is &lt;9.11.26-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838548" version="1" comment="bind-chroot is &lt;9.11.26-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838549" version="1" comment="bind-devel is &lt;9.11.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838550" version="1" comment="bind-export-devel is &lt;9.11.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838551" version="1" comment="bind-export-libs is &lt;9.11.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838552" version="1" comment="bind-libs is &lt;9.11.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838553" version="1" comment="bind-libs-lite is &lt;9.11.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838554" version="1" comment="bind-license is &lt;9.11.26-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838555" version="1" comment="bind-lite-devel is &lt;9.11.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838556" version="1" comment="bind-pkcs11 is &lt;9.11.26-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838557" version="1" comment="bind-pkcs11-devel is &lt;9.11.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838558" version="1" comment="bind-pkcs11-libs is &lt;9.11.26-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838559" version="1" comment="bind-pkcs11-utils is &lt;9.11.26-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838560" version="1" comment="bind-sdb is &lt;9.11.26-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838561" version="1" comment="bind-sdb-chroot is &lt;9.11.26-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838562" version="1" comment="bind-utils is &lt;9.11.26-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838563" version="1" comment="python3-bind is &lt;9.11.26-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838564" version="1" comment="glib2 is &lt;2.56.4-156.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838565" version="1" comment="glib2-devel is &lt;2.56.4-156.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838566" version="1" comment="glib2-doc is &lt;2.56.4-156.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838567" version="1" comment="glib2-fam is &lt;2.56.4-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838568" version="1" comment="glib2-static is &lt;2.56.4-156.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838569" version="1" comment="glib2-tests is &lt;2.56.4-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838570" version="1" comment="cpp is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838571" version="1" comment="gcc is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838572" version="1" comment="gcc-c++ is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838573" version="1" comment="gcc-gdb-plugin is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838574" version="1" comment="gcc-gfortran is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838575" version="1" comment="gcc-offload-nvptx is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838576" version="1" comment="gcc-plugin-devel is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838577" version="1" comment="libasan is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838578" version="1" comment="libatomic is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838579" version="1" comment="libatomic-static is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838580" version="1" comment="libgcc is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838581" version="1" comment="libgfortran is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838582" version="1" comment="libgomp is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838583" version="1" comment="libgomp-offload-nvptx is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838584" version="1" comment="libitm is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838585" version="1" comment="libitm-devel is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838586" version="1" comment="liblsan is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838587" version="1" comment="libquadmath is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838588" version="1" comment="libquadmath-devel is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838589" version="1" comment="libstdc++ is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838590" version="1" comment="libstdc++-devel is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838591" version="1" comment="libstdc++-docs is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838592" version="1" comment="libstdc++-static is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838593" version="1" comment="libtsan is &lt;8.5.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838594" version="1" comment="libubsan is &lt;8.5.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838595" version="1" comment="libssh is &lt;0.9.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838596" version="1" comment="libssh-config is &lt;0.9.4-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838597" version="1" comment="libssh-devel is &lt;0.9.4-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838598" version="1" comment="cups is &lt;2.2.6-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838599" version="1" comment="cups-client is &lt;2.2.6-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838600" version="1" comment="cups-devel is &lt;2.2.6-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838601" version="1" comment="cups-filesystem is &lt;2.2.6-40.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838602" version="1" comment="cups-ipptool is &lt;2.2.6-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838603" version="1" comment="cups-libs is &lt;2.2.6-40.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838604" version="1" comment="cups-lpd is &lt;2.2.6-40.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838605" version="1" comment="lemon is &lt;3.26.0-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838606" version="1" comment="sqlite is &lt;3.26.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838607" version="1" comment="sqlite-devel is &lt;3.26.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838608" version="1" comment="sqlite-doc is &lt;3.26.0-15.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838609" version="1" comment="sqlite-libs is &lt;3.26.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838610" version="1" comment="platform-python is &lt;3.6.8-41.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838611" version="1" comment="platform-python-debug is &lt;3.6.8-41.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838612" version="1" comment="platform-python-devel is &lt;3.6.8-41.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838613" version="1" comment="python3-idle is &lt;3.6.8-41.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838614" version="1" comment="python3-libs is &lt;3.6.8-41.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838615" version="1" comment="python3-test is &lt;3.6.8-41.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838616" version="1" comment="python3-tkinter is &lt;3.6.8-41.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838617" version="1" comment="kexec-tools is &lt;2.0.20-57.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838618" version="1" comment="libsolv is &lt;0.7.19-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838619" version="1" comment="libsolv-devel is &lt;0.7.19-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838620" version="1" comment="libsolv-tools is &lt;0.7.19-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838621" version="1" comment="python3-solv is &lt;0.7.19-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838622" version="1" comment="libgcrypt is &lt;1.8.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838623" version="1" comment="libgcrypt-devel is &lt;1.8.5-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838624" version="1" comment="tpm2-tools is &lt;4.1.1-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838625" version="1" comment="openssl is &lt;1.1.1k-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838626" version="1" comment="openssl-devel is &lt;1.1.1k-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838627" version="1" comment="openssl-libs is &lt;1.1.1k-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838628" version="1" comment="openssl-perl is &lt;1.1.1k-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838629" version="1" comment="ncurses is &lt;6.1-9.20180224.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838630" version="1" comment="ncurses-base is &lt;6.1-9.20180224.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838631" version="1" comment="ncurses-c++-libs is &lt;6.1-9.20180224.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838632" version="1" comment="ncurses-compat-libs is &lt;6.1-9.20180224.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838633" version="1" comment="ncurses-devel is &lt;6.1-9.20180224.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838634" version="1" comment="ncurses-libs is &lt;6.1-9.20180224.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838635" version="1" comment="ncurses-term is &lt;6.1-9.20180224.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838636" version="1" comment="bluez is &lt;5.56-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838637" version="1" comment="bluez-cups is &lt;5.56-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838638" version="1" comment="bluez-hid2hci is &lt;5.56-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838639" version="1" comment="bluez-libs is &lt;5.56-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838640" version="1" comment="bluez-libs-devel is &lt;5.56-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838641" version="1" comment="bluez-obexd is &lt;5.56-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838642" version="1" comment="gnutls is &lt;3.6.16-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838643" version="1" comment="gnutls-c++ is &lt;3.6.16-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838644" version="1" comment="gnutls-dane is &lt;3.6.16-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838645" version="1" comment="gnutls-devel is &lt;3.6.16-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838646" version="1" comment="gnutls-utils is &lt;3.6.16-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838647" version="1" comment="nettle is &lt;3.4.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838648" version="1" comment="nettle-devel is &lt;3.4.1-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838649" version="1" comment="platform-python-pip is &lt;9.0.3-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838650" version="1" comment="python3-pip is &lt;9.0.3-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838651" version="1" comment="python3-pip-wheel is &lt;9.0.3-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838652" version="1" comment="dnf is &lt;4.7.0-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838653" version="1" comment="dnf-automatic is &lt;4.7.0-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838654" version="1" comment="dnf-data is &lt;4.7.0-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838655" version="1" comment="dnf-plugins-core is &lt;4.0.21-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838656" version="1" comment="libdnf is &lt;0.63.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838657" version="1" comment="libdnf-devel is &lt;0.63.0-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838658" version="1" comment="python3-dnf is &lt;4.7.0-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838659" version="1" comment="python3-dnf-plugin-post-transaction-actions is &lt;4.0.21-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838660" version="1" comment="python3-dnf-plugin-versionlock is &lt;4.0.21-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838661" version="1" comment="python3-dnf-plugins-core is &lt;4.0.21-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838662" version="1" comment="python3-hawkey is &lt;0.63.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838663" version="1" comment="python3-libdnf is &lt;0.63.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838664" version="1" comment="yum is &lt;4.7.0-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838665" version="1" comment="yum-utils is &lt;4.0.21-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838666" version="1" comment="python3-rpm is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838667" version="1" comment="rpm is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838668" version="1" comment="rpm-apidocs is &lt;4.14.3-19.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838669" version="1" comment="rpm-build is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838670" version="1" comment="rpm-build-libs is &lt;4.14.3-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838671" version="1" comment="rpm-cron is &lt;4.14.3-19.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838672" version="1" comment="rpm-devel is &lt;4.14.3-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838673" version="1" comment="rpm-libs is &lt;4.14.3-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838674" version="1" comment="rpm-plugin-fapolicyd is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838675" version="1" comment="rpm-plugin-ima is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838676" version="1" comment="rpm-plugin-prioreset is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838677" version="1" comment="rpm-plugin-selinux is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838678" version="1" comment="rpm-plugin-syslog is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838679" version="1" comment="rpm-plugin-systemd-inhibit is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838680" version="1" comment="rpm-sign is &lt;4.14.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838681" version="1" comment="lua is &lt;5.3.4-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838682" version="1" comment="lua-devel is &lt;5.3.4-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838683" version="1" comment="lua-libs is &lt;5.3.4-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838684" version="1" comment="curl is &lt;7.61.1-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838685" version="1" comment="libcurl is &lt;7.61.1-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838686" version="1" comment="libcurl-devel is &lt;7.61.1-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838687" version="1" comment="libcurl-minimal is &lt;7.61.1-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838688" version="1" comment="libsepol is &lt;2.9-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838689" version="1" comment="libsepol-devel is &lt;2.9-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838690" version="1" comment="libsepol-static is &lt;2.9-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838691" version="1" comment="vim-X11 is &lt;8.0.1763-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838692" version="1" comment="vim-common is &lt;8.0.1763-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838693" version="1" comment="vim-enhanced is &lt;8.0.1763-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838694" version="1" comment="vim-filesystem is &lt;8.0.1763-16.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838695" version="1" comment="vim-minimal is &lt;8.0.1763-16.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838696" version="1" comment="autotrace is &lt;0.31.1-53.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838697" version="1" comment="httpd is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838698" version="1" comment="httpd-devel is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838699" version="1" comment="httpd-filesystem is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838700" version="1" comment="httpd-manual is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838701" version="1" comment="httpd-tools is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838702" version="1" comment="mod_ldap is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838703" version="1" comment="mod_proxy_html is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838704" version="1" comment="mod_session is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838705" version="1" comment="mod_ssl is &lt;2.4.37-43.module+el8.5.0+13064+c4b14997 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838706" version="1" comment="gcc-toolset-10-gcc is &lt;10.3.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838707" version="1" comment="gcc-toolset-10-gcc-c++ is &lt;10.3.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838708" version="1" comment="gcc-toolset-10-gcc-gdb-plugin is &lt;10.3.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838709" version="1" comment="gcc-toolset-10-gcc-gfortran is &lt;10.3.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838710" version="1" comment="gcc-toolset-10-gcc-plugin-devel is &lt;10.3.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838711" version="1" comment="gcc-toolset-10-libasan-devel is &lt;10.3.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838712" version="1" comment="gcc-toolset-10-libatomic-devel is &lt;10.3.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838713" version="1" comment="gcc-toolset-10-libitm-devel is &lt;10.3.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838714" version="1" comment="gcc-toolset-10-liblsan-devel is &lt;10.3.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838715" version="1" comment="gcc-toolset-10-libquadmath-devel is &lt;10.3.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838716" version="1" comment="gcc-toolset-10-libstdc++-devel is &lt;10.3.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838717" version="1" comment="gcc-toolset-10-libstdc++-docs is &lt;10.3.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838718" version="1" comment="gcc-toolset-10-libtsan-devel is &lt;10.3.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838719" version="1" comment="gcc-toolset-10-libubsan-devel is &lt;10.3.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838720" version="1" comment="libasan6 is &lt;10.3.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838721" version="1" comment="gcc-toolset-11-gcc is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838722" version="1" comment="gcc-toolset-11-gcc-c++ is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838723" version="1" comment="gcc-toolset-11-gcc-gdb-plugin is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838724" version="1" comment="gcc-toolset-11-gcc-gfortran is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838725" version="1" comment="gcc-toolset-11-gcc-plugin-devel is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838726" version="1" comment="gcc-toolset-11-libasan-devel is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838727" version="1" comment="gcc-toolset-11-libatomic-devel is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838728" version="1" comment="gcc-toolset-11-libgccjit is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838729" version="1" comment="gcc-toolset-11-libgccjit-devel is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838730" version="1" comment="gcc-toolset-11-libgccjit-docs is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838731" version="1" comment="gcc-toolset-11-libitm-devel is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838732" version="1" comment="gcc-toolset-11-liblsan-devel is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838733" version="1" comment="gcc-toolset-11-libquadmath-devel is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838734" version="1" comment="gcc-toolset-11-libstdc++-devel is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838735" version="1" comment="gcc-toolset-11-libstdc++-docs is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838736" version="1" comment="gcc-toolset-11-libtsan-devel is &lt;11.2.1-1.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838737" version="1" comment="gcc-toolset-11-libubsan-devel is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838738" version="1" comment="libasan6 is &lt;11.2.1-1.2.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838739" version="1" comment="cpp is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838740" version="1" comment="gcc is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838741" version="1" comment="gcc-c++ is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838742" version="1" comment="gcc-gdb-plugin is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838743" version="1" comment="gcc-gfortran is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838744" version="1" comment="gcc-offload-nvptx is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838745" version="1" comment="gcc-plugin-devel is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838746" version="1" comment="libasan is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838747" version="1" comment="libatomic is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838748" version="1" comment="libatomic-static is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838749" version="1" comment="libgcc is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838750" version="1" comment="libgfortran is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838751" version="1" comment="libgomp is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838752" version="1" comment="libgomp-offload-nvptx is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838753" version="1" comment="libitm is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838754" version="1" comment="libitm-devel is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838755" version="1" comment="liblsan is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838756" version="1" comment="libquadmath is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838757" version="1" comment="libquadmath-devel is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838758" version="1" comment="libstdc++ is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838759" version="1" comment="libstdc++-devel is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838760" version="1" comment="libstdc++-docs is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838761" version="1" comment="libstdc++-static is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838762" version="1" comment="libtsan is &lt;8.5.0-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838763" version="1" comment="libubsan is &lt;8.5.0-4.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838764" version="1" comment="cargo is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838765" version="1" comment="cargo-doc is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838766" version="1" comment="clippy is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838767" version="1" comment="rls is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838768" version="1" comment="rust is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838769" version="1" comment="rust-analysis is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838770" version="1" comment="rust-debugger-common is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838771" version="1" comment="rust-doc is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838772" version="1" comment="rust-gdb is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838773" version="1" comment="rust-lldb is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838774" version="1" comment="rust-src is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838775" version="1" comment="rust-std-static is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838776" version="1" comment="rust-std-static-wasm32-unknown-unknown is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838777" version="1" comment="rustfmt is &lt;1.54.0-3.module+el8.5.0+13074+d655d86c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838778" version="1" comment="gcc-toolset-11-annobin-annocheck is &lt;9.85-1.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838779" version="1" comment="gcc-toolset-11-annobin-docs is &lt;9.85-1.el8_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838780" version="1" comment="gcc-toolset-11-annobin-plugin-gcc is &lt;9.85-1.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838781" version="1" comment="gcc-toolset-10-annobin is &lt;9.29-1.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838782" version="1" comment="annobin is &lt;9.72-1.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838783" version="1" comment="annobin-annocheck is &lt;9.72-1.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838784" version="1" comment="gcc-toolset-11-binutils is &lt;2.36.1-1.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838785" version="1" comment="gcc-toolset-11-binutils-devel is &lt;2.36.1-1.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838786" version="1" comment="binutils is &lt;2.30-108.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838787" version="1" comment="binutils-devel is &lt;2.30-108.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838788" version="1" comment="freerdp is &lt;2.2.0-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838789" version="1" comment="freerdp-devel is &lt;2.2.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838790" version="1" comment="freerdp-libs is &lt;2.2.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838791" version="1" comment="libwinpr is &lt;2.2.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838792" version="1" comment="libwinpr-devel is &lt;2.2.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838793" version="1" comment="bpftool is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838794" version="1" comment="kernel is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838795" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-348.2.1.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838796" version="1" comment="kernel-core is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838797" version="1" comment="kernel-cross-headers is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838798" version="1" comment="kernel-debug is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838799" version="1" comment="kernel-debug-core is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838801" version="1" comment="kernel-debug-modules is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838802" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838804" version="1" comment="kernel-doc is &lt;4.18.0-348.2.1.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838805" version="1" comment="kernel-headers is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838806" version="1" comment="kernel-modules is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838807" version="1" comment="kernel-modules-extra is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838808" version="1" comment="kernel-tools is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838809" version="1" comment="kernel-tools-libs is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838811" version="1" comment="perf is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838812" version="1" comment="python3-perf is &lt;4.18.0-348.2.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838813" version="1" comment="gcc-toolset-10-binutils is &lt;2.35-8.el8_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838814" version="1" comment="gcc-toolset-10-binutils-devel is &lt;2.35-8.el8_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838815" version="1" comment="clang is &lt;12.0.1-4.module+el8.5.0+13246+cefb5d4c for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838816" version="1" comment="clang-analyzer is &lt;12.0.1-4.module+el8.5.0+13246+cefb5d4c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838817" version="1" comment="clang-devel is &lt;12.0.1-4.module+el8.5.0+13246+cefb5d4c for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838818" version="1" comment="clang-libs is &lt;12.0.1-4.module+el8.5.0+13246+cefb5d4c for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838819" version="1" comment="clang-resource-filesystem is &lt;12.0.1-4.module+el8.5.0+13246+cefb5d4c for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838820" version="1" comment="clang-tools-extra is &lt;12.0.1-4.module+el8.5.0+13246+cefb5d4c for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838821" version="1" comment="compiler-rt is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838822" version="1" comment="git-clang-format is &lt;12.0.1-4.module+el8.5.0+13246+cefb5d4c for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838823" version="1" comment="libomp is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838824" version="1" comment="libomp-devel is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838825" version="1" comment="lld is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838826" version="1" comment="lld-devel is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838827" version="1" comment="lld-libs is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838828" version="1" comment="lldb is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838829" version="1" comment="lldb-devel is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838830" version="1" comment="llvm is &lt;12.0.1-2.module+el8.5.0+12488+254d2a07 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838831" version="1" comment="llvm-devel is &lt;12.0.1-2.module+el8.5.0+12488+254d2a07 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838832" version="1" comment="llvm-doc is &lt;12.0.1-2.module+el8.5.0+12488+254d2a07 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838833" version="1" comment="llvm-googletest is &lt;12.0.1-2.module+el8.5.0+12488+254d2a07 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838834" version="1" comment="llvm-libs is &lt;12.0.1-2.module+el8.5.0+12488+254d2a07 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838835" version="1" comment="llvm-static is &lt;12.0.1-2.module+el8.5.0+12488+254d2a07 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838836" version="1" comment="llvm-test is &lt;12.0.1-2.module+el8.5.0+12488+254d2a07 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838837" version="1" comment="llvm-toolset is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838838" version="1" comment="python3-clang is &lt;12.0.1-4.module+el8.5.0+13246+cefb5d4c for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838839" version="1" comment="python3-lit is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838840" version="1" comment="python3-lldb is &lt;12.0.1-1.module+el8.5.0+11871+08d0eab5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838841" version="1" comment="mailman is &lt;2.1.29-12.module+el8.5.0+13211+e8845b76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838842" version="1" comment="nss is &lt;3.67.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838843" version="1" comment="nss-devel is &lt;3.67.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838844" version="1" comment="nss-softokn is &lt;3.67.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838845" version="1" comment="nss-softokn-devel is &lt;3.67.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838846" version="1" comment="nss-softokn-freebl is &lt;3.67.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838847" version="1" comment="nss-softokn-freebl-devel is &lt;3.67.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838848" version="1" comment="nss-sysinit is &lt;3.67.0-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838849" version="1" comment="nss-tools is &lt;3.67.0-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838850" version="1" comment="nss-util is &lt;3.67.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838851" version="1" comment="nss-util-devel is &lt;3.67.0-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838852" version="1" comment="mailman is &lt;2.1.29-12.module+el8.5.0+13466+327eb9f3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838853" version="1" comment="firefox is &lt;91.4.0-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838854" version="1" comment="thunderbird is &lt;91.4.0-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838855" version="1" comment="ctdb is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838856" version="1" comment="libsmbclient is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838857" version="1" comment="libsmbclient-devel is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838858" version="1" comment="libwbclient is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838859" version="1" comment="libwbclient-devel is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838860" version="1" comment="python3-samba is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838861" version="1" comment="python3-samba-test is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838862" version="1" comment="samba is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838863" version="1" comment="samba-client is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838864" version="1" comment="samba-client-libs is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838865" version="1" comment="samba-common is &lt;4.14.5-7.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838866" version="1" comment="samba-common-libs is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838867" version="1" comment="samba-common-tools is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838868" version="1" comment="samba-devel is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838869" version="1" comment="samba-krb5-printing is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838870" version="1" comment="samba-libs is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838871" version="1" comment="samba-pidl is &lt;4.14.5-7.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838872" version="1" comment="samba-test is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838873" version="1" comment="samba-test-libs is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838874" version="1" comment="samba-vfs-iouring is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838875" version="1" comment="samba-winbind is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838876" version="1" comment="samba-winbind-clients is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838877" version="1" comment="samba-winbind-krb5-locator is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838878" version="1" comment="samba-winbind-modules is &lt;4.14.5-7.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838879" version="1" comment="samba-winexe is &lt;4.14.5-7.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838880" version="1" comment="ipa-client is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838881" version="1" comment="ipa-client-common is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838882" version="1" comment="ipa-client-epn is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838883" version="1" comment="ipa-client-samba is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838884" version="1" comment="ipa-common is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838885" version="1" comment="ipa-healthcheck is &lt;0.7-6.module+el8.5.0+11410+91a33fe4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838886" version="1" comment="ipa-python-compat is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838887" version="1" comment="ipa-selinux is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838888" version="1" comment="ipa-server is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838889" version="1" comment="ipa-server-common is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838890" version="1" comment="ipa-server-dns is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838891" version="1" comment="ipa-server-trust-ad is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838892" version="1" comment="python3-ipaclient is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838893" version="1" comment="python3-ipalib is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838894" version="1" comment="python3-ipaserver is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838895" version="1" comment="python3-ipatests is &lt;4.9.6-10.module+el8.5.0+13587+92118e57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838896" version="1" comment="slapi-nis is &lt;0.56.6-4.module+el8.5.0+12583+bf7ffcf6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838897" version="1" comment="go-toolset is &lt;1.16.12-1.module+el8.5.0+13637+960c7771 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838898" version="1" comment="golang is &lt;1.16.12-1.module+el8.5.0+13637+960c7771 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838899" version="1" comment="golang-bin is &lt;1.16.12-1.module+el8.5.0+13637+960c7771 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838900" version="1" comment="golang-docs is &lt;1.16.12-1.module+el8.5.0+13637+960c7771 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838901" version="1" comment="golang-misc is &lt;1.16.12-1.module+el8.5.0+13637+960c7771 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838902" version="1" comment="golang-race is &lt;1.16.12-1.module+el8.5.0+13637+960c7771 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838903" version="1" comment="golang-src is &lt;1.16.12-1.module+el8.5.0+13637+960c7771 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838904" version="1" comment="golang-tests is &lt;1.16.12-1.module+el8.5.0+13637+960c7771 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838905" version="1" comment="nodejs is &lt;16.13.1-3.module+el8.5.0+13548+45d748af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838906" version="1" comment="nodejs-devel is &lt;16.13.1-3.module+el8.5.0+13548+45d748af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838907" version="1" comment="nodejs-docs is &lt;16.13.1-3.module+el8.5.0+13548+45d748af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838908" version="1" comment="nodejs-full-i18n is &lt;16.13.1-3.module+el8.5.0+13548+45d748af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838909" version="1" comment="nodejs-nodemon is &lt;2.0.15-1.module+el8.5.0+13548+45d748af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838910" version="1" comment="nodejs-packaging is &lt;25-1.module+el8.5.0+10992+fac5fe06 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838911" version="1" comment="npm is &lt;8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838912" version="1" comment="openssl is &lt;1.1.1k-5.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838913" version="1" comment="openssl-devel is &lt;1.1.1k-5.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838914" version="1" comment="openssl-libs is &lt;1.1.1k-5.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838915" version="1" comment="openssl-perl is &lt;1.1.1k-5.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838916" version="1" comment="bpftool is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838917" version="1" comment="kernel is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838918" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-348.7.1.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838919" version="1" comment="kernel-core is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838920" version="1" comment="kernel-cross-headers is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838921" version="1" comment="kernel-debug is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838922" version="1" comment="kernel-debug-core is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838924" version="1" comment="kernel-debug-modules is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838925" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838927" version="1" comment="kernel-doc is &lt;4.18.0-348.7.1.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838928" version="1" comment="kernel-headers is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838929" version="1" comment="kernel-modules is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838930" version="1" comment="kernel-modules-extra is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838931" version="1" comment="kernel-tools is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838932" version="1" comment="kernel-tools-libs is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838934" version="1" comment="perf is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838935" version="1" comment="python3-perf is &lt;4.18.0-348.7.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838936" version="1" comment="pg_repack is &lt;1.4.6-3.module+el8.5.0+11354+78b3c9c5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838937" version="1" comment="pgaudit is &lt;1.4.0-5.module+el8.5.0+11354+78b3c9c5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838938" version="1" comment="postgres-decoderbufs is &lt;0.10.0-2.module+el8.5.0+11354+78b3c9c5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838939" version="1" comment="postgresql is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838940" version="1" comment="postgresql-contrib is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838941" version="1" comment="postgresql-docs is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838942" version="1" comment="postgresql-plperl is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838943" version="1" comment="postgresql-plpython3 is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838944" version="1" comment="postgresql-pltcl is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838945" version="1" comment="postgresql-server is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838946" version="1" comment="postgresql-server-devel is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838947" version="1" comment="postgresql-static is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838948" version="1" comment="postgresql-test is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838949" version="1" comment="postgresql-test-rpm-macros is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838950" version="1" comment="postgresql-upgrade is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838951" version="1" comment="postgresql-upgrade-devel is &lt;12.9-1.module+el8.5.0+13373+4554acc4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838952" version="1" comment="pg_repack is &lt;1.4.6-3.module+el8.5.0+11357+bcc62552 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838953" version="1" comment="postgresql is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838954" version="1" comment="postgresql-contrib is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838955" version="1" comment="postgresql-docs is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838956" version="1" comment="postgresql-plperl is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838957" version="1" comment="postgresql-plpython3 is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838958" version="1" comment="postgresql-pltcl is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838959" version="1" comment="postgresql-server is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838960" version="1" comment="postgresql-server-devel is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838961" version="1" comment="postgresql-static is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838962" version="1" comment="postgresql-test is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838963" version="1" comment="postgresql-test-rpm-macros is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838964" version="1" comment="postgresql-upgrade is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838965" version="1" comment="postgresql-upgrade-devel is &lt;13.5-1.module+el8.5.0+13344+8c0fd184 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838966" version="1" comment="grafana is &lt;7.5.9-5.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838967" version="1" comment="thunderbird is &lt;91.5.0-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838968" version="1" comment="firefox is &lt;91.5.0-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838969" version="1" comment="java-17-openjdk is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838970" version="1" comment="java-17-openjdk-demo is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838971" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838972" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838973" version="1" comment="java-17-openjdk-devel is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838974" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838975" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838976" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838977" version="1" comment="java-17-openjdk-headless is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838978" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838979" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838980" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838981" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838982" version="1" comment="java-17-openjdk-jmods is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838983" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838984" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838985" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838986" version="1" comment="java-17-openjdk-src is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838987" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838988" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838989" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838990" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838991" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.2.0.8-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838992" version="1" comment="gegl04 is &lt;0.4.4-6.el8_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838993" version="1" comment="java-11-openjdk is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838994" version="1" comment="java-11-openjdk-demo is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838995" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838996" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838997" version="1" comment="java-11-openjdk-devel is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838998" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009838999" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839000" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839001" version="1" comment="java-11-openjdk-headless is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839002" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839003" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839004" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839005" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839006" version="1" comment="java-11-openjdk-jmods is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839007" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839008" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839009" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839010" version="1" comment="java-11-openjdk-src is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839011" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839012" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839013" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839014" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839015" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.14.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839016" version="1" comment="bpftool is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839017" version="1" comment="kernel is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839018" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-348.12.2.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839019" version="1" comment="kernel-core is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839020" version="1" comment="kernel-cross-headers is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839021" version="1" comment="kernel-debug is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839022" version="1" comment="kernel-debug-core is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839024" version="1" comment="kernel-debug-modules is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839025" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839027" version="1" comment="kernel-doc is &lt;4.18.0-348.12.2.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839028" version="1" comment="kernel-headers is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839029" version="1" comment="kernel-modules is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839030" version="1" comment="kernel-modules-extra is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839031" version="1" comment="kernel-tools is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839032" version="1" comment="kernel-tools-libs is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839034" version="1" comment="perf is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839035" version="1" comment="python3-perf is &lt;4.18.0-348.12.2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839036" version="1" comment="libreswan is &lt;4.4-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839037" version="1" comment="polkit is &lt;0.115-13.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839038" version="1" comment="polkit-devel is &lt;0.115-13.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839039" version="1" comment="polkit-docs is &lt;0.115-13.el8_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839040" version="1" comment="polkit-libs is &lt;0.115-13.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839041" version="1" comment="parfait is &lt;0.5.4-4.module+el8.5.0+13988+de2b8c0b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839042" version="1" comment="parfait-examples is &lt;0.5.4-4.module+el8.5.0+13988+de2b8c0b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839043" version="1" comment="parfait-javadoc is &lt;0.5.4-4.module+el8.5.0+13988+de2b8c0b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839044" version="1" comment="pcp-parfait-agent is &lt;0.5.4-4.module+el8.5.0+13988+de2b8c0b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839045" version="1" comment="si-units is &lt;0.6.5-2.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839046" version="1" comment="si-units-javadoc is &lt;0.6.5-2.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839047" version="1" comment="unit-api is &lt;1.0-5.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839048" version="1" comment="unit-api-javadoc is &lt;1.0-5.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839049" version="1" comment="uom-lib is &lt;1.0.1-6.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839050" version="1" comment="uom-lib-javadoc is &lt;1.0.1-6.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839051" version="1" comment="uom-parent is &lt;1.0.3-3.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839052" version="1" comment="uom-se is &lt;1.0.4-3.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839053" version="1" comment="uom-se-javadoc is &lt;1.0.4-3.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839054" version="1" comment="uom-systems is &lt;0.7-1.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839055" version="1" comment="uom-systems-javadoc is &lt;0.7-1.module+el8+2463+615f6896 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839056" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839057" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839058" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839059" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839060" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839061" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839062" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839063" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839064" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839065" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839066" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839067" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839068" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839069" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839070" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.322.b06-2.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839071" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.322.b06-2.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839072" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839073" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839074" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839075" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.322.b06-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839076" version="1" comment="nginx is &lt;1.20.1-1.module+el8.5.0+13723+ab304644 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839077" version="1" comment="nginx-all-modules is &lt;1.20.1-1.module+el8.5.0+13723+ab304644 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839078" version="1" comment="nginx-filesystem is &lt;1.20.1-1.module+el8.5.0+13723+ab304644 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839079" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-1.module+el8.5.0+13723+ab304644 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839080" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-1.module+el8.5.0+13723+ab304644 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839081" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-1.module+el8.5.0+13723+ab304644 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839082" version="1" comment="nginx-mod-mail is &lt;1.20.1-1.module+el8.5.0+13723+ab304644 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839083" version="1" comment="nginx-mod-stream is &lt;1.20.1-1.module+el8.5.0+13723+ab304644 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839084" version="1" comment="ctdb is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839085" version="1" comment="libsmbclient is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839086" version="1" comment="libsmbclient-devel is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839087" version="1" comment="libwbclient is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839088" version="1" comment="libwbclient-devel is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839089" version="1" comment="python3-samba is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839090" version="1" comment="python3-samba-test is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839091" version="1" comment="samba is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839092" version="1" comment="samba-client is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839093" version="1" comment="samba-client-libs is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839094" version="1" comment="samba-common is &lt;4.14.5-9.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839095" version="1" comment="samba-common-libs is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839096" version="1" comment="samba-common-tools is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839097" version="1" comment="samba-devel is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839098" version="1" comment="samba-krb5-printing is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839099" version="1" comment="samba-libs is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839100" version="1" comment="samba-pidl is &lt;4.14.5-9.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839101" version="1" comment="samba-test is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839102" version="1" comment="samba-test-libs is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839103" version="1" comment="samba-vfs-iouring is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839104" version="1" comment="samba-winbind is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839105" version="1" comment="samba-winbind-clients is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839106" version="1" comment="samba-winbind-krb5-locator is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839107" version="1" comment="samba-winbind-modules is &lt;4.14.5-9.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839108" version="1" comment="samba-winexe is &lt;4.14.5-9.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839109" version="1" comment="nodejs is &lt;14.18.2-2.module+el8.5.0+13644+8d46dafd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839110" version="1" comment="nodejs-devel is &lt;14.18.2-2.module+el8.5.0+13644+8d46dafd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839111" version="1" comment="nodejs-docs is &lt;14.18.2-2.module+el8.5.0+13644+8d46dafd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839112" version="1" comment="nodejs-full-i18n is &lt;14.18.2-2.module+el8.5.0+13644+8d46dafd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839113" version="1" comment="nodejs-nodemon is &lt;2.0.15-1.module+el8.5.0+13504+a2e74d91 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839114" version="1" comment="npm is &lt;6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839115" version="1" comment="vim-X11 is &lt;8.0.1763-16.el8_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839116" version="1" comment="vim-common is &lt;8.0.1763-16.el8_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839117" version="1" comment="vim-enhanced is &lt;8.0.1763-16.el8_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839118" version="1" comment="vim-filesystem is &lt;8.0.1763-16.el8_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839119" version="1" comment="vim-minimal is &lt;8.0.1763-16.el8_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839120" version="1" comment="python3-rpm is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839121" version="1" comment="rpm is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839122" version="1" comment="rpm-apidocs is &lt;4.14.3-19.el8_5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839123" version="1" comment="rpm-build is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839124" version="1" comment="rpm-build-libs is &lt;4.14.3-19.el8_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839125" version="1" comment="rpm-cron is &lt;4.14.3-19.el8_5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839126" version="1" comment="rpm-devel is &lt;4.14.3-19.el8_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839127" version="1" comment="rpm-libs is &lt;4.14.3-19.el8_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839128" version="1" comment="rpm-plugin-fapolicyd is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839129" version="1" comment="rpm-plugin-ima is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839130" version="1" comment="rpm-plugin-prioreset is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839131" version="1" comment="rpm-plugin-selinux is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839132" version="1" comment="rpm-plugin-syslog is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839133" version="1" comment="rpm-plugin-systemd-inhibit is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839134" version="1" comment="rpm-sign is &lt;4.14.3-19.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839135" version="1" comment="cryptsetup is &lt;2.3.3-4.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839136" version="1" comment="cryptsetup-devel is &lt;2.3.3-4.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839137" version="1" comment="cryptsetup-libs is &lt;2.3.3-4.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839138" version="1" comment="cryptsetup-reencrypt is &lt;2.3.3-4.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839139" version="1" comment="integritysetup is &lt;2.3.3-4.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839140" version="1" comment="veritysetup is &lt;2.3.3-4.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839141" version="1" comment="varnish is &lt;6.0.8-1.module+el8.5.0+14089+03a0c2cc.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839142" version="1" comment="varnish-devel is &lt;6.0.8-1.module+el8.5.0+14089+03a0c2cc.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839143" version="1" comment="varnish-docs is &lt;6.0.8-1.module+el8.5.0+14089+03a0c2cc.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839144" version="1" comment="varnish-modules is &lt;0.15.0-6.module+el8.5.0+11976+0b4af72d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839145" version="1" comment="aide is &lt;0.16-14.el8_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839146" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.14-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839147" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.14-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839148" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.14-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839149" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.14-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839150" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.14-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839151" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.211-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839152" version="1" comment="dotnet-sdk-5.0-source-built-artifacts is &lt;5.0.211-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839153" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.14-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839154" version="1" comment="dotnet-templates-5.0 is &lt;5.0.211-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839155" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.2-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839156" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.2-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839157" version="1" comment="dotnet is &lt;6.0.102-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839158" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.2-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839159" version="1" comment="dotnet-host is &lt;6.0.2-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839160" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.2-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839161" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.2-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839162" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.102-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839163" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.2-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839164" version="1" comment="dotnet-templates-6.0 is &lt;6.0.102-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839165" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.102-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839166" version="1" comment="firefox is &lt;91.6.0-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839167" version="1" comment="thunderbird is &lt;91.6.0-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839168" version="1" comment="ruby is &lt;2.6.9-108.module+el8.5.0+13719+08a8ba32 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839169" version="1" comment="ruby-devel is &lt;2.6.9-108.module+el8.5.0+13719+08a8ba32 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839170" version="1" comment="ruby-doc is &lt;2.6.9-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839171" version="1" comment="ruby-libs is &lt;2.6.9-108.module+el8.5.0+13719+08a8ba32 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839172" version="1" comment="rubygem-bigdecimal is &lt;1.4.1-108.module+el8.5.0+13719+08a8ba32 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839173" version="1" comment="rubygem-bundler is &lt;1.17.2-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839174" version="1" comment="rubygem-did_you_mean is &lt;1.3.0-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839175" version="1" comment="rubygem-io-console is &lt;0.4.7-108.module+el8.5.0+13719+08a8ba32 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839176" version="1" comment="rubygem-irb is &lt;1.0.0-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839177" version="1" comment="rubygem-json is &lt;2.1.0-108.module+el8.5.0+13719+08a8ba32 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839178" version="1" comment="rubygem-minitest is &lt;5.11.3-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839179" version="1" comment="rubygem-net-telnet is &lt;0.2.0-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839180" version="1" comment="rubygem-openssl is &lt;2.1.2-108.module+el8.5.0+13719+08a8ba32 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839181" version="1" comment="rubygem-power_assert is &lt;1.1.3-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839182" version="1" comment="rubygem-psych is &lt;3.1.0-108.module+el8.5.0+13719+08a8ba32 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839183" version="1" comment="rubygem-rake is &lt;12.3.3-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839184" version="1" comment="rubygem-rdoc is &lt;6.1.2.1-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839185" version="1" comment="rubygem-test-unit is &lt;3.2.9-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839186" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839187" version="1" comment="rubygems is &lt;3.0.3.1-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839188" version="1" comment="rubygems-devel is &lt;3.0.3.1-108.module+el8.5.0+13719+08a8ba32 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839189" version="1" comment="ruby is &lt;2.5.9-107.module+el8.5.0+13840+ec418553 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839190" version="1" comment="ruby-devel is &lt;2.5.9-107.module+el8.5.0+13840+ec418553 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839191" version="1" comment="ruby-doc is &lt;2.5.9-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839192" version="1" comment="ruby-irb is &lt;2.5.9-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839193" version="1" comment="ruby-libs is &lt;2.5.9-107.module+el8.5.0+13840+ec418553 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839194" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-107.module+el8.5.0+13840+ec418553 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839195" version="1" comment="rubygem-bundler is &lt;1.16.1-4.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839196" version="1" comment="rubygem-bundler-doc is &lt;1.16.1-4.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839197" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839198" version="1" comment="rubygem-io-console is &lt;0.4.6-107.module+el8.5.0+13840+ec418553 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839199" version="1" comment="rubygem-json is &lt;2.1.0-107.module+el8.5.0+13840+ec418553 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839200" version="1" comment="rubygem-minitest is &lt;5.10.3-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839201" version="1" comment="rubygem-net-telnet is &lt;0.1.1-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839202" version="1" comment="rubygem-openssl is &lt;2.1.2-107.module+el8.5.0+13840+ec418553 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839203" version="1" comment="rubygem-power_assert is &lt;1.1.1-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839204" version="1" comment="rubygem-psych is &lt;3.0.2-107.module+el8.5.0+13840+ec418553 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839205" version="1" comment="rubygem-rake is &lt;12.3.3-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839206" version="1" comment="rubygem-rdoc is &lt;6.0.1.1-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839207" version="1" comment="rubygem-test-unit is &lt;3.2.7-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839208" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839209" version="1" comment="rubygems is &lt;2.7.6.3-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839210" version="1" comment="rubygems-devel is &lt;2.7.6.3-107.module+el8.5.0+13840+ec418553 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839211" version="1" comment="python3-pillow is &lt;5.1.1-18.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839212" version="1" comment="python3-pillow-devel is &lt;5.1.1-18.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839213" version="1" comment="python3-pillow-doc is &lt;5.1.1-18.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839214" version="1" comment="python3-pillow-tk is &lt;5.1.1-18.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839215" version="1" comment="cyrus-sasl is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839216" version="1" comment="cyrus-sasl-devel is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839217" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839218" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839219" version="1" comment="cyrus-sasl-ldap is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839220" version="1" comment="cyrus-sasl-lib is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839221" version="1" comment="cyrus-sasl-md5 is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839222" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839223" version="1" comment="cyrus-sasl-plain is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839224" version="1" comment="cyrus-sasl-scram is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839225" version="1" comment="cyrus-sasl-sql is &lt;2.1.27-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839226" version="1" comment="ruby is &lt;2.5.9-109.module+el8.5.0+14275+d9c243ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839227" version="1" comment="ruby-devel is &lt;2.5.9-109.module+el8.5.0+14275+d9c243ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839228" version="1" comment="ruby-doc is &lt;2.5.9-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839229" version="1" comment="ruby-irb is &lt;2.5.9-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839230" version="1" comment="ruby-libs is &lt;2.5.9-109.module+el8.5.0+14275+d9c243ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839231" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-109.module+el8.5.0+14275+d9c243ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839232" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839233" version="1" comment="rubygem-io-console is &lt;0.4.6-109.module+el8.5.0+14275+d9c243ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839234" version="1" comment="rubygem-json is &lt;2.1.0-109.module+el8.5.0+14275+d9c243ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839235" version="1" comment="rubygem-minitest is &lt;5.10.3-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839236" version="1" comment="rubygem-net-telnet is &lt;0.1.1-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839237" version="1" comment="rubygem-openssl is &lt;2.1.2-109.module+el8.5.0+14275+d9c243ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839238" version="1" comment="rubygem-power_assert is &lt;1.1.1-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839239" version="1" comment="rubygem-psych is &lt;3.0.2-109.module+el8.5.0+14275+d9c243ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839240" version="1" comment="rubygem-rake is &lt;12.3.3-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839241" version="1" comment="rubygem-rdoc is &lt;6.0.1.1-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839242" version="1" comment="rubygem-test-unit is &lt;3.2.7-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839243" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839244" version="1" comment="rubygems is &lt;2.7.6.3-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839245" version="1" comment="rubygems-devel is &lt;2.7.6.3-109.module+el8.5.0+14275+d9c243ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839246" version="1" comment="firefox is &lt;91.7.0-3.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839247" version="1" comment="bpftool is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839248" version="1" comment="kernel is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839249" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-348.20.1.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839250" version="1" comment="kernel-core is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839251" version="1" comment="kernel-cross-headers is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839252" version="1" comment="kernel-debug is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839253" version="1" comment="kernel-debug-core is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839255" version="1" comment="kernel-debug-modules is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839256" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839258" version="1" comment="kernel-doc is &lt;4.18.0-348.20.1.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839259" version="1" comment="kernel-headers is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839260" version="1" comment="kernel-modules is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839261" version="1" comment="kernel-modules-extra is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839262" version="1" comment="kernel-tools is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839263" version="1" comment="kernel-tools-libs is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839265" version="1" comment="perf is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839266" version="1" comment="python3-perf is &lt;4.18.0-348.20.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839267" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.3-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839268" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.3-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839269" version="1" comment="dotnet is &lt;6.0.103-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839270" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.3-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839271" version="1" comment="dotnet-host is &lt;6.0.3-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839272" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.3-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839273" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.3-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839274" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.103-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839275" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.3-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839276" version="1" comment="dotnet-templates-6.0 is &lt;6.0.103-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839277" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.103-4.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839278" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.23-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839279" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.23-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839280" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.23-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839281" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.23-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839282" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.23-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839283" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.417-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839284" version="1" comment="dotnet-sdk-3.1-source-built-artifacts is &lt;3.1.417-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839285" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.23-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839286" version="1" comment="dotnet-templates-3.1 is &lt;3.1.417-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839287" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.15-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839288" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.15-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839289" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.15-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839290" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.15-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839291" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.15-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839292" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.212-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839293" version="1" comment="dotnet-sdk-5.0-source-built-artifacts is &lt;5.0.212-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839294" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.15-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839295" version="1" comment="dotnet-templates-5.0 is &lt;5.0.212-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839296" version="1" comment="thunderbird is &lt;91.7.0-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839297" version="1" comment="389-ds-base is &lt;1.4.3.23-14.module+el8.5.0+14377+c731dc97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839298" version="1" comment="389-ds-base-devel is &lt;1.4.3.23-14.module+el8.5.0+14377+c731dc97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839299" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.23-14.module+el8.5.0+14377+c731dc97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839300" version="1" comment="389-ds-base-libs is &lt;1.4.3.23-14.module+el8.5.0+14377+c731dc97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839301" version="1" comment="389-ds-base-snmp is &lt;1.4.3.23-14.module+el8.5.0+14377+c731dc97 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839302" version="1" comment="python3-lib389 is &lt;1.4.3.23-14.module+el8.5.0+14377+c731dc97 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839303" version="1" comment="httpd is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839304" version="1" comment="httpd-devel is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839305" version="1" comment="httpd-filesystem is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839306" version="1" comment="httpd-manual is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839307" version="1" comment="httpd-tools is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839308" version="1" comment="mod_ldap is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839309" version="1" comment="mod_proxy_html is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839310" version="1" comment="mod_session is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839311" version="1" comment="mod_ssl is &lt;2.4.37-43.module+el8.5.0+14370+51c6d843.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839312" version="1" comment="bsdtar is &lt;3.3.3-3.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839313" version="1" comment="libarchive is &lt;3.3.3-3.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839314" version="1" comment="libarchive-devel is &lt;3.3.3-3.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839315" version="1" comment="vim-X11 is &lt;8.0.1763-16.el8_5.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839316" version="1" comment="vim-common is &lt;8.0.1763-16.el8_5.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839317" version="1" comment="vim-enhanced is &lt;8.0.1763-16.el8_5.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839318" version="1" comment="vim-filesystem is &lt;8.0.1763-16.el8_5.12 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839319" version="1" comment="vim-minimal is &lt;8.0.1763-16.el8_5.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839320" version="1" comment="compat-libpthread-nonshared is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839321" version="1" comment="glibc is &lt;2.28-164.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839322" version="1" comment="glibc-all-langpacks is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839323" version="1" comment="glibc-benchtests is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839324" version="1" comment="glibc-common is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839325" version="1" comment="glibc-devel is &lt;2.28-164.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839326" version="1" comment="glibc-headers is &lt;2.28-164.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839327" version="1" comment="glibc-langpack-aa is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839328" version="1" comment="glibc-langpack-af is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839329" version="1" comment="glibc-langpack-agr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839330" version="1" comment="glibc-langpack-ak is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839331" version="1" comment="glibc-langpack-am is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839332" version="1" comment="glibc-langpack-an is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839333" version="1" comment="glibc-langpack-anp is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839334" version="1" comment="glibc-langpack-ar is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839335" version="1" comment="glibc-langpack-as is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839336" version="1" comment="glibc-langpack-ast is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839337" version="1" comment="glibc-langpack-ayc is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839338" version="1" comment="glibc-langpack-az is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839339" version="1" comment="glibc-langpack-be is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839340" version="1" comment="glibc-langpack-bem is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839341" version="1" comment="glibc-langpack-ber is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839342" version="1" comment="glibc-langpack-bg is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839343" version="1" comment="glibc-langpack-bhb is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839344" version="1" comment="glibc-langpack-bho is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839345" version="1" comment="glibc-langpack-bi is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839346" version="1" comment="glibc-langpack-bn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839347" version="1" comment="glibc-langpack-bo is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839348" version="1" comment="glibc-langpack-br is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839349" version="1" comment="glibc-langpack-brx is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839350" version="1" comment="glibc-langpack-bs is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839351" version="1" comment="glibc-langpack-byn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839352" version="1" comment="glibc-langpack-ca is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839353" version="1" comment="glibc-langpack-ce is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839354" version="1" comment="glibc-langpack-chr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839355" version="1" comment="glibc-langpack-cmn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839356" version="1" comment="glibc-langpack-crh is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839357" version="1" comment="glibc-langpack-cs is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839358" version="1" comment="glibc-langpack-csb is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839359" version="1" comment="glibc-langpack-cv is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839360" version="1" comment="glibc-langpack-cy is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839361" version="1" comment="glibc-langpack-da is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839362" version="1" comment="glibc-langpack-de is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839363" version="1" comment="glibc-langpack-doi is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839364" version="1" comment="glibc-langpack-dsb is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839365" version="1" comment="glibc-langpack-dv is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839366" version="1" comment="glibc-langpack-dz is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839367" version="1" comment="glibc-langpack-el is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839368" version="1" comment="glibc-langpack-en is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839369" version="1" comment="glibc-langpack-eo is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839370" version="1" comment="glibc-langpack-es is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839371" version="1" comment="glibc-langpack-et is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839372" version="1" comment="glibc-langpack-eu is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839373" version="1" comment="glibc-langpack-fa is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839374" version="1" comment="glibc-langpack-ff is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839375" version="1" comment="glibc-langpack-fi is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839376" version="1" comment="glibc-langpack-fil is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839377" version="1" comment="glibc-langpack-fo is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839378" version="1" comment="glibc-langpack-fr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839379" version="1" comment="glibc-langpack-fur is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839380" version="1" comment="glibc-langpack-fy is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839381" version="1" comment="glibc-langpack-ga is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839382" version="1" comment="glibc-langpack-gd is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839383" version="1" comment="glibc-langpack-gez is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839384" version="1" comment="glibc-langpack-gl is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839385" version="1" comment="glibc-langpack-gu is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839386" version="1" comment="glibc-langpack-gv is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839387" version="1" comment="glibc-langpack-ha is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839388" version="1" comment="glibc-langpack-hak is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839389" version="1" comment="glibc-langpack-he is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839390" version="1" comment="glibc-langpack-hi is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839391" version="1" comment="glibc-langpack-hif is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839392" version="1" comment="glibc-langpack-hne is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839393" version="1" comment="glibc-langpack-hr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839394" version="1" comment="glibc-langpack-hsb is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839395" version="1" comment="glibc-langpack-ht is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839396" version="1" comment="glibc-langpack-hu is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839397" version="1" comment="glibc-langpack-hy is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839398" version="1" comment="glibc-langpack-ia is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839399" version="1" comment="glibc-langpack-id is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839400" version="1" comment="glibc-langpack-ig is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839401" version="1" comment="glibc-langpack-ik is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839402" version="1" comment="glibc-langpack-is is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839403" version="1" comment="glibc-langpack-it is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839404" version="1" comment="glibc-langpack-iu is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839405" version="1" comment="glibc-langpack-ja is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839406" version="1" comment="glibc-langpack-ka is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839407" version="1" comment="glibc-langpack-kab is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839408" version="1" comment="glibc-langpack-kk is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839409" version="1" comment="glibc-langpack-kl is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839410" version="1" comment="glibc-langpack-km is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839411" version="1" comment="glibc-langpack-kn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839412" version="1" comment="glibc-langpack-ko is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839413" version="1" comment="glibc-langpack-kok is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839414" version="1" comment="glibc-langpack-ks is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839415" version="1" comment="glibc-langpack-ku is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839416" version="1" comment="glibc-langpack-kw is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839417" version="1" comment="glibc-langpack-ky is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839418" version="1" comment="glibc-langpack-lb is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839419" version="1" comment="glibc-langpack-lg is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839420" version="1" comment="glibc-langpack-li is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839421" version="1" comment="glibc-langpack-lij is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839422" version="1" comment="glibc-langpack-ln is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839423" version="1" comment="glibc-langpack-lo is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839424" version="1" comment="glibc-langpack-lt is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839425" version="1" comment="glibc-langpack-lv is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839426" version="1" comment="glibc-langpack-lzh is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839427" version="1" comment="glibc-langpack-mag is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839428" version="1" comment="glibc-langpack-mai is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839429" version="1" comment="glibc-langpack-mfe is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839430" version="1" comment="glibc-langpack-mg is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839431" version="1" comment="glibc-langpack-mhr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839432" version="1" comment="glibc-langpack-mi is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839433" version="1" comment="glibc-langpack-miq is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839434" version="1" comment="glibc-langpack-mjw is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839435" version="1" comment="glibc-langpack-mk is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839436" version="1" comment="glibc-langpack-ml is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839437" version="1" comment="glibc-langpack-mn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839438" version="1" comment="glibc-langpack-mni is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839439" version="1" comment="glibc-langpack-mr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839440" version="1" comment="glibc-langpack-ms is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839441" version="1" comment="glibc-langpack-mt is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839442" version="1" comment="glibc-langpack-my is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839443" version="1" comment="glibc-langpack-nan is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839444" version="1" comment="glibc-langpack-nb is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839445" version="1" comment="glibc-langpack-nds is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839446" version="1" comment="glibc-langpack-ne is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839447" version="1" comment="glibc-langpack-nhn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839448" version="1" comment="glibc-langpack-niu is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839449" version="1" comment="glibc-langpack-nl is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839450" version="1" comment="glibc-langpack-nn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839451" version="1" comment="glibc-langpack-nr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839452" version="1" comment="glibc-langpack-nso is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839453" version="1" comment="glibc-langpack-oc is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839454" version="1" comment="glibc-langpack-om is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839455" version="1" comment="glibc-langpack-or is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839456" version="1" comment="glibc-langpack-os is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839457" version="1" comment="glibc-langpack-pa is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839458" version="1" comment="glibc-langpack-pap is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839459" version="1" comment="glibc-langpack-pl is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839460" version="1" comment="glibc-langpack-ps is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839461" version="1" comment="glibc-langpack-pt is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839462" version="1" comment="glibc-langpack-quz is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839463" version="1" comment="glibc-langpack-raj is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839464" version="1" comment="glibc-langpack-ro is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839465" version="1" comment="glibc-langpack-ru is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839466" version="1" comment="glibc-langpack-rw is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839467" version="1" comment="glibc-langpack-sa is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839468" version="1" comment="glibc-langpack-sah is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839469" version="1" comment="glibc-langpack-sat is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839470" version="1" comment="glibc-langpack-sc is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839471" version="1" comment="glibc-langpack-sd is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839472" version="1" comment="glibc-langpack-se is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839473" version="1" comment="glibc-langpack-sgs is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839474" version="1" comment="glibc-langpack-shn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839475" version="1" comment="glibc-langpack-shs is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839476" version="1" comment="glibc-langpack-si is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839477" version="1" comment="glibc-langpack-sid is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839478" version="1" comment="glibc-langpack-sk is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839479" version="1" comment="glibc-langpack-sl is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839480" version="1" comment="glibc-langpack-sm is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839481" version="1" comment="glibc-langpack-so is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839482" version="1" comment="glibc-langpack-sq is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839483" version="1" comment="glibc-langpack-sr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839484" version="1" comment="glibc-langpack-ss is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839485" version="1" comment="glibc-langpack-st is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839486" version="1" comment="glibc-langpack-sv is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839487" version="1" comment="glibc-langpack-sw is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839488" version="1" comment="glibc-langpack-szl is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839489" version="1" comment="glibc-langpack-ta is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839490" version="1" comment="glibc-langpack-tcy is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839491" version="1" comment="glibc-langpack-te is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839492" version="1" comment="glibc-langpack-tg is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839493" version="1" comment="glibc-langpack-th is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839494" version="1" comment="glibc-langpack-the is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839495" version="1" comment="glibc-langpack-ti is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839496" version="1" comment="glibc-langpack-tig is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839497" version="1" comment="glibc-langpack-tk is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839498" version="1" comment="glibc-langpack-tl is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839499" version="1" comment="glibc-langpack-tn is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839500" version="1" comment="glibc-langpack-to is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839501" version="1" comment="glibc-langpack-tpi is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839502" version="1" comment="glibc-langpack-tr is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839503" version="1" comment="glibc-langpack-ts is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839504" version="1" comment="glibc-langpack-tt is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839505" version="1" comment="glibc-langpack-ug is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839506" version="1" comment="glibc-langpack-uk is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839507" version="1" comment="glibc-langpack-unm is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839508" version="1" comment="glibc-langpack-ur is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839509" version="1" comment="glibc-langpack-uz is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839510" version="1" comment="glibc-langpack-ve is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839511" version="1" comment="glibc-langpack-vi is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839512" version="1" comment="glibc-langpack-wa is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839513" version="1" comment="glibc-langpack-wae is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839514" version="1" comment="glibc-langpack-wal is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839515" version="1" comment="glibc-langpack-wo is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839516" version="1" comment="glibc-langpack-xh is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839517" version="1" comment="glibc-langpack-yi is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839518" version="1" comment="glibc-langpack-yo is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839519" version="1" comment="glibc-langpack-yue is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839520" version="1" comment="glibc-langpack-yuw is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839521" version="1" comment="glibc-langpack-zh is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839522" version="1" comment="glibc-langpack-zu is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839523" version="1" comment="glibc-locale-source is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839524" version="1" comment="glibc-minimal-langpack is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839525" version="1" comment="glibc-nss-devel is &lt;2.28-164.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839526" version="1" comment="glibc-static is &lt;2.28-164.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839527" version="1" comment="glibc-utils is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839528" version="1" comment="libnsl is &lt;2.28-164.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839529" version="1" comment="nscd is &lt;2.28-164.el8_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839530" version="1" comment="nss_db is &lt;2.28-164.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839531" version="1" comment="nss_hesiod is &lt;2.28-164.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839532" version="1" comment="libxml2 is &lt;2.9.7-12.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839533" version="1" comment="libxml2-devel is &lt;2.9.7-12.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839534" version="1" comment="python3-libxml2 is &lt;2.9.7-12.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839535" version="1" comment="expat is &lt;2.2.5-4.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839536" version="1" comment="expat-devel is &lt;2.2.5-4.el8_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839537" version="1" comment="httpd is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839538" version="1" comment="httpd-devel is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839539" version="1" comment="httpd-filesystem is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839540" version="1" comment="httpd-manual is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839541" version="1" comment="httpd-tools is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839542" version="1" comment="mod_ldap is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839543" version="1" comment="mod_proxy_html is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839544" version="1" comment="mod_session is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839545" version="1" comment="mod_ssl is &lt;2.4.37-43.module+el8.5.0+14530+6f259f31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839546" version="1" comment="openssl is &lt;1.1.1k-6.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839547" version="1" comment="openssl-devel is &lt;1.1.1k-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839548" version="1" comment="openssl-libs is &lt;1.1.1k-6.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839549" version="1" comment="openssl-perl is &lt;1.1.1k-6.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839550" version="1" comment="firefox is &lt;91.8.0-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839551" version="1" comment="thunderbird is &lt;91.8.0-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839552" version="1" comment="java-11-openjdk is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839553" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839554" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839555" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839556" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839557" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839558" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839559" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839560" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839561" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839562" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839563" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839564" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839565" version="1" comment="java-11-openjdk-jmods is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839566" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839567" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839568" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839569" version="1" comment="java-11-openjdk-src is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839570" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839571" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839572" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839573" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839574" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.15.0.9-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839575" version="1" comment="java-17-openjdk is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839576" version="1" comment="java-17-openjdk-demo is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839577" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839578" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839579" version="1" comment="java-17-openjdk-devel is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839580" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839581" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839582" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839583" version="1" comment="java-17-openjdk-headless is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839584" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839585" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839586" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839587" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839588" version="1" comment="java-17-openjdk-jmods is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839589" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839590" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839591" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839592" version="1" comment="java-17-openjdk-src is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839593" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839594" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839595" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839596" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839597" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.3.0.6-2.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839598" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839599" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839600" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839601" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839602" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839603" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839604" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839605" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839606" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839607" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839608" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839609" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839610" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839611" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839612" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.332.b09-1.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839613" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.332.b09-1.el8_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839614" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839615" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839616" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839617" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.332.b09-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839618" version="1" comment="gzip is &lt;1.9-13.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839619" version="1" comment="polkit is &lt;0.115-13.el8_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839620" version="1" comment="polkit-devel is &lt;0.115-13.el8_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839621" version="1" comment="polkit-docs is &lt;0.115-13.el8_5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839622" version="1" comment="polkit-libs is &lt;0.115-13.el8_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839623" version="1" comment="bpftool is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839624" version="1" comment="kernel is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839625" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-348.23.1.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839626" version="1" comment="kernel-core is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839627" version="1" comment="kernel-cross-headers is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839628" version="1" comment="kernel-debug is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839629" version="1" comment="kernel-debug-core is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839631" version="1" comment="kernel-debug-modules is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839632" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839634" version="1" comment="kernel-doc is &lt;4.18.0-348.23.1.el8_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839635" version="1" comment="kernel-headers is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839636" version="1" comment="kernel-modules is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839637" version="1" comment="kernel-modules-extra is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839638" version="1" comment="kernel-tools is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839639" version="1" comment="kernel-tools-libs is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839641" version="1" comment="perf is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839642" version="1" comment="python3-perf is &lt;4.18.0-348.23.1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839643" version="1" comment="vim-X11 is &lt;8.0.1763-16.el8_5.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839644" version="1" comment="vim-common is &lt;8.0.1763-16.el8_5.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839645" version="1" comment="vim-enhanced is &lt;8.0.1763-16.el8_5.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839646" version="1" comment="vim-filesystem is &lt;8.0.1763-16.el8_5.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839647" version="1" comment="vim-minimal is &lt;8.0.1763-16.el8_5.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839648" version="1" comment="galera is &lt;25.3.34-4.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839649" version="1" comment="mariadb is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839650" version="1" comment="mariadb-backup is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839651" version="1" comment="mariadb-common is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839652" version="1" comment="mariadb-devel is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839653" version="1" comment="mariadb-embedded is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839654" version="1" comment="mariadb-embedded-devel is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839655" version="1" comment="mariadb-errmsg is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839656" version="1" comment="mariadb-gssapi-server is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839657" version="1" comment="mariadb-oqgraph-engine is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839658" version="1" comment="mariadb-server is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839659" version="1" comment="mariadb-server-galera is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839660" version="1" comment="mariadb-server-utils is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839661" version="1" comment="mariadb-test is &lt;10.3.32-2.module+el8.5.0+14124+14ced695 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839662" version="1" comment="Judy is &lt;1.0.5-18.module+el8.4.0+9031+9abc7af9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839663" version="1" comment="galera is &lt;26.4.9-4.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839664" version="1" comment="mariadb is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839665" version="1" comment="mariadb-backup is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839666" version="1" comment="mariadb-common is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839667" version="1" comment="mariadb-devel is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839668" version="1" comment="mariadb-embedded is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839669" version="1" comment="mariadb-embedded-devel is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839670" version="1" comment="mariadb-errmsg is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839671" version="1" comment="mariadb-gssapi-server is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839672" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839673" version="1" comment="mariadb-pam is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839674" version="1" comment="mariadb-server is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839675" version="1" comment="mariadb-server-galera is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839676" version="1" comment="mariadb-server-utils is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839677" version="1" comment="mariadb-test is &lt;10.5.13-1.module+el8.5.0+14125+d11efe18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839678" version="1" comment="buildah is &lt;1.19.9-2.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839679" version="1" comment="buildah-tests is &lt;1.19.9-2.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839680" version="1" comment="cockpit-podman is &lt;29-2.module+el8.5.0+14784+8c48f0fc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839681" version="1" comment="conmon is &lt;2.0.26-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839682" version="1" comment="container-selinux is &lt;2.167.0-1.module+el8.5.0+14784+8c48f0fc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839683" version="1" comment="containernetworking-plugins is &lt;0.9.1-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839684" version="1" comment="containers-common is &lt;1.2.4-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839685" version="1" comment="crit is &lt;3.15-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839686" version="1" comment="criu is &lt;3.15-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839687" version="1" comment="crun is &lt;0.18-2.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839688" version="1" comment="fuse-overlayfs is &lt;1.4.0-2.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839689" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839690" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839691" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-3.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839692" version="1" comment="podman is &lt;3.0.1-8.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839693" version="1" comment="podman-catatonit is &lt;3.0.1-8.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839694" version="1" comment="podman-docker is &lt;3.0.1-8.module+el8.5.0+14784+8c48f0fc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839695" version="1" comment="podman-plugins is &lt;3.0.1-8.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839696" version="1" comment="podman-remote is &lt;3.0.1-8.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839697" version="1" comment="podman-tests is &lt;3.0.1-8.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839698" version="1" comment="python3-criu is &lt;3.15-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839699" version="1" comment="runc is &lt;1.0.0-73.rc95.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839700" version="1" comment="skopeo is &lt;1.2.4-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839701" version="1" comment="skopeo-tests is &lt;1.2.4-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839702" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839703" version="1" comment="toolbox is &lt;0.0.99.3-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839704" version="1" comment="toolbox-tests is &lt;0.0.99.3-1.module+el8.5.0+14784+8c48f0fc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839705" version="1" comment="udica is &lt;0.2.4-1.module+el8.5.0+14784+8c48f0fc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839706" version="1" comment="buildah is &lt;1.11.6-10.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839707" version="1" comment="buildah-tests is &lt;1.11.6-10.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839708" version="1" comment="cockpit-podman is &lt;11-1.module+el8.5.0+14796+e4386a39 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839709" version="1" comment="conmon is &lt;2.0.15-1.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839710" version="1" comment="container-selinux is &lt;2.130.0-1.module+el8.5.0+14796+e4386a39 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839711" version="1" comment="containernetworking-plugins is &lt;0.8.3-4.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839712" version="1" comment="containers-common is &lt;0.1.41-4.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839713" version="1" comment="crit is &lt;3.12-9.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839714" version="1" comment="criu is &lt;3.12-9.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839715" version="1" comment="fuse-overlayfs is &lt;0.7.8-1.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839716" version="1" comment="podman is &lt;1.6.4-28.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839717" version="1" comment="podman-docker is &lt;1.6.4-28.module+el8.5.0+14796+e4386a39 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839718" version="1" comment="podman-remote is &lt;1.6.4-28.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839719" version="1" comment="podman-tests is &lt;1.6.4-28.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839720" version="1" comment="python-podman-api is &lt;1.2.0-0.2.gitd0a45fe.module+el8.5.0+14796+e4386a39 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839721" version="1" comment="python3-criu is &lt;3.12-9.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839722" version="1" comment="runc is &lt;1.0.0-66.rc10.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839723" version="1" comment="skopeo is &lt;0.1.41-4.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839724" version="1" comment="skopeo-tests is &lt;0.1.41-4.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839725" version="1" comment="slirp4netns is &lt;0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839726" version="1" comment="toolbox is &lt;0.0.7-1.module+el8.5.0+14796+e4386a39 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839727" version="1" comment="udica is &lt;0.2.1-2.module+el8.5.0+14796+e4386a39 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839728" version="1" comment="zlib is &lt;1.2.11-18.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839729" version="1" comment="zlib-devel is &lt;1.2.11-18.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839730" version="1" comment="zlib-static is &lt;1.2.11-18.el8_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839731" version="1" comment="xmlrpc-c is &lt;1.51.0-5.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839732" version="1" comment="xmlrpc-c-c++ is &lt;1.51.0-5.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839733" version="1" comment="xmlrpc-c-client is &lt;1.51.0-5.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839734" version="1" comment="xmlrpc-c-client++ is &lt;1.51.0-5.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839735" version="1" comment="xmlrpc-c-devel is &lt;1.51.0-5.el8_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839736" version="1" comment="firefox is &lt;91.9.0-1.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839737" version="1" comment="thunderbird is &lt;91.9.0-3.el8_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839738" version="1" comment="aardvark-dns is &lt;1.0.1-27.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839739" version="1" comment="buildah is &lt;1.24.2-4.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839740" version="1" comment="buildah-tests is &lt;1.24.2-4.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839741" version="1" comment="cockpit-podman is &lt;43-1.module+el8.6.0+14673+621cb8be for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839742" version="1" comment="conmon is &lt;2.1.0-1.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839743" version="1" comment="container-selinux is &lt;2.179.1-1.module+el8.6.0+14673+621cb8be for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839744" version="1" comment="containernetworking-plugins is &lt;1.0.1-2.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839745" version="1" comment="containers-common is &lt;1-27.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839746" version="1" comment="crit is &lt;3.15-3.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839747" version="1" comment="criu is &lt;3.15-3.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839748" version="1" comment="criu-devel is &lt;3.15-3.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839749" version="1" comment="criu-libs is &lt;3.15-3.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839750" version="1" comment="crun is &lt;1.4.4-1.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839751" version="1" comment="fuse-overlayfs is &lt;1.8.2-1.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839752" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839753" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839754" version="1" comment="netavark is &lt;1.0.1-27.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839755" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.3-3.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839756" version="1" comment="podman is &lt;4.0.2-6.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839757" version="1" comment="podman-catatonit is &lt;4.0.2-6.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839758" version="1" comment="podman-docker is &lt;4.0.2-6.module+el8.6.0+14673+621cb8be for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839759" version="1" comment="podman-gvproxy is &lt;4.0.2-6.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839760" version="1" comment="podman-plugins is &lt;4.0.2-6.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839761" version="1" comment="podman-remote is &lt;4.0.2-6.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839762" version="1" comment="podman-tests is &lt;4.0.2-6.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839763" version="1" comment="python3-criu is &lt;3.15-3.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839764" version="1" comment="python3-podman is &lt;4.0.0-1.module+el8.6.0+14673+621cb8be for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839765" version="1" comment="runc is &lt;1.0.3-2.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839766" version="1" comment="skopeo is &lt;1.6.1-2.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839767" version="1" comment="skopeo-tests is &lt;1.6.1-2.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839768" version="1" comment="slirp4netns is &lt;1.1.8-2.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839769" version="1" comment="toolbox is &lt;0.0.99.3-0.4.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839770" version="1" comment="toolbox-tests is &lt;0.0.99.3-0.4.module+el8.6.0+14673+621cb8be for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839771" version="1" comment="udica is &lt;0.2.6-2.module+el8.6.0+14673+621cb8be for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839772" version="1" comment="webkit2gtk3 is &lt;2.34.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839773" version="1" comment="webkit2gtk3-devel is &lt;2.34.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839774" version="1" comment="webkit2gtk3-jsc is &lt;2.34.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839775" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.34.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839776" version="1" comment="grafana is &lt;7.5.11-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839777" version="1" comment="flatpak is &lt;1.8.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839778" version="1" comment="flatpak-devel is &lt;1.8.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839779" version="1" comment="flatpak-libs is &lt;1.8.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839780" version="1" comment="flatpak-selinux is &lt;1.8.7-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839781" version="1" comment="flatpak-session-helper is &lt;1.8.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839782" version="1" comment="buildah is &lt;1.19.9-3.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839783" version="1" comment="buildah-tests is &lt;1.19.9-3.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839784" version="1" comment="cockpit-podman is &lt;29-2.module+el8.6.0+14694+4f5132e0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839785" version="1" comment="conmon is &lt;2.0.26-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839786" version="1" comment="container-selinux is &lt;2.178.0-2.module+el8.6.0+14694+4f5132e0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839787" version="1" comment="containernetworking-plugins is &lt;0.9.1-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839788" version="1" comment="containers-common is &lt;1.2.4-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839789" version="1" comment="crit is &lt;3.15-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839790" version="1" comment="criu is &lt;3.15-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839791" version="1" comment="crun is &lt;0.18-3.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839792" version="1" comment="fuse-overlayfs is &lt;1.4.0-2.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839793" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839794" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839795" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-3.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839796" version="1" comment="podman is &lt;3.0.1-8.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839797" version="1" comment="podman-catatonit is &lt;3.0.1-8.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839798" version="1" comment="podman-docker is &lt;3.0.1-8.module+el8.6.0+14694+4f5132e0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839799" version="1" comment="podman-plugins is &lt;3.0.1-8.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839800" version="1" comment="podman-remote is &lt;3.0.1-8.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839801" version="1" comment="podman-tests is &lt;3.0.1-8.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839802" version="1" comment="python3-criu is &lt;3.15-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839803" version="1" comment="runc is &lt;1.0.0-73.rc95.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839804" version="1" comment="skopeo is &lt;1.2.4-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839805" version="1" comment="skopeo-tests is &lt;1.2.4-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839806" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839807" version="1" comment="toolbox is &lt;0.0.99.3-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839808" version="1" comment="toolbox-tests is &lt;0.0.99.3-1.module+el8.6.0+14694+4f5132e0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839809" version="1" comment="udica is &lt;0.2.4-1.module+el8.6.0+14694+4f5132e0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839810" version="1" comment="qt5-qtbase is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839811" version="1" comment="qt5-qtbase-common is &lt;5.15.2-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839812" version="1" comment="qt5-qtbase-devel is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839813" version="1" comment="qt5-qtbase-examples is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839814" version="1" comment="qt5-qtbase-gui is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839815" version="1" comment="qt5-qtbase-mysql is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839816" version="1" comment="qt5-qtbase-odbc is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839817" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839818" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839819" version="1" comment="qt5-qtbase-static is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839820" version="1" comment="compat-exiv2-026 is &lt;0.26-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839821" version="1" comment="gfbgraph is &lt;0.2.4-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839822" version="1" comment="aspell is &lt;0.60.6.1-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839823" version="1" comment="aspell-devel is &lt;0.60.6.1-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839824" version="1" comment="libtiff is &lt;4.0.9-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839825" version="1" comment="libtiff-devel is &lt;4.0.9-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839826" version="1" comment="libtiff-tools is &lt;4.0.9-21.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839827" version="1" comment="gnome-shell is &lt;3.32.2-44.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839828" version="1" comment="delve is &lt;1.7.2-1.module+el8.6.0+12972+ebab5911 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839829" version="1" comment="go-toolset is &lt;1.17.7-1.module+el8.6.0+14297+32a15e19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839830" version="1" comment="golang is &lt;1.17.7-1.module+el8.6.0+14297+32a15e19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839831" version="1" comment="golang-bin is &lt;1.17.7-1.module+el8.6.0+14297+32a15e19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839832" version="1" comment="golang-docs is &lt;1.17.7-1.module+el8.6.0+14297+32a15e19 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839833" version="1" comment="golang-misc is &lt;1.17.7-1.module+el8.6.0+14297+32a15e19 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839834" version="1" comment="golang-race is &lt;1.17.7-1.module+el8.6.0+14297+32a15e19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839835" version="1" comment="golang-src is &lt;1.17.7-1.module+el8.6.0+14297+32a15e19 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839836" version="1" comment="golang-tests is &lt;1.17.7-1.module+el8.6.0+14297+32a15e19 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839837" version="1" comment="libudisks2 is &lt;2.9.0-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839838" version="1" comment="libudisks2-devel is &lt;2.9.0-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839839" version="1" comment="udisks2 is &lt;2.9.0-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839840" version="1" comment="udisks2-iscsi is &lt;2.9.0-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839841" version="1" comment="udisks2-lsm is &lt;2.9.0-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839842" version="1" comment="udisks2-lvm2 is &lt;2.9.0-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839843" version="1" comment="python2 is &lt;2.7.18-10.module+el8.6.0+14191+7fdd52cd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839844" version="1" comment="python2-debug is &lt;2.7.18-10.module+el8.6.0+14191+7fdd52cd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839845" version="1" comment="python2-devel is &lt;2.7.18-10.module+el8.6.0+14191+7fdd52cd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839846" version="1" comment="python2-libs is &lt;2.7.18-10.module+el8.6.0+14191+7fdd52cd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839847" version="1" comment="python2-lxml is &lt;4.2.3-6.module+el8.6.0+13959+8e368262 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839848" version="1" comment="python2-pip is &lt;9.0.3-19.module+el8.6.0+13001+ad200bd9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839849" version="1" comment="python2-pip-wheel is &lt;9.0.3-19.module+el8.6.0+13001+ad200bd9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839850" version="1" comment="python2-test is &lt;2.7.18-10.module+el8.6.0+14191+7fdd52cd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839851" version="1" comment="python2-tkinter is &lt;2.7.18-10.module+el8.6.0+14191+7fdd52cd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839852" version="1" comment="python2-tools is &lt;2.7.18-10.module+el8.6.0+14191+7fdd52cd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839853" version="1" comment="cjose is &lt;0.6.1-2.module+el8+2454+f890a43a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839854" version="1" comment="cjose-devel is &lt;0.6.1-2.module+el8+2454+f890a43a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839855" version="1" comment="mod_auth_openidc is &lt;2.3.7-11.module+el8.6.0+14082+b6f23e95 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839856" version="1" comment="postgresql is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839857" version="1" comment="postgresql-contrib is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839858" version="1" comment="postgresql-docs is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839859" version="1" comment="postgresql-plperl is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839860" version="1" comment="postgresql-plpython3 is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839861" version="1" comment="postgresql-pltcl is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839862" version="1" comment="postgresql-server is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839863" version="1" comment="postgresql-server-devel is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839864" version="1" comment="postgresql-static is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839865" version="1" comment="postgresql-test is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839866" version="1" comment="postgresql-test-rpm-macros is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839867" version="1" comment="postgresql-upgrade is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839868" version="1" comment="postgresql-upgrade-devel is &lt;10.19-1.module+el8.6.0+13642+78853f5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839869" version="1" comment="exiv2 is &lt;0.27.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839870" version="1" comment="exiv2-devel is &lt;0.27.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839871" version="1" comment="exiv2-doc is &lt;0.27.5-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839872" version="1" comment="exiv2-libs is &lt;0.27.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839873" version="1" comment="jss is &lt;4.9.3-1.module+el8.6.0+14244+60d461b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839874" version="1" comment="jss-javadoc is &lt;4.9.3-1.module+el8.6.0+14244+60d461b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839875" version="1" comment="ldapjdk is &lt;4.23.0-1.module+el8.5.0+11983+6ba118b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839876" version="1" comment="ldapjdk-javadoc is &lt;4.23.0-1.module+el8.5.0+11983+6ba118b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839877" version="1" comment="pki-acme is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839878" version="1" comment="pki-base is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839879" version="1" comment="pki-base-java is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839880" version="1" comment="pki-ca is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839881" version="1" comment="pki-kra is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839882" version="1" comment="pki-server is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839883" version="1" comment="pki-symkey is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839884" version="1" comment="pki-tools is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839885" version="1" comment="python3-pki is &lt;10.12.0-2.module+el8.6.0+14115+8b467244 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839886" version="1" comment="tomcatjss is &lt;7.7.1-1.module+el8.6.0+13291+248751b1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839887" version="1" comment="maven-shared-utils is &lt;3.2.1-0.4.module+el8.6.0+13337+afcb49ec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839888" version="1" comment="maven-shared-utils is &lt;3.2.1-0.1.module+el8+2452+b359bfcd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839889" version="1" comment="libpq is &lt;13.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839890" version="1" comment="libpq-devel is &lt;13.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839891" version="1" comment="cargo is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839892" version="1" comment="cargo-doc is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839893" version="1" comment="clippy is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839894" version="1" comment="rls is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839895" version="1" comment="rust is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839896" version="1" comment="rust-analysis is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839897" version="1" comment="rust-debugger-common is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839898" version="1" comment="rust-doc is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839899" version="1" comment="rust-gdb is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839900" version="1" comment="rust-lldb is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839901" version="1" comment="rust-src is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839902" version="1" comment="rust-std-static is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839903" version="1" comment="rust-std-static-wasm32-unknown-unknown is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839904" version="1" comment="rust-std-static-wasm32-wasi is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839905" version="1" comment="rust-toolset is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839906" version="1" comment="rustfmt is &lt;1.58.1-1.module+el8.6.0+14021+586eff1a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839907" version="1" comment="fapolicyd is &lt;1.1-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839908" version="1" comment="fapolicyd-selinux is &lt;1.1-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839909" version="1" comment="httpd is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839910" version="1" comment="httpd-devel is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839911" version="1" comment="httpd-filesystem is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839912" version="1" comment="httpd-manual is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839913" version="1" comment="httpd-tools is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839914" version="1" comment="mod_http2 is &lt;1.15.7-5.module+el8.6.0+13996+01710940 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839915" version="1" comment="mod_ldap is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839916" version="1" comment="mod_proxy_html is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839917" version="1" comment="mod_session is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839918" version="1" comment="mod_ssl is &lt;2.4.37-47.module+el8.6.0+14529+083145da.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839919" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839920" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839921" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839922" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839923" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839924" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839925" version="1" comment="xorg-x11-server-common is &lt;1.20.11-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839926" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839927" version="1" comment="xorg-x11-server-source is &lt;1.20.11-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839928" version="1" comment="qt5-qtsvg is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839929" version="1" comment="qt5-qtsvg-devel is &lt;5.15.2-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839930" version="1" comment="qt5-qtsvg-examples is &lt;5.15.2-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839931" version="1" comment="keepalived is &lt;2.1.5-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839932" version="1" comment="python3-lxml is &lt;4.2.3-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839933" version="1" comment="mod_auth_mellon is &lt;0.14.0-12.el8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839934" version="1" comment="mod_auth_mellon-diagnostics is &lt;0.14.0-12.el8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839935" version="1" comment="php is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839936" version="1" comment="php-bcmath is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839937" version="1" comment="php-cli is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839938" version="1" comment="php-common is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839939" version="1" comment="php-dba is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839940" version="1" comment="php-dbg is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839941" version="1" comment="php-devel is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839942" version="1" comment="php-embedded is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839943" version="1" comment="php-enchant is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839944" version="1" comment="php-ffi is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839945" version="1" comment="php-fpm is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839946" version="1" comment="php-gd is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839947" version="1" comment="php-gmp is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839948" version="1" comment="php-intl is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839949" version="1" comment="php-json is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839950" version="1" comment="php-ldap is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839951" version="1" comment="php-mbstring is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839952" version="1" comment="php-mysqlnd is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839953" version="1" comment="php-odbc is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839954" version="1" comment="php-opcache is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839955" version="1" comment="php-pdo is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839956" version="1" comment="php-pgsql is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839957" version="1" comment="php-process is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839958" version="1" comment="php-snmp is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839959" version="1" comment="php-soap is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839960" version="1" comment="php-xml is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839961" version="1" comment="php-xmlrpc is &lt;7.4.19-2.module+el8.6.0+13953+0a59ce9f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839962" version="1" comment="squid is &lt;4.15-3.module+el8.6.0+14176+9782b8ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839963" version="1" comment="dovecot is &lt;2.3.16-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839964" version="1" comment="dovecot-devel is &lt;2.3.16-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839965" version="1" comment="dovecot-mysql is &lt;2.3.16-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839966" version="1" comment="dovecot-pgsql is &lt;2.3.16-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839967" version="1" comment="dovecot-pigeonhole is &lt;2.3.16-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839968" version="1" comment="cairo is &lt;1.15.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839969" version="1" comment="cairo-devel is &lt;1.15.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839970" version="1" comment="cairo-gobject is &lt;1.15.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839971" version="1" comment="cairo-gobject-devel is &lt;1.15.12-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839972" version="1" comment="pixman is &lt;0.38.4-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839973" version="1" comment="pixman-devel is &lt;0.38.4-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839974" version="1" comment="fetchmail is &lt;6.4.24-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839975" version="1" comment="libsndfile is &lt;1.0.28-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839976" version="1" comment="libsndfile-devel is &lt;1.0.28-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839977" version="1" comment="platform-python is &lt;3.6.8-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839978" version="1" comment="platform-python-debug is &lt;3.6.8-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839979" version="1" comment="platform-python-devel is &lt;3.6.8-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839980" version="1" comment="python3-idle is &lt;3.6.8-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839981" version="1" comment="python3-libs is &lt;3.6.8-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839982" version="1" comment="python3-test is &lt;3.6.8-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839983" version="1" comment="python3-tkinter is &lt;3.6.8-45.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839984" version="1" comment="bpftool is &lt;4.18.0-372.9.1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839985" version="1" comment="kernel is &lt;4.18.0-372.9.1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839986" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-372.9.1.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839987" version="1" comment="kernel-core is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839988" version="1" comment="kernel-cross-headers is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839989" version="1" comment="kernel-debug is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839990" version="1" comment="kernel-debug-core is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839992" version="1" comment="kernel-debug-modules is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839993" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839995" version="1" comment="kernel-doc is &lt;4.18.0-372.9.1.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839996" version="1" comment="kernel-headers is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839997" version="1" comment="kernel-modules is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839998" version="1" comment="kernel-modules-extra is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009839999" version="1" comment="kernel-tools is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840000" version="1" comment="kernel-tools-libs is &lt;4.18.0-372.9.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840002" version="1" comment="perf is &lt;4.18.0-372.9.1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840003" version="1" comment="python3-perf is &lt;4.18.0-372.9.1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840004" version="1" comment="cpio is &lt;2.12-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840005" version="1" comment="cockpit is &lt;264.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840006" version="1" comment="cockpit-bridge is &lt;264.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840007" version="1" comment="cockpit-doc is &lt;264.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840008" version="1" comment="cockpit-system is &lt;264.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840009" version="1" comment="cockpit-ws is &lt;264.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840010" version="1" comment="openssh is &lt;8.0p1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840011" version="1" comment="openssh-askpass is &lt;8.0p1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840012" version="1" comment="openssh-cavs is &lt;8.0p1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840013" version="1" comment="openssh-clients is &lt;8.0p1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840014" version="1" comment="openssh-keycat is &lt;8.0p1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840015" version="1" comment="openssh-ldap is &lt;8.0p1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840016" version="1" comment="openssh-server is &lt;8.0p1-13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840017" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.13.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840018" version="1" comment="libssh is &lt;0.9.6-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840019" version="1" comment="libssh-config is &lt;0.9.6-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840020" version="1" comment="libssh-devel is &lt;0.9.6-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840021" version="1" comment="c-ares is &lt;1.13.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840022" version="1" comment="c-ares-devel is &lt;1.13.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840023" version="1" comment="ctdb is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840024" version="1" comment="libsmbclient is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840025" version="1" comment="libsmbclient-devel is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840026" version="1" comment="libwbclient is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840027" version="1" comment="libwbclient-devel is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840028" version="1" comment="python3-samba is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840029" version="1" comment="python3-samba-test is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840030" version="1" comment="samba is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840031" version="1" comment="samba-client is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840032" version="1" comment="samba-client-libs is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840033" version="1" comment="samba-common is &lt;4.15.5-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840034" version="1" comment="samba-common-libs is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840035" version="1" comment="samba-common-tools is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840036" version="1" comment="samba-devel is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840037" version="1" comment="samba-krb5-printing is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840038" version="1" comment="samba-libs is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840039" version="1" comment="samba-pidl is &lt;4.15.5-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840040" version="1" comment="samba-test is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840041" version="1" comment="samba-test-libs is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840042" version="1" comment="samba-vfs-iouring is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840043" version="1" comment="samba-winbind is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840044" version="1" comment="samba-winbind-clients is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840045" version="1" comment="samba-winbind-krb5-locator is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840046" version="1" comment="samba-winbind-modules is &lt;4.15.5-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840047" version="1" comment="samba-winexe is &lt;4.15.5-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840048" version="1" comment="bluez is &lt;5.56-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840049" version="1" comment="bluez-cups is &lt;5.56-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840050" version="1" comment="bluez-hid2hci is &lt;5.56-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840051" version="1" comment="bluez-libs is &lt;5.56-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840052" version="1" comment="bluez-libs-devel is &lt;5.56-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840053" version="1" comment="bluez-obexd is &lt;5.56-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840054" version="1" comment="bind is &lt;9.11.36-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840055" version="1" comment="bind-chroot is &lt;9.11.36-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840056" version="1" comment="bind-devel is &lt;9.11.36-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840057" version="1" comment="bind-export-devel is &lt;9.11.36-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840058" version="1" comment="bind-export-libs is &lt;9.11.36-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840059" version="1" comment="bind-libs is &lt;9.11.36-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840060" version="1" comment="bind-libs-lite is &lt;9.11.36-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840061" version="1" comment="bind-license is &lt;9.11.36-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840062" version="1" comment="bind-lite-devel is &lt;9.11.36-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840063" version="1" comment="bind-pkcs11 is &lt;9.11.36-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840064" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840065" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840066" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840067" version="1" comment="bind-sdb is &lt;9.11.36-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840068" version="1" comment="bind-sdb-chroot is &lt;9.11.36-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840069" version="1" comment="bind-utils is &lt;9.11.36-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840070" version="1" comment="python3-bind is &lt;9.11.36-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840071" version="1" comment="grub2-common is &lt;2.02-123.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840072" version="1" comment="grub2-efi-ia32 is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840073" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840074" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-123.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840075" version="1" comment="grub2-efi-x64 is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840076" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840077" version="1" comment="grub2-efi-x64-modules is &lt;2.02-123.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840078" version="1" comment="grub2-pc is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840079" version="1" comment="grub2-pc-modules is &lt;2.02-123.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840080" version="1" comment="grub2-tools is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840081" version="1" comment="grub2-tools-efi is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840082" version="1" comment="grub2-tools-extra is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840083" version="1" comment="grub2-tools-minimal is &lt;2.02-123.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840084" version="1" comment="zsh is &lt;5.5.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840085" version="1" comment="zsh-html is &lt;5.5.1-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840086" version="1" comment="lynx is &lt;2.8.9-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840087" version="1" comment="buildah is &lt;1.19.9-3.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840088" version="1" comment="buildah-tests is &lt;1.19.9-3.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840089" version="1" comment="cockpit-podman is &lt;29-2.module+el8.6.0+14874+64436299 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840090" version="1" comment="conmon is &lt;2.0.26-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840091" version="1" comment="container-selinux is &lt;2.178.0-2.module+el8.6.0+14874+64436299 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840092" version="1" comment="containernetworking-plugins is &lt;0.9.1-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840093" version="1" comment="containers-common is &lt;1.2.4-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840094" version="1" comment="crit is &lt;3.15-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840095" version="1" comment="criu is &lt;3.15-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840096" version="1" comment="crun is &lt;0.18-3.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840097" version="1" comment="fuse-overlayfs is &lt;1.4.0-2.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840098" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840099" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840100" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-3.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840101" version="1" comment="podman is &lt;3.0.1-9.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840102" version="1" comment="podman-catatonit is &lt;3.0.1-9.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840103" version="1" comment="podman-docker is &lt;3.0.1-9.module+el8.6.0+14874+64436299 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840104" version="1" comment="podman-plugins is &lt;3.0.1-9.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840105" version="1" comment="podman-remote is &lt;3.0.1-9.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840106" version="1" comment="podman-tests is &lt;3.0.1-9.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840107" version="1" comment="python3-criu is &lt;3.15-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840108" version="1" comment="runc is &lt;1.0.0-73.rc95.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840109" version="1" comment="skopeo is &lt;1.2.4-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840110" version="1" comment="skopeo-tests is &lt;1.2.4-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840111" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840112" version="1" comment="toolbox is &lt;0.0.99.3-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840113" version="1" comment="toolbox-tests is &lt;0.0.99.3-1.module+el8.6.0+14874+64436299 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840114" version="1" comment="udica is &lt;0.2.4-1.module+el8.6.0+14874+64436299 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840115" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.5-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840116" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.5-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840117" version="1" comment="dotnet is &lt;6.0.105-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840118" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.5-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840119" version="1" comment="dotnet-host is &lt;6.0.5-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840120" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.5-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840121" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.5-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840122" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.105-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031212" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.105-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840123" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.5-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840124" version="1" comment="dotnet-templates-6.0 is &lt;6.0.105-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840125" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.105-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840126" version="1" comment="aspnetcore-runtime-5.0 is &lt;5.0.17-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840127" version="1" comment="aspnetcore-targeting-pack-5.0 is &lt;5.0.17-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840128" version="1" comment="dotnet-apphost-pack-5.0 is &lt;5.0.17-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840129" version="1" comment="dotnet-hostfxr-5.0 is &lt;5.0.17-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840130" version="1" comment="dotnet-runtime-5.0 is &lt;5.0.17-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840131" version="1" comment="dotnet-sdk-5.0 is &lt;5.0.214-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037344" version="1" comment="dotnet-sdk-5.0-source-built-artifacts is &lt;5.0.214-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840132" version="1" comment="dotnet-targeting-pack-5.0 is &lt;5.0.17-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840133" version="1" comment="dotnet-templates-5.0 is &lt;5.0.214-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840134" version="1" comment="rsync is &lt;3.1.3-14.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840135" version="1" comment="rsync-daemon is &lt;3.1.3-14.el8_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840136" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.25-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840137" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.25-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840138" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.25-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840139" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.25-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840140" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.25-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840141" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.419-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840142" version="1" comment="dotnet-sdk-3.1-source-built-artifacts is &lt;3.1.419-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840143" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.25-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840144" version="1" comment="dotnet-templates-3.1 is &lt;3.1.419-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840145" version="1" comment="mod_dav_svn is &lt;1.10.2-5.module+el8.6.0+15157+188c9801 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840146" version="1" comment="subversion is &lt;1.10.2-5.module+el8.6.0+15157+188c9801 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840147" version="1" comment="subversion-devel is &lt;1.10.2-5.module+el8.6.0+15157+188c9801 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840148" version="1" comment="subversion-gnome is &lt;1.10.2-5.module+el8.6.0+15157+188c9801 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840149" version="1" comment="subversion-javahl is &lt;1.10.2-5.module+el8.6.0+15157+188c9801 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840150" version="1" comment="subversion-libs is &lt;1.10.2-5.module+el8.6.0+15157+188c9801 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840151" version="1" comment="subversion-perl is &lt;1.10.2-5.module+el8.6.0+15157+188c9801 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840152" version="1" comment="subversion-tools is &lt;1.10.2-5.module+el8.6.0+15157+188c9801 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840153" version="1" comment="pcs is &lt;0.10.12-6.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840154" version="1" comment="pcs-snmp is &lt;0.10.12-6.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840155" version="1" comment="thunderbird is &lt;91.9.1-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840156" version="1" comment="firefox is &lt;91.9.1-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840157" version="1" comment="nodejs is &lt;16.14.0-4.module+el8.6.0+15294+54b291d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840158" version="1" comment="nodejs-devel is &lt;16.14.0-4.module+el8.6.0+15294+54b291d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840159" version="1" comment="nodejs-docs is &lt;16.14.0-4.module+el8.6.0+15294+54b291d2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840160" version="1" comment="nodejs-full-i18n is &lt;16.14.0-4.module+el8.6.0+15294+54b291d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840161" version="1" comment="nodejs-nodemon is &lt;2.0.15-1.module+el8.6.0+15294+54b291d2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840162" version="1" comment="npm is &lt;8.3.1-1.16.14.0.4.module+el8.6.0+15294+54b291d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840163" version="1" comment="rsyslog is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840164" version="1" comment="rsyslog-crypto is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840165" version="1" comment="rsyslog-doc is &lt;8.2102.0-7.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840166" version="1" comment="rsyslog-elasticsearch is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840167" version="1" comment="rsyslog-gnutls is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840168" version="1" comment="rsyslog-gssapi is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840169" version="1" comment="rsyslog-kafka is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840170" version="1" comment="rsyslog-mmaudit is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840171" version="1" comment="rsyslog-mmfields is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840172" version="1" comment="rsyslog-mmjsonparse is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840173" version="1" comment="rsyslog-mmkubernetes is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840174" version="1" comment="rsyslog-mmnormalize is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840175" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840176" version="1" comment="rsyslog-mysql is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840177" version="1" comment="rsyslog-omamqp1 is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840178" version="1" comment="rsyslog-openssl is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840179" version="1" comment="rsyslog-pgsql is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840180" version="1" comment="rsyslog-relp is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840181" version="1" comment="rsyslog-snmp is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840182" version="1" comment="rsyslog-udpspoof is &lt;8.2102.0-7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840183" version="1" comment="postgresql is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840184" version="1" comment="postgresql-contrib is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840185" version="1" comment="postgresql-docs is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840186" version="1" comment="postgresql-plperl is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840187" version="1" comment="postgresql-plpython3 is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840188" version="1" comment="postgresql-pltcl is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840189" version="1" comment="postgresql-server is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840190" version="1" comment="postgresql-server-devel is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840191" version="1" comment="postgresql-static is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840192" version="1" comment="postgresql-test is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840193" version="1" comment="postgresql-test-rpm-macros is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840194" version="1" comment="postgresql-upgrade is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840195" version="1" comment="postgresql-upgrade-devel is &lt;10.21-2.module+el8.6.0+15342+53518fac for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840196" version="1" comment="postgresql is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840197" version="1" comment="postgresql-contrib is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840198" version="1" comment="postgresql-docs is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840199" version="1" comment="postgresql-plperl is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840200" version="1" comment="postgresql-plpython3 is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840201" version="1" comment="postgresql-pltcl is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840202" version="1" comment="postgresql-server is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840203" version="1" comment="postgresql-server-devel is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840204" version="1" comment="postgresql-static is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840205" version="1" comment="postgresql-test is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840206" version="1" comment="postgresql-test-rpm-macros is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840207" version="1" comment="postgresql-upgrade is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840208" version="1" comment="postgresql-upgrade-devel is &lt;12.11-2.module+el8.6.0+15345+1dd8d6b8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840209" version="1" comment="postgresql is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840210" version="1" comment="postgresql-contrib is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840211" version="1" comment="postgresql-docs is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840212" version="1" comment="postgresql-plperl is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840213" version="1" comment="postgresql-plpython3 is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840214" version="1" comment="postgresql-pltcl is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840215" version="1" comment="postgresql-server is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840216" version="1" comment="postgresql-server-devel is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840217" version="1" comment="postgresql-static is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840218" version="1" comment="postgresql-test is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840219" version="1" comment="postgresql-test-rpm-macros is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840220" version="1" comment="postgresql-upgrade is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840221" version="1" comment="postgresql-upgrade-devel is &lt;13.7-2.module+el8.6.0+15347+b8eabcef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840222" version="1" comment="firefox is &lt;91.10.0-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840223" version="1" comment="thunderbird is &lt;91.10.0-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840224" version="1" comment="libserf is &lt;1.3.9-9.module+el8.4.0+8637+d3bad2c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840225" version="1" comment="mod_dav_svn is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840226" version="1" comment="python3-subversion is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840227" version="1" comment="subversion is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840228" version="1" comment="subversion-devel is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840229" version="1" comment="subversion-gnome is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840230" version="1" comment="subversion-javahl is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840231" version="1" comment="subversion-libs is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840232" version="1" comment="subversion-perl is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840233" version="1" comment="subversion-tools is &lt;1.14.1-2.module+el8.6.0+15201+2f551d15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840234" version="1" comment="utf8proc is &lt;2.1.1-5.module+el8.4.0+8637+d3bad2c2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840235" version="1" comment="xz is &lt;5.2.4-4.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840236" version="1" comment="xz-devel is &lt;5.2.4-4.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840237" version="1" comment="xz-libs is &lt;5.2.4-4.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840238" version="1" comment="xz-lzma-compat is &lt;5.2.4-4.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840239" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.6-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840240" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.6-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840241" version="1" comment="dotnet is &lt;6.0.106-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840242" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.6-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840243" version="1" comment="dotnet-host is &lt;6.0.6-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840244" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.6-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840245" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.6-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840246" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.106-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840247" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.106-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840248" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.6-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840249" version="1" comment="dotnet-templates-6.0 is &lt;6.0.106-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840250" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.106-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840251" version="1" comment="cups is &lt;2.2.6-45.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840252" version="1" comment="cups-client is &lt;2.2.6-45.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840253" version="1" comment="cups-devel is &lt;2.2.6-45.el8_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840254" version="1" comment="cups-filesystem is &lt;2.2.6-45.el8_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840255" version="1" comment="cups-ipptool is &lt;2.2.6-45.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840256" version="1" comment="cups-libs is &lt;2.2.6-45.el8_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840257" version="1" comment="cups-lpd is &lt;2.2.6-45.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840258" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.26-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840259" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.26-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840260" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.26-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840261" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.26-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840262" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.26-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840263" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.420-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840264" version="1" comment="dotnet-sdk-3.1-source-built-artifacts is &lt;3.1.420-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840265" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.26-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840266" version="1" comment="dotnet-templates-3.1 is &lt;3.1.420-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840267" version="1" comment="httpd is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840268" version="1" comment="httpd-devel is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840269" version="1" comment="httpd-filesystem is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840270" version="1" comment="httpd-manual is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840271" version="1" comment="httpd-tools is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840272" version="1" comment="mod_ldap is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840273" version="1" comment="mod_proxy_html is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840274" version="1" comment="mod_session is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840275" version="1" comment="mod_ssl is &lt;2.4.37-47.module+el8.6.0+15654+427eba2e.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840276" version="1" comment="libgcrypt is &lt;1.8.5-7.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840277" version="1" comment="libgcrypt-devel is &lt;1.8.5-7.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840278" version="1" comment="curl is &lt;7.61.1-22.el8_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840279" version="1" comment="libcurl is &lt;7.61.1-22.el8_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840280" version="1" comment="libcurl-devel is &lt;7.61.1-22.el8_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840281" version="1" comment="libcurl-minimal is &lt;7.61.1-22.el8_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840282" version="1" comment="expat is &lt;2.2.5-8.el8_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840283" version="1" comment="expat-devel is &lt;2.2.5-8.el8_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840284" version="1" comment="bpftool is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840285" version="1" comment="kernel is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840286" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-372.13.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840287" version="1" comment="kernel-core is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840288" version="1" comment="kernel-cross-headers is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840289" version="1" comment="kernel-debug is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840290" version="1" comment="kernel-debug-core is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840292" version="1" comment="kernel-debug-modules is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840293" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840295" version="1" comment="kernel-doc is &lt;4.18.0-372.13.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840296" version="1" comment="kernel-headers is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840297" version="1" comment="kernel-modules is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840298" version="1" comment="kernel-modules-extra is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840299" version="1" comment="kernel-tools is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840300" version="1" comment="kernel-tools-libs is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840302" version="1" comment="perf is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840303" version="1" comment="python3-perf is &lt;4.18.0-372.13.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840304" version="1" comment="libxml2 is &lt;2.9.7-13.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840305" version="1" comment="libxml2-devel is &lt;2.9.7-13.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840306" version="1" comment="python3-libxml2 is &lt;2.9.7-13.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840307" version="1" comment="vim-X11 is &lt;8.0.1763-19.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840308" version="1" comment="vim-common is &lt;8.0.1763-19.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840309" version="1" comment="vim-enhanced is &lt;8.0.1763-19.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840310" version="1" comment="vim-filesystem is &lt;8.0.1763-19.el8_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840311" version="1" comment="vim-minimal is &lt;8.0.1763-19.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840312" version="1" comment="compat-openssl10 is &lt;1.0.2o-4.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840313" version="1" comment="libinput is &lt;1.16.3-3.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840314" version="1" comment="libinput-devel is &lt;1.16.3-3.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840315" version="1" comment="libinput-utils is &lt;1.16.3-3.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840316" version="1" comment="go-toolset is &lt;1.17.10-1.module+el8.6.0+15486+6d4da7db for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840317" version="1" comment="golang is &lt;1.17.10-1.module+el8.6.0+15486+6d4da7db for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840318" version="1" comment="golang-bin is &lt;1.17.10-1.module+el8.6.0+15486+6d4da7db for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840319" version="1" comment="golang-docs is &lt;1.17.10-1.module+el8.6.0+15486+6d4da7db for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840320" version="1" comment="golang-misc is &lt;1.17.10-1.module+el8.6.0+15486+6d4da7db for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840321" version="1" comment="golang-race is &lt;1.17.10-1.module+el8.6.0+15486+6d4da7db for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840322" version="1" comment="golang-src is &lt;1.17.10-1.module+el8.6.0+15486+6d4da7db for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840323" version="1" comment="golang-tests is &lt;1.17.10-1.module+el8.6.0+15486+6d4da7db for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840324" version="1" comment="ruby is &lt;2.6.10-109.module+el8.6.0+15475+c55337b4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840325" version="1" comment="ruby-devel is &lt;2.6.10-109.module+el8.6.0+15475+c55337b4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840326" version="1" comment="ruby-doc is &lt;2.6.10-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840327" version="1" comment="ruby-libs is &lt;2.6.10-109.module+el8.6.0+15475+c55337b4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840328" version="1" comment="rubygem-bigdecimal is &lt;1.4.1-109.module+el8.6.0+15475+c55337b4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840329" version="1" comment="rubygem-bundler is &lt;1.17.2-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840330" version="1" comment="rubygem-did_you_mean is &lt;1.3.0-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840331" version="1" comment="rubygem-io-console is &lt;0.4.7-109.module+el8.6.0+15475+c55337b4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840332" version="1" comment="rubygem-irb is &lt;1.0.0-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840333" version="1" comment="rubygem-json is &lt;2.1.0-109.module+el8.6.0+15475+c55337b4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840334" version="1" comment="rubygem-minitest is &lt;5.11.3-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840335" version="1" comment="rubygem-net-telnet is &lt;0.2.0-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840336" version="1" comment="rubygem-openssl is &lt;2.1.2-109.module+el8.6.0+15475+c55337b4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840337" version="1" comment="rubygem-power_assert is &lt;1.1.3-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840338" version="1" comment="rubygem-psych is &lt;3.1.0-109.module+el8.6.0+15475+c55337b4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840339" version="1" comment="rubygem-rake is &lt;12.3.3-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840340" version="1" comment="rubygem-rdoc is &lt;6.1.2.1-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840341" version="1" comment="rubygem-test-unit is &lt;3.2.9-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840342" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840343" version="1" comment="rubygems is &lt;3.0.3.1-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840344" version="1" comment="rubygems-devel is &lt;3.0.3.1-109.module+el8.6.0+15475+c55337b4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840345" version="1" comment="php is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840346" version="1" comment="php-bcmath is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840347" version="1" comment="php-cli is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840348" version="1" comment="php-common is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840349" version="1" comment="php-dba is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840350" version="1" comment="php-dbg is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840351" version="1" comment="php-devel is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840352" version="1" comment="php-embedded is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840353" version="1" comment="php-enchant is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840354" version="1" comment="php-ffi is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840355" version="1" comment="php-fpm is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840356" version="1" comment="php-gd is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840357" version="1" comment="php-gmp is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840358" version="1" comment="php-intl is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840359" version="1" comment="php-json is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840360" version="1" comment="php-ldap is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840361" version="1" comment="php-mbstring is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840362" version="1" comment="php-mysqlnd is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840363" version="1" comment="php-odbc is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840364" version="1" comment="php-opcache is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840365" version="1" comment="php-pdo is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840366" version="1" comment="php-pgsql is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840367" version="1" comment="php-process is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840368" version="1" comment="php-snmp is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840369" version="1" comment="php-soap is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840370" version="1" comment="php-xml is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840371" version="1" comment="php-xmlrpc is &lt;7.4.19-3.module+el8.6.0+15726+994cde98 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840372" version="1" comment="apcu-panel is &lt;5.1.20-1.module+el8.6.0+13671+84712317 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840373" version="1" comment="libzip is &lt;1.7.3-1.module+el8.6.0+13671+84712317 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840374" version="1" comment="libzip-devel is &lt;1.7.3-1.module+el8.6.0+13671+84712317 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840375" version="1" comment="libzip-tools is &lt;1.7.3-1.module+el8.6.0+13671+84712317 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840376" version="1" comment="php is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840377" version="1" comment="php-bcmath is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840378" version="1" comment="php-cli is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840379" version="1" comment="php-common is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840380" version="1" comment="php-dba is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840381" version="1" comment="php-dbg is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840382" version="1" comment="php-devel is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840383" version="1" comment="php-embedded is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840384" version="1" comment="php-enchant is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840385" version="1" comment="php-ffi is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840386" version="1" comment="php-fpm is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840387" version="1" comment="php-gd is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840388" version="1" comment="php-gmp is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840389" version="1" comment="php-intl is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840390" version="1" comment="php-ldap is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840391" version="1" comment="php-mbstring is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840392" version="1" comment="php-mysqlnd is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840393" version="1" comment="php-odbc is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840394" version="1" comment="php-opcache is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840395" version="1" comment="php-pdo is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840396" version="1" comment="php-pear is &lt;1.10.13-1.module+el8.6.0+13671+84712317 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840397" version="1" comment="php-pecl-apcu is &lt;5.1.20-1.module+el8.6.0+13671+84712317 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840398" version="1" comment="php-pecl-apcu-devel is &lt;5.1.20-1.module+el8.6.0+13671+84712317 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840399" version="1" comment="php-pecl-rrd is &lt;2.0.3-1.module+el8.6.0+13671+84712317 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840400" version="1" comment="php-pecl-xdebug3 is &lt;3.1.2-1.module+el8.6.0+13671+84712317 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840401" version="1" comment="php-pecl-zip is &lt;1.19.2-1.module+el8.6.0+13671+84712317 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840402" version="1" comment="php-pgsql is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840403" version="1" comment="php-process is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840404" version="1" comment="php-snmp is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840405" version="1" comment="php-soap is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840406" version="1" comment="php-xml is &lt;8.0.13-3.module+el8.6.0+15725+0c79e7c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840407" version="1" comment="firefox is &lt;91.11.0-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840408" version="1" comment="thunderbird is &lt;91.11.0-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840409" version="1" comment="squid is &lt;4.15-3.module+el8.6.0+15801+8fa20c64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840410" version="1" comment="bpftool is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840411" version="1" comment="kernel is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840412" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-372.16.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840413" version="1" comment="kernel-core is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840414" version="1" comment="kernel-cross-headers is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840415" version="1" comment="kernel-debug is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840416" version="1" comment="kernel-debug-core is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840418" version="1" comment="kernel-debug-modules is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840419" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840421" version="1" comment="kernel-doc is &lt;4.18.0-372.16.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840422" version="1" comment="kernel-headers is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840423" version="1" comment="kernel-modules is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840424" version="1" comment="kernel-modules-extra is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840425" version="1" comment="kernel-tools is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840426" version="1" comment="kernel-tools-libs is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840428" version="1" comment="perf is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840429" version="1" comment="python3-perf is &lt;4.18.0-372.16.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840430" version="1" comment="pandoc is &lt;2.0.6-6.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840431" version="1" comment="pandoc-common is &lt;2.0.6-6.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840432" version="1" comment="java-11-openjdk is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840433" version="1" comment="java-11-openjdk-demo is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840434" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840435" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840436" version="1" comment="java-11-openjdk-devel is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840437" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840438" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840439" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840440" version="1" comment="java-11-openjdk-headless is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840441" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840442" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840443" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840444" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840445" version="1" comment="java-11-openjdk-jmods is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840446" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840447" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840448" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840449" version="1" comment="java-11-openjdk-src is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840450" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840451" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840452" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840453" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840454" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.16.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840455" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840456" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840457" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840458" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840459" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840460" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840461" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840462" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840463" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840464" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840465" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840466" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840467" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840468" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840469" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.342.b07-2.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840470" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.342.b07-2.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840471" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840472" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840473" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840474" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.342.b07-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840475" version="1" comment="grafana is &lt;7.5.11-3.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840476" version="1" comment="java-17-openjdk is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840477" version="1" comment="java-17-openjdk-demo is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840478" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840479" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840480" version="1" comment="java-17-openjdk-devel is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840481" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840482" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840483" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840484" version="1" comment="java-17-openjdk-headless is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840485" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840486" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840487" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840488" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840489" version="1" comment="java-17-openjdk-jmods is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840490" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840491" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840492" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840493" version="1" comment="java-17-openjdk-src is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840494" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840495" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840496" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840497" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840498" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.4.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840499" version="1" comment="thunderbird is &lt;91.12.0-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840500" version="1" comment="go-toolset is &lt;1.17.12-1.module+el8.6.0+16014+a372c00b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840501" version="1" comment="golang is &lt;1.17.12-1.module+el8.6.0+16014+a372c00b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840502" version="1" comment="golang-bin is &lt;1.17.12-1.module+el8.6.0+16014+a372c00b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840503" version="1" comment="golang-docs is &lt;1.17.12-1.module+el8.6.0+16014+a372c00b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840504" version="1" comment="golang-misc is &lt;1.17.12-1.module+el8.6.0+16014+a372c00b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840505" version="1" comment="golang-race is &lt;1.17.12-1.module+el8.6.0+16014+a372c00b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840506" version="1" comment="golang-src is &lt;1.17.12-1.module+el8.6.0+16014+a372c00b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840507" version="1" comment="golang-tests is &lt;1.17.12-1.module+el8.6.0+16014+a372c00b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840508" version="1" comment="firefox is &lt;91.12.0-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840509" version="1" comment="ruby is &lt;2.5.9-110.module+el8.6.0+15956+aa803fc1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840510" version="1" comment="ruby-devel is &lt;2.5.9-110.module+el8.6.0+15956+aa803fc1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840511" version="1" comment="ruby-doc is &lt;2.5.9-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840512" version="1" comment="ruby-irb is &lt;2.5.9-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840513" version="1" comment="ruby-libs is &lt;2.5.9-110.module+el8.6.0+15956+aa803fc1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840514" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-110.module+el8.6.0+15956+aa803fc1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840515" version="1" comment="rubygem-bundler is &lt;1.16.1-4.module+el8.6.0+14229+2452087f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840516" version="1" comment="rubygem-bundler-doc is &lt;1.16.1-4.module+el8.6.0+14229+2452087f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840517" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840518" version="1" comment="rubygem-io-console is &lt;0.4.6-110.module+el8.6.0+15956+aa803fc1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840519" version="1" comment="rubygem-json is &lt;2.1.0-110.module+el8.6.0+15956+aa803fc1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840520" version="1" comment="rubygem-minitest is &lt;5.10.3-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840521" version="1" comment="rubygem-net-telnet is &lt;0.1.1-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840522" version="1" comment="rubygem-openssl is &lt;2.1.2-110.module+el8.6.0+15956+aa803fc1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840523" version="1" comment="rubygem-power_assert is &lt;1.1.1-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840524" version="1" comment="rubygem-psych is &lt;3.0.2-110.module+el8.6.0+15956+aa803fc1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840525" version="1" comment="rubygem-rake is &lt;12.3.3-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840526" version="1" comment="rubygem-rdoc is &lt;6.0.1.1-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840527" version="1" comment="rubygem-test-unit is &lt;3.2.7-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840528" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840529" version="1" comment="rubygems is &lt;2.7.6.3-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840530" version="1" comment="rubygems-devel is &lt;2.7.6.3-110.module+el8.6.0+15956+aa803fc1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840531" version="1" comment="pcre2 is &lt;10.32-3.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840532" version="1" comment="pcre2-devel is &lt;10.32-3.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840533" version="1" comment="pcre2-tools is &lt;10.32-3.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840534" version="1" comment="pcre2-utf16 is &lt;10.32-3.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840535" version="1" comment="pcre2-utf32 is &lt;10.32-3.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840536" version="1" comment="vim-X11 is &lt;8.0.1763-19.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840537" version="1" comment="vim-common is &lt;8.0.1763-19.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840538" version="1" comment="vim-enhanced is &lt;8.0.1763-19.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840539" version="1" comment="vim-filesystem is &lt;8.0.1763-19.el8_6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840540" version="1" comment="vim-minimal is &lt;8.0.1763-19.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840541" version="1" comment="openssl is &lt;1.1.1k-7.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840542" version="1" comment="openssl-devel is &lt;1.1.1k-7.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840543" version="1" comment="openssl-libs is &lt;1.1.1k-7.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840544" version="1" comment="openssl-perl is &lt;1.1.1k-7.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840545" version="1" comment="bpftool is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840546" version="1" comment="kernel is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840547" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-372.19.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840548" version="1" comment="kernel-core is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840549" version="1" comment="kernel-cross-headers is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840550" version="1" comment="kernel-debug is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840551" version="1" comment="kernel-debug-core is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840553" version="1" comment="kernel-debug-modules is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840554" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840556" version="1" comment="kernel-doc is &lt;4.18.0-372.19.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840557" version="1" comment="kernel-headers is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840558" version="1" comment="kernel-modules is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840559" version="1" comment="kernel-modules-extra is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840560" version="1" comment="kernel-tools is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840561" version="1" comment="kernel-tools-libs is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840563" version="1" comment="perf is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840564" version="1" comment="python3-perf is &lt;4.18.0-372.19.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840565" version="1" comment="389-ds-base is &lt;1.4.3.28-7.module+el8.6.0+15293+4900ec12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840566" version="1" comment="389-ds-base-devel is &lt;1.4.3.28-7.module+el8.6.0+15293+4900ec12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840567" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.28-7.module+el8.6.0+15293+4900ec12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840568" version="1" comment="389-ds-base-libs is &lt;1.4.3.28-7.module+el8.6.0+15293+4900ec12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840569" version="1" comment="389-ds-base-snmp is &lt;1.4.3.28-7.module+el8.6.0+15293+4900ec12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840570" version="1" comment="python3-lib389 is &lt;1.4.3.28-7.module+el8.6.0+15293+4900ec12 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840571" version="1" comment="galera is &lt;26.4.11-1.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840572" version="1" comment="mariadb is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840573" version="1" comment="mariadb-backup is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840574" version="1" comment="mariadb-common is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840575" version="1" comment="mariadb-devel is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840576" version="1" comment="mariadb-embedded is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840577" version="1" comment="mariadb-embedded-devel is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840578" version="1" comment="mariadb-errmsg is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840579" version="1" comment="mariadb-gssapi-server is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840580" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840581" version="1" comment="mariadb-pam is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840582" version="1" comment="mariadb-server is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840583" version="1" comment="mariadb-server-galera is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840584" version="1" comment="mariadb-server-utils is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840585" version="1" comment="mariadb-test is &lt;10.5.16-2.module+el8.6.0+15639+405b7427 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840586" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.28-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840587" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.28-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840588" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.28-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840589" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.28-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840590" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.28-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840591" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.422-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840592" version="1" comment="dotnet-sdk-3.1-source-built-artifacts is &lt;3.1.422-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840593" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.28-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840594" version="1" comment="dotnet-templates-3.1 is &lt;3.1.422-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840595" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840596" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840597" version="1" comment="dotnet is &lt;6.0.108-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840598" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840599" version="1" comment="dotnet-host is &lt;6.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840600" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840601" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840602" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.108-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840603" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.108-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840604" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.8-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840605" version="1" comment="dotnet-templates-6.0 is &lt;6.0.108-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840606" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.108-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840607" version="1" comment="php is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840608" version="1" comment="php-bcmath is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840609" version="1" comment="php-cli is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840610" version="1" comment="php-common is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840611" version="1" comment="php-dba is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840612" version="1" comment="php-dbg is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840613" version="1" comment="php-devel is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840614" version="1" comment="php-embedded is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840615" version="1" comment="php-enchant is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840616" version="1" comment="php-ffi is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840617" version="1" comment="php-fpm is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840618" version="1" comment="php-gd is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840619" version="1" comment="php-gmp is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840620" version="1" comment="php-intl is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840621" version="1" comment="php-json is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840622" version="1" comment="php-ldap is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840623" version="1" comment="php-mbstring is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840624" version="1" comment="php-mysqlnd is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840625" version="1" comment="php-odbc is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840626" version="1" comment="php-opcache is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840627" version="1" comment="php-pdo is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840628" version="1" comment="php-pgsql is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840629" version="1" comment="php-process is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840630" version="1" comment="php-snmp is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840631" version="1" comment="php-soap is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840632" version="1" comment="php-xml is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840633" version="1" comment="php-xmlrpc is &lt;7.4.19-4.module+el8.6.0+16316+906f6c6d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840634" version="1" comment="curl is &lt;7.61.1-22.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840635" version="1" comment="libcurl is &lt;7.61.1-22.el8_6.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840636" version="1" comment="libcurl-devel is &lt;7.61.1-22.el8_6.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840637" version="1" comment="libcurl-minimal is &lt;7.61.1-22.el8_6.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840638" version="1" comment="thunderbird is &lt;91.13.0-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840639" version="1" comment="firefox is &lt;91.13.0-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840640" version="1" comment="rsync is &lt;3.1.3-14.el8_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840641" version="1" comment="rsync-daemon is &lt;3.1.3-14.el8_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840642" version="1" comment="systemd is &lt;239-58.el8_6.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840643" version="1" comment="systemd-container is &lt;239-58.el8_6.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840644" version="1" comment="systemd-devel is &lt;239-58.el8_6.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840645" version="1" comment="systemd-journal-remote is &lt;239-58.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840646" version="1" comment="systemd-libs is &lt;239-58.el8_6.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840647" version="1" comment="systemd-pam is &lt;239-58.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840648" version="1" comment="systemd-tests is &lt;239-58.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840649" version="1" comment="systemd-udev is &lt;239-58.el8_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840650" version="1" comment="pcs is &lt;0.10.12-6.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840651" version="1" comment="pcs-snmp is &lt;0.10.12-6.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840652" version="1" comment="open-vm-tools is &lt;11.3.5-1.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840653" version="1" comment="open-vm-tools-desktop is &lt;11.3.5-1.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840654" version="1" comment="open-vm-tools-sdmp is &lt;11.3.5-1.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840655" version="1" comment="booth is &lt;1.0-199.1.ac1d34c.git.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840656" version="1" comment="booth-arbitrator is &lt;1.0-199.1.ac1d34c.git.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840657" version="1" comment="booth-core is &lt;1.0-199.1.ac1d34c.git.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840658" version="1" comment="booth-site is &lt;1.0-199.1.ac1d34c.git.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840659" version="1" comment="booth-test is &lt;1.0-199.1.ac1d34c.git.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840660" version="1" comment="galera is &lt;25.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840661" version="1" comment="mariadb is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840662" version="1" comment="mariadb-backup is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840663" version="1" comment="mariadb-common is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840664" version="1" comment="mariadb-devel is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840665" version="1" comment="mariadb-embedded is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840666" version="1" comment="mariadb-embedded-devel is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840667" version="1" comment="mariadb-errmsg is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840668" version="1" comment="mariadb-gssapi-server is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840669" version="1" comment="mariadb-oqgraph-engine is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840670" version="1" comment="mariadb-server is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840671" version="1" comment="mariadb-server-galera is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840672" version="1" comment="mariadb-server-utils is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840673" version="1" comment="mariadb-test is &lt;10.3.35-1.module+el8.6.0+15949+4ba4ec26 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840674" version="1" comment="ruby is &lt;2.7.6-138.module+el8.6.0+16148+54b2ba8f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840675" version="1" comment="ruby-default-gems is &lt;2.7.6-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840676" version="1" comment="ruby-devel is &lt;2.7.6-138.module+el8.6.0+16148+54b2ba8f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840677" version="1" comment="ruby-doc is &lt;2.7.6-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840678" version="1" comment="ruby-libs is &lt;2.7.6-138.module+el8.6.0+16148+54b2ba8f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840679" version="1" comment="rubygem-bigdecimal is &lt;2.0.0-138.module+el8.6.0+16148+54b2ba8f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840680" version="1" comment="rubygem-bundler is &lt;2.2.24-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840681" version="1" comment="rubygem-io-console is &lt;0.5.6-138.module+el8.6.0+16148+54b2ba8f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840682" version="1" comment="rubygem-irb is &lt;1.2.6-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840683" version="1" comment="rubygem-json is &lt;2.3.0-138.module+el8.6.0+16148+54b2ba8f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840684" version="1" comment="rubygem-minitest is &lt;5.13.0-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840685" version="1" comment="rubygem-net-telnet is &lt;0.2.0-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840686" version="1" comment="rubygem-openssl is &lt;2.1.3-138.module+el8.6.0+16148+54b2ba8f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840687" version="1" comment="rubygem-power_assert is &lt;1.1.7-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840688" version="1" comment="rubygem-psych is &lt;3.1.0-138.module+el8.6.0+16148+54b2ba8f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840689" version="1" comment="rubygem-rake is &lt;13.0.1-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840690" version="1" comment="rubygem-rdoc is &lt;6.2.1.1-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840691" version="1" comment="rubygem-test-unit is &lt;3.3.4-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840692" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840693" version="1" comment="rubygems is &lt;3.1.6-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840694" version="1" comment="rubygems-devel is &lt;3.1.6-138.module+el8.6.0+16148+54b2ba8f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840695" version="1" comment="nodejs is &lt;14.20.0-2.module+el8.6.0+16231+7c1b33d9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840696" version="1" comment="nodejs-devel is &lt;14.20.0-2.module+el8.6.0+16231+7c1b33d9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840697" version="1" comment="nodejs-docs is &lt;14.20.0-2.module+el8.6.0+16231+7c1b33d9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840698" version="1" comment="nodejs-full-i18n is &lt;14.20.0-2.module+el8.6.0+16231+7c1b33d9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840699" version="1" comment="nodejs-nodemon is &lt;2.0.19-2.module+el8.6.0+16231+7c1b33d9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840700" version="1" comment="npm is &lt;6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840701" version="1" comment="nodejs is &lt;16.16.0-3.module+el8.6.0+16248+76b0e185 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840702" version="1" comment="nodejs-devel is &lt;16.16.0-3.module+el8.6.0+16248+76b0e185 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840703" version="1" comment="nodejs-docs is &lt;16.16.0-3.module+el8.6.0+16248+76b0e185 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840704" version="1" comment="nodejs-full-i18n is &lt;16.16.0-3.module+el8.6.0+16248+76b0e185 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840705" version="1" comment="nodejs-nodemon is &lt;2.0.19-2.module+el8.6.0+16240+7ca51420 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840706" version="1" comment="npm is &lt;8.11.0-1.16.16.0.3.module+el8.6.0+16248+76b0e185 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840707" version="1" comment="ruby is &lt;3.0.4-141.module+el8.6.0+16311+3e5e17e9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840708" version="1" comment="ruby-default-gems is &lt;3.0.4-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840709" version="1" comment="ruby-devel is &lt;3.0.4-141.module+el8.6.0+16311+3e5e17e9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840710" version="1" comment="ruby-doc is &lt;3.0.4-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840711" version="1" comment="ruby-libs is &lt;3.0.4-141.module+el8.6.0+16311+3e5e17e9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840712" version="1" comment="rubygem-abrt is &lt;0.4.0-1.module+el8.5.0+11580+845038eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840713" version="1" comment="rubygem-abrt-doc is &lt;0.4.0-1.module+el8.5.0+11580+845038eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840714" version="1" comment="rubygem-bigdecimal is &lt;3.0.0-141.module+el8.6.0+16311+3e5e17e9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840715" version="1" comment="rubygem-bundler is &lt;2.2.33-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840716" version="1" comment="rubygem-io-console is &lt;0.5.7-141.module+el8.6.0+16311+3e5e17e9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840717" version="1" comment="rubygem-irb is &lt;1.3.5-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840718" version="1" comment="rubygem-json is &lt;2.5.1-141.module+el8.6.0+16311+3e5e17e9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840719" version="1" comment="rubygem-minitest is &lt;5.14.2-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840720" version="1" comment="rubygem-mysql2 is &lt;0.5.3-1.module+el8.5.0+11580+845038eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840721" version="1" comment="rubygem-mysql2-doc is &lt;0.5.3-1.module+el8.5.0+11580+845038eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840722" version="1" comment="rubygem-pg is &lt;1.2.3-1.module+el8.5.0+11580+845038eb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840723" version="1" comment="rubygem-pg-doc is &lt;1.2.3-1.module+el8.5.0+11580+845038eb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840724" version="1" comment="rubygem-power_assert is &lt;1.2.0-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840725" version="1" comment="rubygem-psych is &lt;3.3.2-141.module+el8.6.0+16311+3e5e17e9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840726" version="1" comment="rubygem-rake is &lt;13.0.3-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840727" version="1" comment="rubygem-rbs is &lt;1.4.0-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840728" version="1" comment="rubygem-rdoc is &lt;6.3.3-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840729" version="1" comment="rubygem-rexml is &lt;3.2.5-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840730" version="1" comment="rubygem-rss is &lt;0.2.9-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840731" version="1" comment="rubygem-test-unit is &lt;3.3.7-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840732" version="1" comment="rubygem-typeprof is &lt;0.15.2-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840733" version="1" comment="rubygems is &lt;3.2.33-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840734" version="1" comment="rubygems-devel is &lt;3.2.33-141.module+el8.6.0+16311+3e5e17e9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840735" version="1" comment="platform-python is &lt;3.6.8-47.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840736" version="1" comment="platform-python-debug is &lt;3.6.8-47.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840737" version="1" comment="platform-python-devel is &lt;3.6.8-47.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840738" version="1" comment="python3-idle is &lt;3.6.8-47.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840739" version="1" comment="python3-libs is &lt;3.6.8-47.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840740" version="1" comment="python3-test is &lt;3.6.8-47.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840741" version="1" comment="python3-tkinter is &lt;3.6.8-47.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840742" version="1" comment="bpftool is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840743" version="1" comment="kernel is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840744" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-372.26.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840745" version="1" comment="kernel-core is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840746" version="1" comment="kernel-cross-headers is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840747" version="1" comment="kernel-debug is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840748" version="1" comment="kernel-debug-core is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840750" version="1" comment="kernel-debug-modules is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840751" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840753" version="1" comment="kernel-doc is &lt;4.18.0-372.26.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840754" version="1" comment="kernel-headers is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840755" version="1" comment="kernel-modules is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840756" version="1" comment="kernel-modules-extra is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840757" version="1" comment="kernel-tools is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840758" version="1" comment="kernel-tools-libs is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840760" version="1" comment="perf is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840761" version="1" comment="python3-perf is &lt;4.18.0-372.26.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840762" version="1" comment="gnupg2 is &lt;2.2.20-3.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840763" version="1" comment="gnupg2-smime is &lt;2.2.20-3.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840764" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.29-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840765" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.29-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840766" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.29-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840767" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.29-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840768" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.29-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840769" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.423-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840770" version="1" comment="dotnet-sdk-3.1-source-built-artifacts is &lt;3.1.423-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840771" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.29-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840772" version="1" comment="dotnet-templates-3.1 is &lt;3.1.423-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840773" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.9-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840774" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.9-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840775" version="1" comment="dotnet is &lt;6.0.109-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840776" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.9-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840777" version="1" comment="dotnet-host is &lt;6.0.9-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840778" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.9-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840779" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.9-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840780" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.109-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840781" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.109-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840782" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.9-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840783" version="1" comment="dotnet-templates-6.0 is &lt;6.0.109-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840784" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.109-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840785" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840786" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840787" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840788" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840789" version="1" comment="php-pear is &lt;1.10.13-1.module+el8.6.0+16577+0788886f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840790" version="1" comment="firefox is &lt;102.3.0-6.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840791" version="1" comment="thunderbird is &lt;102.3.0-3.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840792" version="1" comment="squid is &lt;4.15-3.module+el8.6.0+16749+7b6feaf0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840793" version="1" comment="bind is &lt;9.11.36-3.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840794" version="1" comment="bind-chroot is &lt;9.11.36-3.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840795" version="1" comment="bind-devel is &lt;9.11.36-3.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840796" version="1" comment="bind-export-devel is &lt;9.11.36-3.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840797" version="1" comment="bind-export-libs is &lt;9.11.36-3.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840798" version="1" comment="bind-libs is &lt;9.11.36-3.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840799" version="1" comment="bind-libs-lite is &lt;9.11.36-3.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840800" version="1" comment="bind-license is &lt;9.11.36-3.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840801" version="1" comment="bind-lite-devel is &lt;9.11.36-3.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840802" version="1" comment="bind-pkcs11 is &lt;9.11.36-3.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840803" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-3.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840804" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-3.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840805" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-3.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840806" version="1" comment="bind-sdb is &lt;9.11.36-3.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840807" version="1" comment="bind-sdb-chroot is &lt;9.11.36-3.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840808" version="1" comment="bind-utils is &lt;9.11.36-3.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840809" version="1" comment="python3-bind is &lt;9.11.36-3.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840810" version="1" comment="bind9.16 is &lt;9.16.23-0.7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840811" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840812" version="1" comment="bind9.16-devel is &lt;9.16.23-0.7.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840813" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840814" version="1" comment="bind9.16-doc is &lt;9.16.23-0.7.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840815" version="1" comment="bind9.16-libs is &lt;9.16.23-0.7.el8_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840816" version="1" comment="bind9.16-license is &lt;9.16.23-0.7.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840817" version="1" comment="bind9.16-utils is &lt;9.16.23-0.7.el8_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840818" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.7.el8_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840819" version="1" comment="prometheus-jmx-exporter is &lt;0.12.0-8.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840820" version="1" comment="prometheus-jmx-exporter-openjdk11 is &lt;0.12.0-8.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840821" version="1" comment="expat is &lt;2.2.5-8.el8_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840822" version="1" comment="expat-devel is &lt;2.2.5-8.el8_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840823" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.10-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840824" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.10-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840825" version="1" comment="dotnet is &lt;6.0.110-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840826" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.10-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840827" version="1" comment="dotnet-host is &lt;6.0.10-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840828" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.10-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840829" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.10-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840830" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.110-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840831" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.110-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840832" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.10-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840833" version="1" comment="dotnet-templates-6.0 is &lt;6.0.110-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840834" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.110-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840835" version="1" comment="aspnetcore-runtime-3.1 is &lt;3.1.30-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840836" version="1" comment="aspnetcore-targeting-pack-3.1 is &lt;3.1.30-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840837" version="1" comment="dotnet-apphost-pack-3.1 is &lt;3.1.30-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840838" version="1" comment="dotnet-hostfxr-3.1 is &lt;3.1.30-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840839" version="1" comment="dotnet-runtime-3.1 is &lt;3.1.30-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840840" version="1" comment="dotnet-sdk-3.1 is &lt;3.1.424-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840841" version="1" comment="dotnet-sdk-3.1-source-built-artifacts is &lt;3.1.424-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840842" version="1" comment="dotnet-targeting-pack-3.1 is &lt;3.1.30-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840843" version="1" comment="dotnet-templates-3.1 is &lt;3.1.424-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840844" version="1" comment="nodejs is &lt;16.17.1-1.module+el8.6.0+16848+a483195a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840845" version="1" comment="nodejs-devel is &lt;16.17.1-1.module+el8.6.0+16848+a483195a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840846" version="1" comment="nodejs-docs is &lt;16.17.1-1.module+el8.6.0+16848+a483195a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840847" version="1" comment="nodejs-full-i18n is &lt;16.17.1-1.module+el8.6.0+16848+a483195a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840848" version="1" comment="npm is &lt;8.15.0-1.16.17.1.1.module+el8.6.0+16848+a483195a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840849" version="1" comment="java-17-openjdk is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840850" version="1" comment="java-17-openjdk-demo is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840851" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840852" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840853" version="1" comment="java-17-openjdk-devel is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840854" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840855" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840856" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840857" version="1" comment="java-17-openjdk-headless is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840858" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840859" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840860" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840861" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840862" version="1" comment="java-17-openjdk-jmods is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840863" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840864" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840865" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840866" version="1" comment="java-17-openjdk-src is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840867" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840868" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840869" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840870" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840871" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.5.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840872" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840873" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840874" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840875" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840876" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840877" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840878" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840879" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840880" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840881" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840882" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840883" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840884" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840885" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840886" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.352.b08-2.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840887" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.352.b08-2.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840888" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840889" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840890" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840891" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.352.b08-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840892" version="1" comment="java-11-openjdk is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840893" version="1" comment="java-11-openjdk-demo is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840894" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840895" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840896" version="1" comment="java-11-openjdk-devel is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840897" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840898" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840899" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840900" version="1" comment="java-11-openjdk-headless is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840901" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840902" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840903" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840904" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840905" version="1" comment="java-11-openjdk-jmods is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840906" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840907" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840908" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840909" version="1" comment="java-11-openjdk-src is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840910" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840911" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840912" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840913" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840914" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.17.0.8-2.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840915" version="1" comment="thunderbird is &lt;102.3.0-4.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840916" version="1" comment="firefox is &lt;102.3.0-7.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840917" version="1" comment="firefox is &lt;102.4.0-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840918" version="1" comment="libksba is &lt;1.3.5-8.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840919" version="1" comment="libksba-devel is &lt;1.3.5-8.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840920" version="1" comment="gnutls is &lt;3.6.16-5.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840921" version="1" comment="gnutls-c++ is &lt;3.6.16-5.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840922" version="1" comment="gnutls-dane is &lt;3.6.16-5.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840923" version="1" comment="gnutls-devel is &lt;3.6.16-5.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840924" version="1" comment="gnutls-utils is &lt;3.6.16-5.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840925" version="1" comment="zlib is &lt;1.2.11-19.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840926" version="1" comment="zlib-devel is &lt;1.2.11-19.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840927" version="1" comment="zlib-static is &lt;1.2.11-19.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840928" version="1" comment="lemon is &lt;3.26.0-16.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840929" version="1" comment="sqlite is &lt;3.26.0-16.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840930" version="1" comment="sqlite-devel is &lt;3.26.0-16.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840931" version="1" comment="sqlite-doc is &lt;3.26.0-16.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840932" version="1" comment="sqlite-libs is &lt;3.26.0-16.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840933" version="1" comment="bpftool is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840934" version="1" comment="kernel is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840935" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-372.32.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840936" version="1" comment="kernel-core is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840937" version="1" comment="kernel-cross-headers is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840938" version="1" comment="kernel-debug is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840939" version="1" comment="kernel-debug-core is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840941" version="1" comment="kernel-debug-modules is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840942" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840944" version="1" comment="kernel-doc is &lt;4.18.0-372.32.1.el8_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840945" version="1" comment="kernel-headers is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840946" version="1" comment="kernel-modules is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840947" version="1" comment="kernel-modules-extra is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840948" version="1" comment="kernel-tools is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840949" version="1" comment="kernel-tools-libs is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840951" version="1" comment="perf is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840952" version="1" comment="python3-perf is &lt;4.18.0-372.32.1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840953" version="1" comment="ctdb is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840954" version="1" comment="libsmbclient is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840955" version="1" comment="libsmbclient-devel is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840956" version="1" comment="libwbclient is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840957" version="1" comment="libwbclient-devel is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840958" version="1" comment="python3-samba is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840959" version="1" comment="python3-samba-test is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840960" version="1" comment="samba is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840961" version="1" comment="samba-client is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840962" version="1" comment="samba-client-libs is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840963" version="1" comment="samba-common is &lt;4.15.5-10.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840964" version="1" comment="samba-common-libs is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840965" version="1" comment="samba-common-tools is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840966" version="1" comment="samba-devel is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840967" version="1" comment="samba-krb5-printing is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840968" version="1" comment="samba-libs is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840969" version="1" comment="samba-pidl is &lt;4.15.5-10.el8_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840970" version="1" comment="samba-test is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840971" version="1" comment="samba-test-libs is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840972" version="1" comment="samba-vfs-iouring is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840973" version="1" comment="samba-winbind is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840974" version="1" comment="samba-winbind-clients is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840975" version="1" comment="samba-winbind-krb5-locator is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840976" version="1" comment="samba-winbind-modules is &lt;4.15.5-10.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840977" version="1" comment="samba-winexe is &lt;4.15.5-10.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840978" version="1" comment="mecab is &lt;0.996-2.module+el8.6.0+16523+5cb0e868 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840979" version="1" comment="mysql is &lt;8.0.30-1.module+el8.6.0+16523+5cb0e868 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840980" version="1" comment="mysql-common is &lt;8.0.30-1.module+el8.6.0+16523+5cb0e868 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840981" version="1" comment="mysql-devel is &lt;8.0.30-1.module+el8.6.0+16523+5cb0e868 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840982" version="1" comment="mysql-errmsg is &lt;8.0.30-1.module+el8.6.0+16523+5cb0e868 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840983" version="1" comment="mysql-libs is &lt;8.0.30-1.module+el8.6.0+16523+5cb0e868 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840984" version="1" comment="mysql-server is &lt;8.0.30-1.module+el8.6.0+16523+5cb0e868 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840985" version="1" comment="mysql-test is &lt;8.0.30-1.module+el8.6.0+16523+5cb0e868 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840986" version="1" comment="postgresql is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840987" version="1" comment="postgresql-contrib is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840988" version="1" comment="postgresql-docs is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840989" version="1" comment="postgresql-plperl is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840990" version="1" comment="postgresql-plpython3 is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840991" version="1" comment="postgresql-pltcl is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840992" version="1" comment="postgresql-server is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840993" version="1" comment="postgresql-server-devel is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840994" version="1" comment="postgresql-static is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840995" version="1" comment="postgresql-test is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840996" version="1" comment="postgresql-test-rpm-macros is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840997" version="1" comment="postgresql-upgrade is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840998" version="1" comment="postgresql-upgrade-devel is &lt;12.12-1.module+el8.6.0+16796+0abe6678 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009840999" version="1" comment="git-lfs is &lt;2.13.3-3.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841000" version="1" comment="389-ds-base is &lt;1.4.3.28-8.module+el8.6.0+16880+945f9b53 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841001" version="1" comment="389-ds-base-devel is &lt;1.4.3.28-8.module+el8.6.0+16880+945f9b53 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841002" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.28-8.module+el8.6.0+16880+945f9b53 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841003" version="1" comment="389-ds-base-libs is &lt;1.4.3.28-8.module+el8.6.0+16880+945f9b53 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841004" version="1" comment="389-ds-base-snmp is &lt;1.4.3.28-8.module+el8.6.0+16880+945f9b53 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841005" version="1" comment="python3-lib389 is &lt;1.4.3.28-8.module+el8.6.0+16880+945f9b53 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841006" version="1" comment="thunderbird is &lt;102.4.0-1.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841007" version="1" comment="device-mapper-multipath is &lt;0.8.4-22.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841008" version="1" comment="device-mapper-multipath-devel is &lt;0.8.4-22.el8_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841009" version="1" comment="device-mapper-multipath-libs is &lt;0.8.4-22.el8_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841010" version="1" comment="kpartx is &lt;0.8.4-22.el8_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841011" version="1" comment="libdmmp is &lt;0.8.4-22.el8_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841012" version="1" comment="pcs is &lt;0.10.14-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841013" version="1" comment="pcs-snmp is &lt;0.10.14-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841014" version="1" comment="aardvark-dns is &lt;1.1.0-4.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841015" version="1" comment="buildah is &lt;1.27.0-2.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841016" version="1" comment="buildah-tests is &lt;1.27.0-2.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841017" version="1" comment="cockpit-podman is &lt;53-1.module+el8.7.0+16772+33343656 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841018" version="1" comment="conmon is &lt;2.1.4-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841019" version="1" comment="container-selinux is &lt;2.189.0-1.module+el8.7.0+16772+33343656 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841020" version="1" comment="containernetworking-plugins is &lt;1.1.1-3.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841021" version="1" comment="containers-common is &lt;1-40.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841022" version="1" comment="crit is &lt;3.15-3.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841023" version="1" comment="criu is &lt;3.15-3.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841024" version="1" comment="criu-devel is &lt;3.15-3.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841025" version="1" comment="criu-libs is &lt;3.15-3.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841026" version="1" comment="crun is &lt;1.5-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841027" version="1" comment="fuse-overlayfs is &lt;1.9-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841028" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841029" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841030" version="1" comment="netavark is &lt;1.1.0-6.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841031" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.6-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841032" version="1" comment="podman is &lt;4.2.0-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841033" version="1" comment="podman-catatonit is &lt;4.2.0-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841034" version="1" comment="podman-docker is &lt;4.2.0-1.module+el8.7.0+16772+33343656 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841035" version="1" comment="podman-gvproxy is &lt;4.2.0-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841036" version="1" comment="podman-plugins is &lt;4.2.0-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841037" version="1" comment="podman-remote is &lt;4.2.0-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841038" version="1" comment="podman-tests is &lt;4.2.0-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841039" version="1" comment="python3-criu is &lt;3.15-3.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841040" version="1" comment="python3-podman is &lt;4.2.0-1.module+el8.7.0+16772+33343656 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841041" version="1" comment="runc is &lt;1.1.4-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841042" version="1" comment="skopeo is &lt;1.9.2-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841043" version="1" comment="skopeo-tests is &lt;1.9.2-1.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841044" version="1" comment="slirp4netns is &lt;1.2.0-2.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841045" version="1" comment="toolbox is &lt;0.0.99.3-0.6.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841046" version="1" comment="toolbox-tests is &lt;0.0.99.3-0.6.module+el8.7.0+16772+33343656 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841047" version="1" comment="udica is &lt;0.2.6-3.module+el8.7.0+16772+33343656 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841048" version="1" comment="flatpak-builder is &lt;1.0.14-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841049" version="1" comment="protobuf is &lt;3.5.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841050" version="1" comment="protobuf-compiler is &lt;3.5.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841051" version="1" comment="protobuf-devel is &lt;3.5.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841052" version="1" comment="protobuf-lite is &lt;3.5.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841053" version="1" comment="protobuf-lite-devel is &lt;3.5.0-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841054" version="1" comment="python3-protobuf is &lt;3.5.0-15.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841055" version="1" comment="aardvark-dns is &lt;1.0.1-35.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841056" version="1" comment="buildah is &lt;1.24.5-2.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841057" version="1" comment="buildah-tests is &lt;1.24.5-2.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841058" version="1" comment="cockpit-podman is &lt;46-1.module+el8.7.0+16520+2db5507d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841059" version="1" comment="conmon is &lt;2.1.4-1.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841060" version="1" comment="container-selinux is &lt;2.189.0-1.module+el8.7.0+16520+2db5507d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841061" version="1" comment="containernetworking-plugins is &lt;1.1.1-2.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841062" version="1" comment="containers-common is &lt;1-35.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841063" version="1" comment="crit is &lt;3.15-3.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841064" version="1" comment="criu is &lt;3.15-3.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841065" version="1" comment="criu-devel is &lt;3.15-3.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841066" version="1" comment="criu-libs is &lt;3.15-3.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841067" version="1" comment="crun is &lt;1.5-1.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841068" version="1" comment="fuse-overlayfs is &lt;1.9-1.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841069" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841070" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841071" version="1" comment="netavark is &lt;1.0.1-35.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841072" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.5-1.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841073" version="1" comment="podman is &lt;4.0.2-8.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841074" version="1" comment="podman-catatonit is &lt;4.0.2-8.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841075" version="1" comment="podman-docker is &lt;4.0.2-8.module+el8.7.0+16520+2db5507d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841076" version="1" comment="podman-gvproxy is &lt;4.0.2-8.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841077" version="1" comment="podman-plugins is &lt;4.0.2-8.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841078" version="1" comment="podman-remote is &lt;4.0.2-8.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841079" version="1" comment="podman-tests is &lt;4.0.2-8.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841080" version="1" comment="python3-criu is &lt;3.15-3.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841081" version="1" comment="python3-podman is &lt;4.0.0-1.module+el8.7.0+16520+2db5507d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841082" version="1" comment="runc is &lt;1.1.4-1.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841083" version="1" comment="skopeo is &lt;1.6.2-5.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841084" version="1" comment="skopeo-tests is &lt;1.6.2-5.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841085" version="1" comment="slirp4netns is &lt;1.1.8-2.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841086" version="1" comment="toolbox is &lt;0.0.99.3-0.5.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841087" version="1" comment="toolbox-tests is &lt;0.0.99.3-0.5.module+el8.7.0+16520+2db5507d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841088" version="1" comment="udica is &lt;0.2.6-3.module+el8.7.0+16520+2db5507d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841089" version="1" comment="idm-pki-acme is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841090" version="1" comment="idm-pki-base is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841091" version="1" comment="idm-pki-base-java is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841092" version="1" comment="idm-pki-ca is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841093" version="1" comment="idm-pki-kra is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841094" version="1" comment="idm-pki-server is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841095" version="1" comment="idm-pki-symkey is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841096" version="1" comment="idm-pki-tools is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841097" version="1" comment="jss is &lt;4.9.4-1.module+el8.7.0+15532+95bac9ee for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841098" version="1" comment="jss-javadoc is &lt;4.9.4-1.module+el8.7.0+15532+95bac9ee for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841099" version="1" comment="pki-servlet-4.0-api is &lt;9.0.50-1.module+el8.7.0+15761+f86c9a56 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841100" version="1" comment="pki-servlet-engine is &lt;9.0.50-1.module+el8.7.0+15761+f86c9a56 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841101" version="1" comment="python3-idm-pki is &lt;10.12.0-4.module+el8.7.0+16126+c5918a27 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841102" version="1" comment="qt5-devel is &lt;5.15.3-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841103" version="1" comment="qt5-rpm-macros is &lt;5.15.3-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841104" version="1" comment="qt5-srpm-macros is &lt;5.15.3-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841105" version="1" comment="fribidi is &lt;1.0.4-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841106" version="1" comment="fribidi-devel is &lt;1.0.4-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841107" version="1" comment="grafana is &lt;7.5.15-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841108" version="1" comment="yajl is &lt;2.1.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841109" version="1" comment="yajl-devel is &lt;2.1.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841110" version="1" comment="buildah is &lt;1.19.9-6.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841111" version="1" comment="buildah-tests is &lt;1.19.9-6.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841112" version="1" comment="cockpit-podman is &lt;29-2.module+el8.7.0+16212+65e1b35f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841113" version="1" comment="conmon is &lt;2.0.26-3.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841114" version="1" comment="container-selinux is &lt;2.189.0-1.module+el8.7.0+16212+65e1b35f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841115" version="1" comment="containernetworking-plugins is &lt;0.9.1-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841116" version="1" comment="containers-common is &lt;1.2.4-2.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841117" version="1" comment="crit is &lt;3.15-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841118" version="1" comment="criu is &lt;3.15-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841119" version="1" comment="crun is &lt;0.18-3.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841120" version="1" comment="fuse-overlayfs is &lt;1.4.0-2.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841121" version="1" comment="libslirp is &lt;4.3.1-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841122" version="1" comment="libslirp-devel is &lt;4.3.1-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841123" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.0-3.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841124" version="1" comment="podman is &lt;3.0.1-13.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841125" version="1" comment="podman-catatonit is &lt;3.0.1-13.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841126" version="1" comment="podman-docker is &lt;3.0.1-13.module+el8.7.0+16212+65e1b35f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841127" version="1" comment="podman-plugins is &lt;3.0.1-13.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841128" version="1" comment="podman-remote is &lt;3.0.1-13.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841129" version="1" comment="podman-tests is &lt;3.0.1-13.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841130" version="1" comment="python3-criu is &lt;3.15-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841131" version="1" comment="runc is &lt;1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841132" version="1" comment="skopeo is &lt;1.2.4-2.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841133" version="1" comment="skopeo-tests is &lt;1.2.4-2.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841134" version="1" comment="slirp4netns is &lt;1.1.8-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841135" version="1" comment="toolbox is &lt;0.0.99.3-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841136" version="1" comment="toolbox-tests is &lt;0.0.99.3-1.module+el8.7.0+16212+65e1b35f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841137" version="1" comment="udica is &lt;0.2.4-1.module+el8.7.0+16212+65e1b35f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841138" version="1" comment="redis is &lt;6.2.7-1.module+el8.7.0+15197+cc495aeb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841139" version="1" comment="redis-devel is &lt;6.2.7-1.module+el8.7.0+15197+cc495aeb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841140" version="1" comment="redis-doc is &lt;6.2.7-1.module+el8.7.0+15197+cc495aeb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841141" version="1" comment="wavpack is &lt;5.1.0-16.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841142" version="1" comment="wavpack-devel is &lt;5.1.0-16.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841143" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841144" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841145" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841146" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841147" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841148" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841149" version="1" comment="xorg-x11-server-common is &lt;1.20.11-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841150" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841151" version="1" comment="xorg-x11-server-source is &lt;1.20.11-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841152" version="1" comment="xorg-x11-xtrans-devel is &lt;1.4.0-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841153" version="1" comment="libtiff is &lt;4.0.9-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841154" version="1" comment="libtiff-devel is &lt;4.0.9-23.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841155" version="1" comment="libtiff-tools is &lt;4.0.9-23.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841156" version="1" comment="python2 is &lt;2.7.18-11.module+el8.7.0+15681+7a92afba for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841157" version="1" comment="python2-debug is &lt;2.7.18-11.module+el8.7.0+15681+7a92afba for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841158" version="1" comment="python2-devel is &lt;2.7.18-11.module+el8.7.0+15681+7a92afba for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841159" version="1" comment="python2-libs is &lt;2.7.18-11.module+el8.7.0+15681+7a92afba for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841160" version="1" comment="python2-test is &lt;2.7.18-11.module+el8.7.0+15681+7a92afba for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841161" version="1" comment="python2-tkinter is &lt;2.7.18-11.module+el8.7.0+15681+7a92afba for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841162" version="1" comment="python2-tools is &lt;2.7.18-11.module+el8.7.0+15681+7a92afba for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841163" version="1" comment="poppler is &lt;20.11.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841164" version="1" comment="poppler-cpp is &lt;20.11.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841165" version="1" comment="poppler-cpp-devel is &lt;20.11.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841166" version="1" comment="poppler-devel is &lt;20.11.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841167" version="1" comment="poppler-glib is &lt;20.11.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841168" version="1" comment="poppler-glib-devel is &lt;20.11.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841169" version="1" comment="poppler-qt5 is &lt;20.11.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841170" version="1" comment="poppler-qt5-devel is &lt;20.11.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841171" version="1" comment="poppler-utils is &lt;20.11.0-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841172" version="1" comment="gstreamer1-plugins-good is &lt;1.16.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841173" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.16.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841174" version="1" comment="python3-unbound is &lt;1.16.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841175" version="1" comment="unbound is &lt;1.16.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841176" version="1" comment="unbound-devel is &lt;1.16.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841177" version="1" comment="unbound-libs is &lt;1.16.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841178" version="1" comment="dovecot is &lt;2.3.16-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841179" version="1" comment="dovecot-devel is &lt;2.3.16-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841180" version="1" comment="dovecot-mysql is &lt;2.3.16-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841181" version="1" comment="dovecot-pgsql is &lt;2.3.16-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841182" version="1" comment="dovecot-pigeonhole is &lt;2.3.16-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841183" version="1" comment="php is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841184" version="1" comment="php-bcmath is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841185" version="1" comment="php-cli is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841186" version="1" comment="php-common is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841187" version="1" comment="php-dba is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841188" version="1" comment="php-dbg is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841189" version="1" comment="php-devel is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841190" version="1" comment="php-embedded is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841191" version="1" comment="php-enchant is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841192" version="1" comment="php-ffi is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841193" version="1" comment="php-fpm is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841194" version="1" comment="php-gd is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841195" version="1" comment="php-gmp is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841196" version="1" comment="php-intl is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841197" version="1" comment="php-ldap is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841198" version="1" comment="php-mbstring is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841199" version="1" comment="php-mysqlnd is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841200" version="1" comment="php-odbc is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841201" version="1" comment="php-opcache is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841202" version="1" comment="php-pdo is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841203" version="1" comment="php-pgsql is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841204" version="1" comment="php-process is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841205" version="1" comment="php-snmp is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841206" version="1" comment="php-soap is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841207" version="1" comment="php-xml is &lt;8.0.20-2.module+el8.7.0+16187+bb5ab920 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841208" version="1" comment="php is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841209" version="1" comment="php-bcmath is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841210" version="1" comment="php-cli is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841211" version="1" comment="php-common is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841212" version="1" comment="php-dba is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841213" version="1" comment="php-dbg is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841214" version="1" comment="php-devel is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841215" version="1" comment="php-embedded is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841216" version="1" comment="php-enchant is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841217" version="1" comment="php-ffi is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841218" version="1" comment="php-fpm is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841219" version="1" comment="php-gd is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841220" version="1" comment="php-gmp is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841221" version="1" comment="php-intl is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841222" version="1" comment="php-json is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841223" version="1" comment="php-ldap is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841224" version="1" comment="php-mbstring is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841225" version="1" comment="php-mysqlnd is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841226" version="1" comment="php-odbc is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841227" version="1" comment="php-opcache is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841228" version="1" comment="php-pdo is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841229" version="1" comment="php-pear is &lt;1.10.13-1.module+el8.7.0+15127+a450a8db for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841230" version="1" comment="php-pgsql is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841231" version="1" comment="php-process is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841232" version="1" comment="php-snmp is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841233" version="1" comment="php-soap is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841234" version="1" comment="php-xml is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841235" version="1" comment="php-xmlrpc is &lt;7.4.30-1.module+el8.7.0+15886+8e29b882 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841236" version="1" comment="dnsmasq is &lt;2.79-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841237" version="1" comment="dnsmasq-utils is &lt;2.79-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841238" version="1" comment="openblas is &lt;0.3.15-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841239" version="1" comment="openblas-Rblas is &lt;0.3.15-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841240" version="1" comment="openblas-devel is &lt;0.3.15-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841241" version="1" comment="openblas-openmp is &lt;0.3.15-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841242" version="1" comment="openblas-openmp64 is &lt;0.3.15-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841243" version="1" comment="openblas-openmp64_ is &lt;0.3.15-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841244" version="1" comment="openblas-serial64 is &lt;0.3.15-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841245" version="1" comment="openblas-serial64_ is &lt;0.3.15-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841246" version="1" comment="openblas-static is &lt;0.3.15-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841247" version="1" comment="openblas-threads is &lt;0.3.15-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841248" version="1" comment="openblas-threads64 is &lt;0.3.15-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841249" version="1" comment="openblas-threads64_ is &lt;0.3.15-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841250" version="1" comment="mutt is &lt;2.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841251" version="1" comment="bind9.16 is &lt;9.16.23-0.9.el8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841252" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.9.el8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841253" version="1" comment="bind9.16-devel is &lt;9.16.23-0.9.el8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841254" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.9.el8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841255" version="1" comment="bind9.16-doc is &lt;9.16.23-0.9.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841256" version="1" comment="bind9.16-libs is &lt;9.16.23-0.9.el8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841257" version="1" comment="bind9.16-license is &lt;9.16.23-0.9.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841258" version="1" comment="bind9.16-utils is &lt;9.16.23-0.9.el8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841259" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.9.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841260" version="1" comment="openjpeg2 is &lt;2.4.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841261" version="1" comment="openjpeg2-devel is &lt;2.4.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841262" version="1" comment="openjpeg2-devel-docs is &lt;2.4.0-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841263" version="1" comment="openjpeg2-tools is &lt;2.4.0-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841264" version="1" comment="httpd is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841265" version="1" comment="httpd-devel is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841266" version="1" comment="httpd-filesystem is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841267" version="1" comment="httpd-manual is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841268" version="1" comment="httpd-tools is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841269" version="1" comment="mod_ldap is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841270" version="1" comment="mod_proxy_html is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841271" version="1" comment="mod_session is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841272" version="1" comment="mod_ssl is &lt;2.4.37-51.module+el8.7.0+16050+02173b8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841273" version="1" comment="grafana-pcp is &lt;3.2.0-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841274" version="1" comment="bpftool is &lt;4.18.0-425.3.1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841275" version="1" comment="kernel is &lt;4.18.0-425.3.1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841276" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-425.3.1.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841277" version="1" comment="kernel-core is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841278" version="1" comment="kernel-cross-headers is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841279" version="1" comment="kernel-debug is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841280" version="1" comment="kernel-debug-core is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841282" version="1" comment="kernel-debug-modules is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841283" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841285" version="1" comment="kernel-doc is &lt;4.18.0-425.3.1.el8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841286" version="1" comment="kernel-headers is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841287" version="1" comment="kernel-modules is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841288" version="1" comment="kernel-modules-extra is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841289" version="1" comment="kernel-tools is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841290" version="1" comment="kernel-tools-libs is &lt;4.18.0-425.3.1.el8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841292" version="1" comment="perf is &lt;4.18.0-425.3.1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841293" version="1" comment="python3-perf is &lt;4.18.0-425.3.1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841294" version="1" comment="xmlrpc-c is &lt;1.51.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841295" version="1" comment="xmlrpc-c-c++ is &lt;1.51.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841296" version="1" comment="xmlrpc-c-client is &lt;1.51.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841297" version="1" comment="xmlrpc-c-client++ is &lt;1.51.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841298" version="1" comment="xmlrpc-c-devel is &lt;1.51.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841299" version="1" comment="gdisk is &lt;1.0.3-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841300" version="1" comment="glib2 is &lt;2.56.4-159.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841301" version="1" comment="glib2-devel is &lt;2.56.4-159.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841302" version="1" comment="glib2-doc is &lt;2.56.4-159.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841303" version="1" comment="glib2-fam is &lt;2.56.4-159.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841304" version="1" comment="glib2-static is &lt;2.56.4-159.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841305" version="1" comment="glib2-tests is &lt;2.56.4-159.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841306" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841307" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841308" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841309" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841310" version="1" comment="libxml2 is &lt;2.9.7-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841311" version="1" comment="libxml2-devel is &lt;2.9.7-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841312" version="1" comment="python3-libxml2 is &lt;2.9.7-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841313" version="1" comment="e2fsprogs is &lt;1.45.6-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841314" version="1" comment="e2fsprogs-devel is &lt;1.45.6-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841315" version="1" comment="e2fsprogs-libs is &lt;1.45.6-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841316" version="1" comment="libcom_err is &lt;1.45.6-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841317" version="1" comment="libcom_err-devel is &lt;1.45.6-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841318" version="1" comment="libss is &lt;1.45.6-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841319" version="1" comment="libss-devel is &lt;1.45.6-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841320" version="1" comment="ldb-tools is &lt;2.5.2-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841321" version="1" comment="libldb is &lt;2.5.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841322" version="1" comment="libldb-devel is &lt;2.5.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841323" version="1" comment="python-ldb-devel-common is &lt;2.5.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841324" version="1" comment="python3-ldb is &lt;2.5.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841325" version="1" comment="python3-ldb-devel is &lt;2.5.2-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841326" version="1" comment="freetype is &lt;2.9.1-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841327" version="1" comment="freetype-devel is &lt;2.9.1-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841328" version="1" comment="bind is &lt;9.11.36-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841329" version="1" comment="bind-chroot is &lt;9.11.36-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841330" version="1" comment="bind-devel is &lt;9.11.36-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841331" version="1" comment="bind-export-devel is &lt;9.11.36-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841332" version="1" comment="bind-export-libs is &lt;9.11.36-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841333" version="1" comment="bind-libs is &lt;9.11.36-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841334" version="1" comment="bind-libs-lite is &lt;9.11.36-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841335" version="1" comment="bind-license is &lt;9.11.36-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841336" version="1" comment="bind-lite-devel is &lt;9.11.36-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841337" version="1" comment="bind-pkcs11 is &lt;9.11.36-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841338" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841339" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841340" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841341" version="1" comment="bind-sdb is &lt;9.11.36-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841342" version="1" comment="bind-sdb-chroot is &lt;9.11.36-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841343" version="1" comment="bind-utils is &lt;9.11.36-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841344" version="1" comment="python3-bind is &lt;9.11.36-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841345" version="1" comment="rsync is &lt;3.1.3-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841346" version="1" comment="rsync-daemon is &lt;3.1.3-19.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841347" version="1" comment="mingw32-expat is &lt;2.4.8-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841348" version="1" comment="mingw64-expat is &lt;2.4.8-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841349" version="1" comment="mingw32-zlib is &lt;1.2.8-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841350" version="1" comment="mingw32-zlib-static is &lt;1.2.8-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841351" version="1" comment="mingw64-zlib is &lt;1.2.8-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841352" version="1" comment="mingw64-zlib-static is &lt;1.2.8-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841353" version="1" comment="nodejs is &lt;18.9.1-1.module+el8.7.0+16806+4109802b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841354" version="1" comment="nodejs-devel is &lt;18.9.1-1.module+el8.7.0+16806+4109802b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841355" version="1" comment="nodejs-docs is &lt;18.9.1-1.module+el8.7.0+16806+4109802b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841356" version="1" comment="nodejs-full-i18n is &lt;18.9.1-1.module+el8.7.0+16806+4109802b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841357" version="1" comment="nodejs-nodemon is &lt;2.0.19-1.module+el8.7.0+16061+0a247725 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841358" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.7.0+15582+19c314fa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841359" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.7.0+15582+19c314fa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841360" version="1" comment="npm is &lt;8.19.1-1.18.9.1.1.module+el8.7.0+16806+4109802b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841361" version="1" comment="aardvark-dns is &lt;1.1.0-5.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841362" version="1" comment="buildah is &lt;1.27.2-2.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841363" version="1" comment="buildah-tests is &lt;1.27.2-2.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841364" version="1" comment="cockpit-podman is &lt;53-1.module+el8.7.0+17064+3b31f55c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841365" version="1" comment="conmon is &lt;2.1.4-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841366" version="1" comment="container-selinux is &lt;2.189.0-1.module+el8.7.0+17064+3b31f55c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841367" version="1" comment="containernetworking-plugins is &lt;1.1.1-3.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841368" version="1" comment="containers-common is &lt;1-43.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841369" version="1" comment="crit is &lt;3.15-3.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841370" version="1" comment="criu is &lt;3.15-3.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841371" version="1" comment="criu-devel is &lt;3.15-3.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841372" version="1" comment="criu-libs is &lt;3.15-3.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841373" version="1" comment="crun is &lt;1.5-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841374" version="1" comment="fuse-overlayfs is &lt;1.9-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841375" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841376" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841377" version="1" comment="netavark is &lt;1.1.0-7.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841378" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.6-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841379" version="1" comment="podman is &lt;4.2.0-4.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841380" version="1" comment="podman-catatonit is &lt;4.2.0-4.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841381" version="1" comment="podman-docker is &lt;4.2.0-4.module+el8.7.0+17064+3b31f55c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841382" version="1" comment="podman-gvproxy is &lt;4.2.0-4.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841383" version="1" comment="podman-plugins is &lt;4.2.0-4.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841384" version="1" comment="podman-remote is &lt;4.2.0-4.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841385" version="1" comment="podman-tests is &lt;4.2.0-4.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841386" version="1" comment="python3-criu is &lt;3.15-3.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841387" version="1" comment="python3-podman is &lt;4.2.1-1.module+el8.7.0+17064+3b31f55c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841388" version="1" comment="runc is &lt;1.1.4-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841389" version="1" comment="skopeo is &lt;1.9.3-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841390" version="1" comment="skopeo-tests is &lt;1.9.3-1.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841391" version="1" comment="slirp4netns is &lt;1.2.0-2.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841392" version="1" comment="toolbox is &lt;0.0.99.3-0.6.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841393" version="1" comment="toolbox-tests is &lt;0.0.99.3-0.6.module+el8.7.0+17064+3b31f55c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841394" version="1" comment="udica is &lt;0.2.6-3.module+el8.7.0+17064+3b31f55c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841395" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.0-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841396" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.0-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841397" version="1" comment="dotnet is &lt;7.0.100-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841398" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.0-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841399" version="1" comment="dotnet-host is &lt;7.0.0-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841400" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.0-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841401" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.0-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841402" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.100-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841403" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.100-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841404" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.0-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841405" version="1" comment="dotnet-templates-7.0 is &lt;7.0.100-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841406" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.100-0.4.rc2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841407" version="1" comment="nodejs is &lt;14.20.1-2.module+el8.7.0+16991+b0a68a3e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841408" version="1" comment="nodejs-devel is &lt;14.20.1-2.module+el8.7.0+16991+b0a68a3e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841409" version="1" comment="nodejs-docs is &lt;14.20.1-2.module+el8.7.0+16991+b0a68a3e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841410" version="1" comment="nodejs-full-i18n is &lt;14.20.1-2.module+el8.7.0+16991+b0a68a3e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841411" version="1" comment="nodejs-nodemon is &lt;2.0.19-2.module+el8.7.0+16991+b0a68a3e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841412" version="1" comment="npm is &lt;6.14.17-1.14.20.1.2.module+el8.7.0+16991+b0a68a3e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841413" version="1" comment="device-mapper-multipath is &lt;0.8.4-28.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841414" version="1" comment="device-mapper-multipath-devel is &lt;0.8.4-28.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841415" version="1" comment="device-mapper-multipath-libs is &lt;0.8.4-28.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841416" version="1" comment="kpartx is &lt;0.8.4-28.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841417" version="1" comment="libdmmp is &lt;0.8.4-28.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841418" version="1" comment="thunderbird is &lt;102.5.0-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841419" version="1" comment="firefox is &lt;102.5.0-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841420" version="1" comment="krb5-devel is &lt;1.18.2-22.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841421" version="1" comment="krb5-libs is &lt;1.18.2-22.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841422" version="1" comment="krb5-pkinit is &lt;1.18.2-22.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841423" version="1" comment="krb5-server is &lt;1.18.2-22.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841424" version="1" comment="krb5-server-ldap is &lt;1.18.2-22.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841425" version="1" comment="krb5-workstation is &lt;1.18.2-22.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841426" version="1" comment="libkadm5 is &lt;1.18.2-22.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841427" version="1" comment="varnish is &lt;6.0.8-2.module+el8.7.0+17239+94d153bd.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841428" version="1" comment="varnish-devel is &lt;6.0.8-2.module+el8.7.0+17239+94d153bd.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841429" version="1" comment="varnish-docs is &lt;6.0.8-2.module+el8.7.0+17239+94d153bd.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841430" version="1" comment="nodejs is &lt;18.12.1-2.module+el8.7.0+17306+fc023f99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841431" version="1" comment="nodejs-devel is &lt;18.12.1-2.module+el8.7.0+17306+fc023f99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841432" version="1" comment="nodejs-docs is &lt;18.12.1-2.module+el8.7.0+17306+fc023f99 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841433" version="1" comment="nodejs-full-i18n is &lt;18.12.1-2.module+el8.7.0+17306+fc023f99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841434" version="1" comment="nodejs-nodemon is &lt;2.0.20-1.module+el8.7.0+17282+f47dd33b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841435" version="1" comment="npm is &lt;8.19.2-1.18.12.1.2.module+el8.7.0+17306+fc023f99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841436" version="1" comment="prometheus-jmx-exporter is &lt;0.12.0-9.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841437" version="1" comment="prometheus-jmx-exporter-openjdk11 is &lt;0.12.0-9.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841438" version="1" comment="prometheus-jmx-exporter-openjdk17 is &lt;0.12.0-9.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841439" version="1" comment="prometheus-jmx-exporter-openjdk8 is &lt;0.12.0-9.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841440" version="1" comment="firefox is &lt;102.6.0-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841441" version="1" comment="nodejs is &lt;16.18.1-3.module+el8.7.0+17465+1a1abd74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841442" version="1" comment="nodejs-devel is &lt;16.18.1-3.module+el8.7.0+17465+1a1abd74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841443" version="1" comment="nodejs-docs is &lt;16.18.1-3.module+el8.7.0+17465+1a1abd74 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841444" version="1" comment="nodejs-full-i18n is &lt;16.18.1-3.module+el8.7.0+17465+1a1abd74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841445" version="1" comment="nodejs-nodemon is &lt;2.0.20-2.module+el8.7.0+17412+bb0e4a6b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841446" version="1" comment="npm is &lt;8.19.2-1.16.18.1.3.module+el8.7.0+17465+1a1abd74 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841447" version="1" comment="thunderbird is &lt;102.6.0-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841448" version="1" comment="nodejs is &lt;14.21.1-2.module+el8.7.0+17528+a329cd47 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841449" version="1" comment="nodejs-devel is &lt;14.21.1-2.module+el8.7.0+17528+a329cd47 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841450" version="1" comment="nodejs-docs is &lt;14.21.1-2.module+el8.7.0+17528+a329cd47 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841451" version="1" comment="nodejs-full-i18n is &lt;14.21.1-2.module+el8.7.0+17528+a329cd47 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841452" version="1" comment="nodejs-nodemon is &lt;2.0.20-2.module+el8.7.0+17528+a329cd47 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841453" version="1" comment="npm is &lt;6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841454" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.13-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841455" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.13-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841456" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.13-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841457" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.13-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841458" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.13-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841459" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.113-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841460" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.113-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841461" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.13-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841462" version="1" comment="dotnet-templates-6.0 is &lt;6.0.113-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841463" version="1" comment="usbguard is &lt;1.0.0-8.el8_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841464" version="1" comment="usbguard-dbus is &lt;1.0.0-8.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841465" version="1" comment="usbguard-notifier is &lt;1.0.0-8.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841466" version="1" comment="usbguard-selinux is &lt;1.0.0-8.el8_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841467" version="1" comment="usbguard-tools is &lt;1.0.0-8.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841468" version="1" comment="libtiff is &lt;4.0.9-26.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841469" version="1" comment="libtiff-devel is &lt;4.0.9-26.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841470" version="1" comment="libtiff-tools is &lt;4.0.9-26.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841471" version="1" comment="dbus is &lt;1.12.8-23.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841472" version="1" comment="dbus-common is &lt;1.12.8-23.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841473" version="1" comment="dbus-daemon is &lt;1.12.8-23.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841474" version="1" comment="dbus-devel is &lt;1.12.8-23.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841475" version="1" comment="dbus-libs is &lt;1.12.8-23.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841476" version="1" comment="dbus-tools is &lt;1.12.8-23.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841477" version="1" comment="dbus-x11 is &lt;1.12.8-23.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841478" version="1" comment="systemd is &lt;239-68.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841479" version="1" comment="systemd-container is &lt;239-68.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841480" version="1" comment="systemd-devel is &lt;239-68.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841481" version="1" comment="systemd-journal-remote is &lt;239-68.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841482" version="1" comment="systemd-libs is &lt;239-68.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841483" version="1" comment="systemd-pam is &lt;239-68.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841484" version="1" comment="systemd-tests is &lt;239-68.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841485" version="1" comment="systemd-udev is &lt;239-68.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841486" version="1" comment="bpftool is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841487" version="1" comment="kernel is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841488" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-425.10.1.el8_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841489" version="1" comment="kernel-core is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841490" version="1" comment="kernel-cross-headers is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841491" version="1" comment="kernel-debug is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841492" version="1" comment="kernel-debug-core is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841494" version="1" comment="kernel-debug-modules is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841495" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841497" version="1" comment="kernel-doc is &lt;4.18.0-425.10.1.el8_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841498" version="1" comment="kernel-headers is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841499" version="1" comment="kernel-modules is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841500" version="1" comment="kernel-modules-extra is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841501" version="1" comment="kernel-tools is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841502" version="1" comment="kernel-tools-libs is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841504" version="1" comment="perf is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841505" version="1" comment="python3-perf is &lt;4.18.0-425.10.1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841506" version="1" comment="expat is &lt;2.2.5-10.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841507" version="1" comment="expat-devel is &lt;2.2.5-10.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841508" version="1" comment="lemon is &lt;3.26.0-17.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841509" version="1" comment="sqlite is &lt;3.26.0-17.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841510" version="1" comment="sqlite-devel is &lt;3.26.0-17.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841511" version="1" comment="sqlite-doc is &lt;3.26.0-17.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841512" version="1" comment="sqlite-libs is &lt;3.26.0-17.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841513" version="1" comment="postgresql is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841514" version="1" comment="postgresql-contrib is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841515" version="1" comment="postgresql-docs is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841516" version="1" comment="postgresql-plperl is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841517" version="1" comment="postgresql-plpython3 is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841518" version="1" comment="postgresql-pltcl is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841519" version="1" comment="postgresql-server is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841520" version="1" comment="postgresql-server-devel is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841521" version="1" comment="postgresql-static is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841522" version="1" comment="postgresql-test is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841523" version="1" comment="postgresql-test-rpm-macros is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841524" version="1" comment="postgresql-upgrade is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841525" version="1" comment="postgresql-upgrade-devel is &lt;10.23-1.module+el8.7.0+17280+3a452e1f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841526" version="1" comment="libtasn1 is &lt;4.13-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841527" version="1" comment="libtasn1-devel is &lt;4.13-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841528" version="1" comment="libtasn1-tools is &lt;4.13-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841529" version="1" comment="dpdk is &lt;21.11-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841530" version="1" comment="dpdk-devel is &lt;21.11-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841531" version="1" comment="dpdk-doc is &lt;21.11-2.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841532" version="1" comment="dpdk-tools is &lt;21.11-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841533" version="1" comment="libxml2 is &lt;2.9.7-15.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841534" version="1" comment="libxml2-devel is &lt;2.9.7-15.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841535" version="1" comment="python3-libxml2 is &lt;2.9.7-15.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841536" version="1" comment="java-17-openjdk is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841537" version="1" comment="java-17-openjdk-demo is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841538" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841539" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841540" version="1" comment="java-17-openjdk-devel is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841541" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841542" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841543" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841544" version="1" comment="java-17-openjdk-headless is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841545" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841546" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841547" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841548" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841549" version="1" comment="java-17-openjdk-jmods is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841550" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841551" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841552" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841553" version="1" comment="java-17-openjdk-src is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841554" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841555" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841556" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841557" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841558" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.6.0.10-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841559" version="1" comment="java-11-openjdk is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841560" version="1" comment="java-11-openjdk-demo is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841561" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841562" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841563" version="1" comment="java-11-openjdk-devel is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841564" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841565" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841566" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841567" version="1" comment="java-11-openjdk-headless is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841568" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841569" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841570" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841571" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841572" version="1" comment="java-11-openjdk-jmods is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841573" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841574" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841575" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841576" version="1" comment="java-11-openjdk-src is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841577" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841578" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841579" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841580" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841581" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.18.0.10-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841582" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841583" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841584" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841585" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841586" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841587" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841588" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841589" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841590" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841591" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841592" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841593" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841594" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841595" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841596" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.362.b09-2.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841597" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.362.b09-2.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841598" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841599" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841600" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841601" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.362.b09-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841602" version="1" comment="sudo is &lt;1.8.29-8.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841603" version="1" comment="firefox is &lt;102.7.0-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841604" version="1" comment="libXpm is &lt;3.5.12-9.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841605" version="1" comment="libXpm-devel is &lt;3.5.12-9.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841606" version="1" comment="delve is &lt;1.8.3-1.module+el8.7.0+15126+0e0a42d9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841607" version="1" comment="go-toolset is &lt;1.18.9-1.module+el8.7.0+17845+708ebe87 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841608" version="1" comment="golang is &lt;1.18.9-1.module+el8.7.0+17640+84246675 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841609" version="1" comment="golang-bin is &lt;1.18.9-1.module+el8.7.0+17640+84246675 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841610" version="1" comment="golang-docs is &lt;1.18.9-1.module+el8.7.0+17640+84246675 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841611" version="1" comment="golang-misc is &lt;1.18.9-1.module+el8.7.0+17640+84246675 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841612" version="1" comment="golang-race is &lt;1.18.9-1.module+el8.7.0+17640+84246675 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841613" version="1" comment="golang-src is &lt;1.18.9-1.module+el8.7.0+17640+84246675 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841614" version="1" comment="golang-tests is &lt;1.18.9-1.module+el8.7.0+17640+84246675 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841615" version="1" comment="thunderbird is &lt;102.7.1-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841616" version="1" comment="thunderbird is &lt;102.7.1-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841617" version="1" comment="git is &lt;2.31.1-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841618" version="1" comment="git-all is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841619" version="1" comment="git-core is &lt;2.31.1-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841620" version="1" comment="git-core-doc is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841621" version="1" comment="git-credential-libsecret is &lt;2.31.1-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841622" version="1" comment="git-daemon is &lt;2.31.1-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841623" version="1" comment="git-email is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841624" version="1" comment="git-gui is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841625" version="1" comment="git-instaweb is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841626" version="1" comment="git-subtree is &lt;2.31.1-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841627" version="1" comment="git-svn is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841628" version="1" comment="gitk is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841629" version="1" comment="gitweb is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841630" version="1" comment="perl-Git is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841631" version="1" comment="perl-Git-SVN is &lt;2.31.1-3.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841632" version="1" comment="libksba is &lt;1.3.5-9.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841633" version="1" comment="libksba-devel is &lt;1.3.5-9.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841634" version="1" comment="tigervnc is &lt;1.12.0-9.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841635" version="1" comment="tigervnc-icons is &lt;1.12.0-9.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841636" version="1" comment="tigervnc-license is &lt;1.12.0-9.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841637" version="1" comment="tigervnc-selinux is &lt;1.12.0-9.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841638" version="1" comment="tigervnc-server is &lt;1.12.0-9.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841639" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-9.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841640" version="1" comment="tigervnc-server-module is &lt;1.12.0-9.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841641" version="1" comment="firefox is &lt;102.8.0-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841642" version="1" comment="thunderbird is &lt;102.8.0-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841643" version="1" comment="bpftool is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841644" version="1" comment="kernel is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841645" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-425.13.1.el8_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841646" version="1" comment="kernel-core is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841647" version="1" comment="kernel-cross-headers is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841648" version="1" comment="kernel-debug is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841649" version="1" comment="kernel-debug-core is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841651" version="1" comment="kernel-debug-modules is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841652" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841654" version="1" comment="kernel-doc is &lt;4.18.0-425.13.1.el8_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841655" version="1" comment="kernel-headers is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841656" version="1" comment="kernel-modules is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841657" version="1" comment="kernel-modules-extra is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841658" version="1" comment="kernel-tools is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841659" version="1" comment="kernel-tools-libs is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841661" version="1" comment="perf is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841662" version="1" comment="python3-perf is &lt;4.18.0-425.13.1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841663" version="1" comment="platform-python is &lt;3.6.8-48.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841664" version="1" comment="platform-python-debug is &lt;3.6.8-48.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841665" version="1" comment="platform-python-devel is &lt;3.6.8-48.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841666" version="1" comment="python3-idle is &lt;3.6.8-48.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841667" version="1" comment="python3-libs is &lt;3.6.8-48.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841668" version="1" comment="python3-test is &lt;3.6.8-48.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841669" version="1" comment="python3-tkinter is &lt;3.6.8-48.el8_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841670" version="1" comment="platform-python-setuptools is &lt;39.2.0-6.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841671" version="1" comment="python3-setuptools is &lt;39.2.0-6.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841672" version="1" comment="python3-setuptools-wheel is &lt;39.2.0-6.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841673" version="1" comment="systemd is &lt;239-68.el8_7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841674" version="1" comment="systemd-container is &lt;239-68.el8_7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841675" version="1" comment="systemd-devel is &lt;239-68.el8_7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841676" version="1" comment="systemd-journal-remote is &lt;239-68.el8_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841677" version="1" comment="systemd-libs is &lt;239-68.el8_7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841678" version="1" comment="systemd-pam is &lt;239-68.el8_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841679" version="1" comment="systemd-tests is &lt;239-68.el8_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841680" version="1" comment="systemd-udev is &lt;239-68.el8_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841681" version="1" comment="ctdb is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841682" version="1" comment="libsmbclient is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841683" version="1" comment="libsmbclient-devel is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841684" version="1" comment="libwbclient is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841685" version="1" comment="libwbclient-devel is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841686" version="1" comment="python3-samba is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841687" version="1" comment="python3-samba-test is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841688" version="1" comment="samba is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841689" version="1" comment="samba-client is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841690" version="1" comment="samba-client-libs is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841691" version="1" comment="samba-common is &lt;4.16.4-4.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841692" version="1" comment="samba-common-libs is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841693" version="1" comment="samba-common-tools is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841694" version="1" comment="samba-devel is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841695" version="1" comment="samba-krb5-printing is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841696" version="1" comment="samba-libs is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841697" version="1" comment="samba-pidl is &lt;4.16.4-4.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841698" version="1" comment="samba-test is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841699" version="1" comment="samba-test-libs is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841700" version="1" comment="samba-vfs-iouring is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841701" version="1" comment="samba-winbind is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841702" version="1" comment="samba-winbind-clients is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841703" version="1" comment="samba-winbind-krb5-locator is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841704" version="1" comment="samba-winbind-modules is &lt;4.16.4-4.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841705" version="1" comment="samba-winexe is &lt;4.16.4-4.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841706" version="1" comment="tar is &lt;1.30-6.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841707" version="1" comment="php is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841708" version="1" comment="php-bcmath is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841709" version="1" comment="php-cli is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841710" version="1" comment="php-common is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841711" version="1" comment="php-dba is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841712" version="1" comment="php-dbg is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841713" version="1" comment="php-devel is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841714" version="1" comment="php-embedded is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841715" version="1" comment="php-enchant is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841716" version="1" comment="php-ffi is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841717" version="1" comment="php-fpm is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841718" version="1" comment="php-gd is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841719" version="1" comment="php-gmp is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841720" version="1" comment="php-intl is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841721" version="1" comment="php-ldap is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841722" version="1" comment="php-mbstring is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841723" version="1" comment="php-mysqlnd is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841724" version="1" comment="php-odbc is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841725" version="1" comment="php-opcache is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841726" version="1" comment="php-pdo is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841727" version="1" comment="php-pgsql is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841728" version="1" comment="php-process is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841729" version="1" comment="php-snmp is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841730" version="1" comment="php-soap is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841731" version="1" comment="php-xml is &lt;8.0.27-1.module+el8.7.0+17863+0ad92cd2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841732" version="1" comment="httpd is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841733" version="1" comment="httpd-devel is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841734" version="1" comment="httpd-filesystem is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841735" version="1" comment="httpd-manual is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841736" version="1" comment="httpd-tools is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841737" version="1" comment="mod_ldap is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841738" version="1" comment="mod_proxy_html is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841739" version="1" comment="mod_session is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841740" version="1" comment="mod_ssl is &lt;2.4.37-51.module+el8.7.0+18026+7b169787.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841741" version="1" comment="pcs is &lt;0.10.14-5.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841742" version="1" comment="pcs-snmp is &lt;0.10.14-5.el8_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841743" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el8_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841744" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el8_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841745" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el8_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841746" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el8_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841747" version="1" comment="curl is &lt;7.61.1-25.el8_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841748" version="1" comment="libcurl is &lt;7.61.1-25.el8_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841749" version="1" comment="libcurl-devel is &lt;7.61.1-25.el8_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841750" version="1" comment="libcurl-minimal is &lt;7.61.1-25.el8_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841751" version="1" comment="nss is &lt;3.79.0-11.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841752" version="1" comment="nss-devel is &lt;3.79.0-11.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841753" version="1" comment="nss-softokn is &lt;3.79.0-11.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841754" version="1" comment="nss-softokn-devel is &lt;3.79.0-11.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841755" version="1" comment="nss-softokn-freebl is &lt;3.79.0-11.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841756" version="1" comment="nss-softokn-freebl-devel is &lt;3.79.0-11.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841757" version="1" comment="nss-sysinit is &lt;3.79.0-11.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841758" version="1" comment="nss-tools is &lt;3.79.0-11.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841759" version="1" comment="nss-util is &lt;3.79.0-11.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841760" version="1" comment="nss-util-devel is &lt;3.79.0-11.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841761" version="1" comment="firefox is &lt;102.9.0-3.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841762" version="1" comment="thunderbird is &lt;102.9.0-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841763" version="1" comment="openssl is &lt;1.1.1k-9.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841764" version="1" comment="openssl-devel is &lt;1.1.1k-9.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841765" version="1" comment="openssl-libs is &lt;1.1.1k-9.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841766" version="1" comment="openssl-perl is &lt;1.1.1k-9.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841767" version="1" comment="tigervnc is &lt;1.12.0-9.el8_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841768" version="1" comment="tigervnc-icons is &lt;1.12.0-9.el8_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841769" version="1" comment="tigervnc-license is &lt;1.12.0-9.el8_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841770" version="1" comment="tigervnc-selinux is &lt;1.12.0-9.el8_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841771" version="1" comment="tigervnc-server is &lt;1.12.0-9.el8_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841772" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-9.el8_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841773" version="1" comment="tigervnc-server-module is &lt;1.12.0-9.el8_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841774" version="1" comment="bpftool is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841775" version="1" comment="kernel is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841776" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-425.19.2.el8_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841777" version="1" comment="kernel-core is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841778" version="1" comment="kernel-cross-headers is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841779" version="1" comment="kernel-debug is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841780" version="1" comment="kernel-debug-core is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841782" version="1" comment="kernel-debug-modules is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841783" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841785" version="1" comment="kernel-doc is &lt;4.18.0-425.19.2.el8_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841786" version="1" comment="kernel-headers is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841787" version="1" comment="kernel-modules is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841788" version="1" comment="kernel-modules-extra is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841789" version="1" comment="kernel-tools is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841790" version="1" comment="kernel-tools-libs is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841792" version="1" comment="perf is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841793" version="1" comment="python3-perf is &lt;4.18.0-425.19.2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841794" version="1" comment="gnutls is &lt;3.6.16-6.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841795" version="1" comment="gnutls-c++ is &lt;3.6.16-6.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841796" version="1" comment="gnutls-dane is &lt;3.6.16-6.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841797" version="1" comment="gnutls-devel is &lt;3.6.16-6.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841798" version="1" comment="gnutls-utils is &lt;3.6.16-6.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841799" version="1" comment="pesign is &lt;0.112-27.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841800" version="1" comment="postgresql is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841801" version="1" comment="postgresql-contrib is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841802" version="1" comment="postgresql-docs is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841803" version="1" comment="postgresql-plperl is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841804" version="1" comment="postgresql-plpython3 is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841805" version="1" comment="postgresql-pltcl is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841806" version="1" comment="postgresql-server is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841807" version="1" comment="postgresql-server-devel is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841808" version="1" comment="postgresql-static is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841809" version="1" comment="postgresql-test is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841810" version="1" comment="postgresql-test-rpm-macros is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841811" version="1" comment="postgresql-upgrade is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841812" version="1" comment="postgresql-upgrade-devel is &lt;13.10-1.module+el8.7.0+18279+1ca8cf12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841813" version="1" comment="nodejs is &lt;16.19.1-1.module+el8.7.0+18373+704f5cef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841814" version="1" comment="nodejs-devel is &lt;16.19.1-1.module+el8.7.0+18373+704f5cef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841815" version="1" comment="nodejs-docs is &lt;16.19.1-1.module+el8.7.0+18373+704f5cef for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841816" version="1" comment="nodejs-full-i18n is &lt;16.19.1-1.module+el8.7.0+18373+704f5cef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841817" version="1" comment="nodejs-nodemon is &lt;2.0.20-3.module+el8.7.0+18373+704f5cef for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841818" version="1" comment="npm is &lt;8.19.3-1.16.19.1.1.module+el8.7.0+18373+704f5cef for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841819" version="1" comment="nodejs is &lt;18.14.2-2.module+el8.7.0+18445+9493b6ea for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841820" version="1" comment="nodejs-devel is &lt;18.14.2-2.module+el8.7.0+18445+9493b6ea for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841821" version="1" comment="nodejs-docs is &lt;18.14.2-2.module+el8.7.0+18445+9493b6ea for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841822" version="1" comment="nodejs-full-i18n is &lt;18.14.2-2.module+el8.7.0+18445+9493b6ea for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841823" version="1" comment="nodejs-nodemon is &lt;2.0.20-2.module+el8.7.0+18445+9493b6ea for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841824" version="1" comment="npm is &lt;9.5.0-1.18.14.2.2.module+el8.7.0+18445+9493b6ea for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841825" version="1" comment="httpd is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841826" version="1" comment="httpd-devel is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841827" version="1" comment="httpd-filesystem is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841828" version="1" comment="httpd-manual is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841829" version="1" comment="httpd-tools is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841830" version="1" comment="mod_http2 is &lt;1.15.7-5.module+el8.7.0+18499+2e106f0b.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841831" version="1" comment="mod_ldap is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841832" version="1" comment="mod_proxy_html is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841833" version="1" comment="mod_session is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841834" version="1" comment="mod_ssl is &lt;2.4.37-51.module+el8.7.0+18499+2e106f0b.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841835" version="1" comment="nodejs is &lt;14.21.3-1.module+el8.7.0+18531+81d21ca6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841836" version="1" comment="nodejs-devel is &lt;14.21.3-1.module+el8.7.0+18531+81d21ca6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841837" version="1" comment="nodejs-docs is &lt;14.21.3-1.module+el8.7.0+18531+81d21ca6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841838" version="1" comment="nodejs-full-i18n is &lt;14.21.3-1.module+el8.7.0+18531+81d21ca6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841839" version="1" comment="nodejs-nodemon is &lt;2.0.20-3.module+el8.7.0+18531+81d21ca6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841840" version="1" comment="npm is &lt;6.14.18-1.14.21.3.1.module+el8.7.0+18531+81d21ca6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841841" version="1" comment="firefox is &lt;102.10.0-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841842" version="1" comment="thunderbird is &lt;102.10.0-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841843" version="1" comment="java-11-openjdk is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841844" version="1" comment="java-11-openjdk-demo is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841845" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841846" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841847" version="1" comment="java-11-openjdk-devel is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841848" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841849" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841850" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841851" version="1" comment="java-11-openjdk-headless is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841852" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841853" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841854" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841855" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841856" version="1" comment="java-11-openjdk-jmods is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841857" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841858" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841859" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841860" version="1" comment="java-11-openjdk-src is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841861" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841862" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841863" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841864" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841865" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.19.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841866" version="1" comment="java-17-openjdk is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841867" version="1" comment="java-17-openjdk-demo is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841868" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841869" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841870" version="1" comment="java-17-openjdk-devel is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841871" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841872" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841873" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841874" version="1" comment="java-17-openjdk-headless is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841875" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841876" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841877" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841878" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841879" version="1" comment="java-17-openjdk-jmods is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841880" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841881" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841882" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841883" version="1" comment="java-17-openjdk-src is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841884" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841885" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841886" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841887" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841888" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.7.0.7-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841889" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841890" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841891" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841892" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841893" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841894" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841895" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841896" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841897" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841898" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841899" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841900" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841901" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841902" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841903" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.372.b07-1.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841904" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.372.b07-1.el8_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841905" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841906" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841907" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841908" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.372.b07-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841909" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el8_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841910" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el8_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841911" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el8_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841912" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el8_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841913" version="1" comment="emacs is &lt;26.1-7.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841914" version="1" comment="emacs-common is &lt;26.1-7.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841915" version="1" comment="emacs-filesystem is &lt;26.1-7.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841916" version="1" comment="emacs-lucid is &lt;26.1-7.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841917" version="1" comment="emacs-nox is &lt;26.1-7.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841918" version="1" comment="emacs-terminal is &lt;26.1-7.el8_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841919" version="1" comment="libwebp is &lt;1.0.0-8.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841920" version="1" comment="libwebp-devel is &lt;1.0.0-8.el8_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841921" version="1" comment="libreswan is &lt;4.5-1.el8_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841922" version="1" comment="aardvark-dns is &lt;1.5.0-2.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841923" version="1" comment="buildah is &lt;1.29.1-1.module+el8.8.0+18195+471da4bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841924" version="1" comment="buildah-tests is &lt;1.29.1-1.module+el8.8.0+18195+471da4bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841925" version="1" comment="cockpit-podman is &lt;63.1-1.module+el8.8.0+18286+cd236dce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841926" version="1" comment="conmon is &lt;2.1.6-1.module+el8.8.0+18098+9b44df5f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841927" version="1" comment="container-selinux is &lt;2.205.0-2.module+el8.8.0+18438+15d3aa65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841928" version="1" comment="containernetworking-plugins is &lt;1.2.0-1.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841929" version="1" comment="containers-common is &lt;1-63.module+el8.8.0+18438+15d3aa65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841930" version="1" comment="crit is &lt;3.15-3.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841931" version="1" comment="criu is &lt;3.15-3.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841932" version="1" comment="criu-devel is &lt;3.15-3.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841933" version="1" comment="criu-libs is &lt;3.15-3.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841934" version="1" comment="crun is &lt;1.8.1-2.module+el8.8.0+18418+f0e540fe for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841935" version="1" comment="fuse-overlayfs is &lt;1.10-1.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841936" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841937" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841938" version="1" comment="netavark is &lt;1.5.0-4.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841939" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.8-1.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841940" version="1" comment="podman is &lt;4.4.1-8.module+el8.8.0+18438+15d3aa65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841941" version="1" comment="podman-catatonit is &lt;4.4.1-8.module+el8.8.0+18438+15d3aa65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841942" version="1" comment="podman-docker is &lt;4.4.1-8.module+el8.8.0+18438+15d3aa65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841943" version="1" comment="podman-gvproxy is &lt;4.4.1-8.module+el8.8.0+18438+15d3aa65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841944" version="1" comment="podman-plugins is &lt;4.4.1-8.module+el8.8.0+18438+15d3aa65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841945" version="1" comment="podman-remote is &lt;4.4.1-8.module+el8.8.0+18438+15d3aa65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841946" version="1" comment="podman-tests is &lt;4.4.1-8.module+el8.8.0+18438+15d3aa65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841947" version="1" comment="python3-criu is &lt;3.15-3.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841948" version="1" comment="python3-podman is &lt;4.4.1-1.module+el8.8.0+18275+3a56cc62 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841949" version="1" comment="runc is &lt;1.1.4-1.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841950" version="1" comment="skopeo is &lt;1.11.2-0.2.module+el8.8.0+18251+ad5b274c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841951" version="1" comment="skopeo-tests is &lt;1.11.2-0.2.module+el8.8.0+18251+ad5b274c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841952" version="1" comment="slirp4netns is &lt;1.2.0-2.module+el8.8.0+18060+3f21f2cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841953" version="1" comment="toolbox is &lt;0.0.99.3-7.module+el8.8.0+18119+e3deee03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841954" version="1" comment="toolbox-tests is &lt;0.0.99.3-7.module+el8.8.0+18119+e3deee03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841955" version="1" comment="udica is &lt;0.2.6-20.module+el8.8.0+18060+3f21f2cc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841956" version="1" comment="python3-unbound is &lt;1.16.2-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841957" version="1" comment="unbound is &lt;1.16.2-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841958" version="1" comment="unbound-devel is &lt;1.16.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841959" version="1" comment="unbound-libs is &lt;1.16.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841960" version="1" comment="grafana is &lt;7.5.15-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841961" version="1" comment="grafana-pcp is &lt;3.2.0-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841962" version="1" comment="libwayland-client is &lt;1.21.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841963" version="1" comment="libwayland-cursor is &lt;1.21.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841964" version="1" comment="libwayland-egl is &lt;1.21.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841965" version="1" comment="libwayland-server is &lt;1.21.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841966" version="1" comment="wayland-devel is &lt;1.21.0-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841967" version="1" comment="bind9.16 is &lt;9.16.23-0.14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841968" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841969" version="1" comment="bind9.16-devel is &lt;9.16.23-0.14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841970" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841971" version="1" comment="bind9.16-doc is &lt;9.16.23-0.14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841972" version="1" comment="bind9.16-libs is &lt;9.16.23-0.14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841973" version="1" comment="bind9.16-license is &lt;9.16.23-0.14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841974" version="1" comment="bind9.16-utils is &lt;9.16.23-0.14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841975" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841976" version="1" comment="sysstat is &lt;11.7.3-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841977" version="1" comment="frr is &lt;7.5.1-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841978" version="1" comment="frr-selinux is &lt;7.5.1-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841979" version="1" comment="aardvark-dns is &lt;1.0.1-37.module+el8.8.0+17954+9046de88 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841980" version="1" comment="buildah is &lt;1.24.6-5.module+el8.8.0+18083+cd85596b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841981" version="1" comment="buildah-tests is &lt;1.24.6-5.module+el8.8.0+18083+cd85596b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841982" version="1" comment="cockpit-podman is &lt;46-1.module+el8.8.0+17821+de1b53f1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841983" version="1" comment="conmon is &lt;2.1.4-1.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841984" version="1" comment="container-selinux is &lt;2.199.0-1.module+el8.8.0+18113+8b5b6979 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841985" version="1" comment="containernetworking-plugins is &lt;1.1.1-2.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841986" version="1" comment="containers-common is &lt;1-37.module+el8.8.0+17954+9046de88 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841987" version="1" comment="crit is &lt;3.15-3.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841988" version="1" comment="criu is &lt;3.15-3.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841989" version="1" comment="criu-devel is &lt;3.15-3.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841990" version="1" comment="criu-libs is &lt;3.15-3.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841991" version="1" comment="crun is &lt;1.6-1.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841992" version="1" comment="fuse-overlayfs is &lt;1.9-1.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841993" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841994" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841995" version="1" comment="netavark is &lt;1.0.1-37.module+el8.8.0+17954+9046de88 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841996" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.5-2.module+el8.8.0+18083+cd85596b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841997" version="1" comment="podman is &lt;4.0.2-20.module+el8.8.0+18201+6ad7332c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841998" version="1" comment="podman-catatonit is &lt;4.0.2-20.module+el8.8.0+18201+6ad7332c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009841999" version="1" comment="podman-docker is &lt;4.0.2-20.module+el8.8.0+18201+6ad7332c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842000" version="1" comment="podman-gvproxy is &lt;4.0.2-20.module+el8.8.0+18201+6ad7332c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842001" version="1" comment="podman-plugins is &lt;4.0.2-20.module+el8.8.0+18201+6ad7332c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842002" version="1" comment="podman-remote is &lt;4.0.2-20.module+el8.8.0+18201+6ad7332c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842003" version="1" comment="podman-tests is &lt;4.0.2-20.module+el8.8.0+18201+6ad7332c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842004" version="1" comment="python3-criu is &lt;3.15-3.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842005" version="1" comment="python3-podman is &lt;4.0.0-1.module+el8.8.0+17821+de1b53f1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842006" version="1" comment="runc is &lt;1.1.4-1.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842007" version="1" comment="skopeo is &lt;1.6.2-6.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842008" version="1" comment="skopeo-tests is &lt;1.6.2-6.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842009" version="1" comment="slirp4netns is &lt;1.1.8-2.module+el8.8.0+17821+de1b53f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842010" version="1" comment="toolbox is &lt;0.0.99.3-7.module+el8.8.0+18115+45021590 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842011" version="1" comment="toolbox-tests is &lt;0.0.99.3-7.module+el8.8.0+18115+45021590 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842012" version="1" comment="udica is &lt;0.2.6-3.module+el8.8.0+17821+de1b53f1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842013" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842014" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842015" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842016" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842017" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842018" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842019" version="1" comment="xorg-x11-server-common is &lt;1.20.11-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842020" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-15.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842021" version="1" comment="xorg-x11-server-source is &lt;1.20.11-15.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842022" version="1" comment="poppler is &lt;20.11.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842023" version="1" comment="poppler-cpp is &lt;20.11.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842024" version="1" comment="poppler-cpp-devel is &lt;20.11.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842025" version="1" comment="poppler-devel is &lt;20.11.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842026" version="1" comment="poppler-glib is &lt;20.11.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842027" version="1" comment="poppler-glib-devel is &lt;20.11.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842028" version="1" comment="poppler-qt5 is &lt;20.11.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842029" version="1" comment="poppler-qt5-devel is &lt;20.11.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842030" version="1" comment="poppler-utils is &lt;20.11.0-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842031" version="1" comment="tigervnc is &lt;1.12.0-15.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842032" version="1" comment="tigervnc-icons is &lt;1.12.0-15.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842033" version="1" comment="tigervnc-license is &lt;1.12.0-15.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842034" version="1" comment="tigervnc-selinux is &lt;1.12.0-15.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842035" version="1" comment="tigervnc-server is &lt;1.12.0-15.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842036" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-15.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842037" version="1" comment="tigervnc-server-module is &lt;1.12.0-15.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842038" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842039" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842040" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842041" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842042" version="1" comment="freerdp is &lt;2.2.0-10.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842043" version="1" comment="freerdp-devel is &lt;2.2.0-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842044" version="1" comment="freerdp-libs is &lt;2.2.0-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842045" version="1" comment="libwinpr is &lt;2.2.0-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842046" version="1" comment="libwinpr-devel is &lt;2.2.0-10.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842047" version="1" comment="git is &lt;2.39.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842048" version="1" comment="git-all is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842049" version="1" comment="git-core is &lt;2.39.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842050" version="1" comment="git-core-doc is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842051" version="1" comment="git-credential-libsecret is &lt;2.39.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842052" version="1" comment="git-daemon is &lt;2.39.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842053" version="1" comment="git-email is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842054" version="1" comment="git-gui is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842055" version="1" comment="git-instaweb is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842056" version="1" comment="git-subtree is &lt;2.39.1-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842057" version="1" comment="git-svn is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842058" version="1" comment="gitk is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842059" version="1" comment="gitweb is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842060" version="1" comment="perl-Git is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842061" version="1" comment="perl-Git-SVN is &lt;2.39.1-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842062" version="1" comment="python2 is &lt;2.7.18-12.module+el8.8.0+17629+2cfc9d03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842063" version="1" comment="python2-debug is &lt;2.7.18-12.module+el8.8.0+17629+2cfc9d03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842064" version="1" comment="python2-devel is &lt;2.7.18-12.module+el8.8.0+17629+2cfc9d03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842065" version="1" comment="python2-libs is &lt;2.7.18-12.module+el8.8.0+17629+2cfc9d03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842066" version="1" comment="python2-test is &lt;2.7.18-12.module+el8.8.0+17629+2cfc9d03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842067" version="1" comment="python2-tkinter is &lt;2.7.18-12.module+el8.8.0+17629+2cfc9d03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842068" version="1" comment="python2-tools is &lt;2.7.18-12.module+el8.8.0+17629+2cfc9d03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842069" version="1" comment="ctags is &lt;5.8-23.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842070" version="1" comment="ctags-etags is &lt;5.8-23.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842071" version="1" comment="git-lfs is &lt;3.2.0-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842072" version="1" comment="postgresql-jdbc is &lt;42.2.14-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842073" version="1" comment="postgresql-jdbc-javadoc is &lt;42.2.14-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842074" version="1" comment="freeradius is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842075" version="1" comment="freeradius-devel is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842076" version="1" comment="freeradius-doc is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842077" version="1" comment="freeradius-krb5 is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842078" version="1" comment="freeradius-ldap is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842079" version="1" comment="freeradius-mysql is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842080" version="1" comment="freeradius-perl is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842081" version="1" comment="freeradius-postgresql is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842082" version="1" comment="freeradius-rest is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842083" version="1" comment="freeradius-sqlite is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842084" version="1" comment="freeradius-unixODBC is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842085" version="1" comment="freeradius-utils is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842086" version="1" comment="python3-freeradius is &lt;3.0.20-14.module+el8.8.0+17558+3f8a93b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842087" version="1" comment="gcc-toolset-12-binutils is &lt;2.38-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842088" version="1" comment="gcc-toolset-12-binutils-devel is &lt;2.38-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842089" version="1" comment="gcc-toolset-12-binutils-gold is &lt;2.38-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842090" version="1" comment="libtiff is &lt;4.0.9-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842091" version="1" comment="libtiff-devel is &lt;4.0.9-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842092" version="1" comment="libtiff-tools is &lt;4.0.9-27.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842093" version="1" comment="python3-mako is &lt;1.0.6-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009197592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842094" version="1" comment="libtar is &lt;1.2.20-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842095" version="1" comment="php is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842096" version="1" comment="php-bcmath is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842097" version="1" comment="php-cli is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842098" version="1" comment="php-common is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842099" version="1" comment="php-dba is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842100" version="1" comment="php-dbg is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842101" version="1" comment="php-devel is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842102" version="1" comment="php-embedded is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842103" version="1" comment="php-enchant is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842104" version="1" comment="php-ffi is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842105" version="1" comment="php-fpm is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842106" version="1" comment="php-gd is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842107" version="1" comment="php-gmp is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842108" version="1" comment="php-intl is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842109" version="1" comment="php-json is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842110" version="1" comment="php-ldap is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842111" version="1" comment="php-mbstring is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842112" version="1" comment="php-mysqlnd is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842113" version="1" comment="php-odbc is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842114" version="1" comment="php-opcache is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842115" version="1" comment="php-pdo is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842116" version="1" comment="php-pgsql is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842117" version="1" comment="php-process is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842118" version="1" comment="php-snmp is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842119" version="1" comment="php-soap is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842120" version="1" comment="php-xml is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842121" version="1" comment="php-xmlrpc is &lt;7.4.33-1.module+el8.8.0+17865+ef7eddfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842122" version="1" comment="edk2-ovmf is &lt;20220126gitbb1bba3d77-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842123" version="1" comment="device-mapper-multipath is &lt;0.8.4-37.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842124" version="1" comment="device-mapper-multipath-devel is &lt;0.8.4-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842125" version="1" comment="device-mapper-multipath-libs is &lt;0.8.4-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842126" version="1" comment="kpartx is &lt;0.8.4-37.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842127" version="1" comment="libdmmp is &lt;0.8.4-37.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842128" version="1" comment="bpftool is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842129" version="1" comment="kernel is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842130" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-477.10.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842131" version="1" comment="kernel-core is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842132" version="1" comment="kernel-cross-headers is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842133" version="1" comment="kernel-debug is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842134" version="1" comment="kernel-debug-core is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842136" version="1" comment="kernel-debug-modules is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842137" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842139" version="1" comment="kernel-doc is &lt;4.18.0-477.10.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842140" version="1" comment="kernel-headers is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842141" version="1" comment="kernel-modules is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842142" version="1" comment="kernel-modules-extra is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842143" version="1" comment="kernel-tools is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842144" version="1" comment="kernel-tools-libs is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842146" version="1" comment="perf is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842147" version="1" comment="python3-perf is &lt;4.18.0-477.10.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842148" version="1" comment="curl is &lt;7.61.1-30.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842149" version="1" comment="libcurl is &lt;7.61.1-30.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842150" version="1" comment="libcurl-devel is &lt;7.61.1-30.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842151" version="1" comment="libcurl-minimal is &lt;7.61.1-30.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842152" version="1" comment="net-snmp is &lt;5.8-27.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842153" version="1" comment="net-snmp-agent-libs is &lt;5.8-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842154" version="1" comment="net-snmp-devel is &lt;5.8-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842155" version="1" comment="net-snmp-libs is &lt;5.8-27.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842156" version="1" comment="net-snmp-perl is &lt;5.8-27.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842157" version="1" comment="net-snmp-utils is &lt;5.8-27.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842158" version="1" comment="ctdb is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842159" version="1" comment="evolution-mapi is &lt;3.28.3-7.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842160" version="1" comment="evolution-mapi-langpacks is &lt;3.28.3-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842161" version="1" comment="libnetapi is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981831" version="1" comment="libnetapi-devel is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842162" version="1" comment="libsmbclient is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981832" version="1" comment="libsmbclient-devel is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842163" version="1" comment="libwbclient is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981833" version="1" comment="libwbclient-devel is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842164" version="1" comment="openchange is &lt;2.3-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842165" version="1" comment="python3-samba is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842166" version="1" comment="python3-samba-dc is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981834" version="1" comment="python3-samba-devel is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842167" version="1" comment="python3-samba-test is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842168" version="1" comment="samba is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842169" version="1" comment="samba-client is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842170" version="1" comment="samba-client-libs is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842171" version="1" comment="samba-common is &lt;4.17.5-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842172" version="1" comment="samba-common-libs is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842173" version="1" comment="samba-common-tools is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842174" version="1" comment="samba-dc-libs is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842175" version="1" comment="samba-dcerpc is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981835" version="1" comment="samba-devel is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842176" version="1" comment="samba-krb5-printing is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842177" version="1" comment="samba-ldb-ldap-modules is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842178" version="1" comment="samba-libs is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842179" version="1" comment="samba-pidl is &lt;4.17.5-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842180" version="1" comment="samba-test is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842181" version="1" comment="samba-test-libs is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842182" version="1" comment="samba-tools is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842183" version="1" comment="samba-usershares is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842184" version="1" comment="samba-vfs-iouring is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842185" version="1" comment="samba-winbind is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842186" version="1" comment="samba-winbind-clients is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842187" version="1" comment="samba-winbind-krb5-locator is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842188" version="1" comment="samba-winbind-modules is &lt;4.17.5-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842189" version="1" comment="samba-winexe is &lt;4.17.5-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842190" version="1" comment="dhcp-client is &lt;4.3.6-49.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842191" version="1" comment="dhcp-common is &lt;4.3.6-49.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842192" version="1" comment="dhcp-libs is &lt;4.3.6-49.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842193" version="1" comment="dhcp-relay is &lt;4.3.6-49.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842194" version="1" comment="dhcp-server is &lt;4.3.6-49.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842195" version="1" comment="bind is &lt;9.11.36-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842196" version="1" comment="bind-chroot is &lt;9.11.36-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842197" version="1" comment="bind-devel is &lt;9.11.36-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842198" version="1" comment="bind-export-devel is &lt;9.11.36-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842199" version="1" comment="bind-export-libs is &lt;9.11.36-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842200" version="1" comment="bind-libs is &lt;9.11.36-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842201" version="1" comment="bind-libs-lite is &lt;9.11.36-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842202" version="1" comment="bind-license is &lt;9.11.36-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842203" version="1" comment="bind-lite-devel is &lt;9.11.36-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842204" version="1" comment="bind-pkcs11 is &lt;9.11.36-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842205" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842206" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842207" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842208" version="1" comment="bind-sdb is &lt;9.11.36-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842209" version="1" comment="bind-sdb-chroot is &lt;9.11.36-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842210" version="1" comment="bind-utils is &lt;9.11.36-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842211" version="1" comment="python3-bind is &lt;9.11.36-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842212" version="1" comment="bsdtar is &lt;3.3.3-5.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842213" version="1" comment="libarchive is &lt;3.3.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842214" version="1" comment="libarchive-devel is &lt;3.3.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842215" version="1" comment="emacs is &lt;26.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842216" version="1" comment="emacs-common is &lt;26.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842217" version="1" comment="emacs-filesystem is &lt;26.1-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842218" version="1" comment="emacs-lucid is &lt;26.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842219" version="1" comment="emacs-nox is &lt;26.1-9.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842220" version="1" comment="emacs-terminal is &lt;26.1-9.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842221" version="1" comment="autotrace is &lt;0.31.1-55.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842222" version="1" comment="mingw32-expat is &lt;2.4.8-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842223" version="1" comment="mingw64-expat is &lt;2.4.8-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842224" version="1" comment="pcs is &lt;0.10.15-4.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842225" version="1" comment="pcs-snmp is &lt;0.10.15-4.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842226" version="1" comment="delve is &lt;1.9.1-1.module+el8.8.0+16778+5fbb74f5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842227" version="1" comment="go-toolset is &lt;1.19.6-1.module+el8.8.0+18289+edd6c8b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842228" version="1" comment="golang is &lt;1.19.6-1.module+el8.8.0+18289+edd6c8b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842229" version="1" comment="golang-bin is &lt;1.19.6-1.module+el8.8.0+18289+edd6c8b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842230" version="1" comment="golang-docs is &lt;1.19.6-1.module+el8.8.0+18289+edd6c8b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842231" version="1" comment="golang-misc is &lt;1.19.6-1.module+el8.8.0+18289+edd6c8b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842232" version="1" comment="golang-race is &lt;1.19.6-1.module+el8.8.0+18289+edd6c8b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842233" version="1" comment="golang-src is &lt;1.19.6-1.module+el8.8.0+18289+edd6c8b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842234" version="1" comment="golang-tests is &lt;1.19.6-1.module+el8.8.0+18289+edd6c8b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842235" version="1" comment="mecab is &lt;0.996-2.module+el8.8.0+18436+8918dd75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842236" version="1" comment="mecab-devel is &lt;0.996-2.module+el8.8.0+18436+8918dd75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842237" version="1" comment="mysql is &lt;8.0.32-1.module+el8.8.0+18446+fca6280e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842238" version="1" comment="mysql-common is &lt;8.0.32-1.module+el8.8.0+18446+fca6280e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842239" version="1" comment="mysql-devel is &lt;8.0.32-1.module+el8.8.0+18446+fca6280e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842240" version="1" comment="mysql-errmsg is &lt;8.0.32-1.module+el8.8.0+18446+fca6280e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842241" version="1" comment="mysql-libs is &lt;8.0.32-1.module+el8.8.0+18446+fca6280e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842242" version="1" comment="mysql-server is &lt;8.0.32-1.module+el8.8.0+18446+fca6280e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842243" version="1" comment="mysql-test is &lt;8.0.32-1.module+el8.8.0+18446+fca6280e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842244" version="1" comment="libreswan is &lt;4.9-2.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842245" version="1" comment="gssntlmssp is &lt;1.2.0-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842246" version="1" comment="emacs is &lt;26.1-10.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842247" version="1" comment="emacs-common is &lt;26.1-10.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842248" version="1" comment="emacs-filesystem is &lt;26.1-10.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842249" version="1" comment="emacs-lucid is &lt;26.1-10.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842250" version="1" comment="emacs-nox is &lt;26.1-10.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842251" version="1" comment="emacs-terminal is &lt;26.1-10.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842252" version="1" comment="curl is &lt;7.61.1-30.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842253" version="1" comment="libcurl is &lt;7.61.1-30.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842254" version="1" comment="libcurl-devel is &lt;7.61.1-30.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842255" version="1" comment="libcurl-minimal is &lt;7.61.1-30.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842256" version="1" comment="libreswan is &lt;4.9-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842257" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el8_8.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842258" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el8_8.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842259" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el8_8.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842260" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el8_8.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842261" version="1" comment="apr-util is &lt;1.6.1-6.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842262" version="1" comment="apr-util-bdb is &lt;1.6.1-6.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842263" version="1" comment="apr-util-devel is &lt;1.6.1-6.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842264" version="1" comment="apr-util-ldap is &lt;1.6.1-6.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842265" version="1" comment="apr-util-mysql is &lt;1.6.1-6.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842266" version="1" comment="apr-util-odbc is &lt;1.6.1-6.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842267" version="1" comment="apr-util-openssl is &lt;1.6.1-6.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842268" version="1" comment="apr-util-pgsql is &lt;1.6.1-6.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842269" version="1" comment="apr-util-sqlite is &lt;1.6.1-6.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842270" version="1" comment="firefox is &lt;102.11.0-2.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842271" version="1" comment="thunderbird is &lt;102.11.0-1.el8_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842272" version="1" comment="git is &lt;2.39.3-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842273" version="1" comment="git-all is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842274" version="1" comment="git-core is &lt;2.39.3-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842275" version="1" comment="git-core-doc is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842276" version="1" comment="git-credential-libsecret is &lt;2.39.3-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842277" version="1" comment="git-daemon is &lt;2.39.3-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842278" version="1" comment="git-email is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842279" version="1" comment="git-gui is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842280" version="1" comment="git-instaweb is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842281" version="1" comment="git-subtree is &lt;2.39.3-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842282" version="1" comment="git-svn is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842283" version="1" comment="gitk is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842284" version="1" comment="gitweb is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842285" version="1" comment="perl-Git is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842286" version="1" comment="perl-Git-SVN is &lt;2.39.3-1.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842287" version="1" comment="go-toolset is &lt;1.19.9-1.module+el8.8.0+18857+fca43658 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842288" version="1" comment="golang is &lt;1.19.9-1.module+el8.8.0+18857+fca43658 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842289" version="1" comment="golang-bin is &lt;1.19.9-1.module+el8.8.0+18857+fca43658 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842290" version="1" comment="golang-docs is &lt;1.19.9-1.module+el8.8.0+18857+fca43658 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842291" version="1" comment="golang-misc is &lt;1.19.9-1.module+el8.8.0+18857+fca43658 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842292" version="1" comment="golang-race is &lt;1.19.9-1.module+el8.8.0+18857+fca43658 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842293" version="1" comment="golang-src is &lt;1.19.9-1.module+el8.8.0+18857+fca43658 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842294" version="1" comment="golang-tests is &lt;1.19.9-1.module+el8.8.0+18857+fca43658 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842295" version="1" comment="bpftool is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842296" version="1" comment="kernel is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842297" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-477.13.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842298" version="1" comment="kernel-core is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842299" version="1" comment="kernel-cross-headers is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842300" version="1" comment="kernel-debug is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842301" version="1" comment="kernel-debug-core is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842303" version="1" comment="kernel-debug-modules is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842304" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842306" version="1" comment="kernel-doc is &lt;4.18.0-477.13.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842307" version="1" comment="kernel-headers is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842308" version="1" comment="kernel-modules is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842309" version="1" comment="kernel-modules-extra is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842310" version="1" comment="kernel-tools is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842311" version="1" comment="kernel-tools-libs is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842313" version="1" comment="perf is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842314" version="1" comment="python3-perf is &lt;4.18.0-477.13.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842315" version="1" comment="cups-filters is &lt;1.20.0-29.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842316" version="1" comment="cups-filters-devel is &lt;1.20.0-29.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842317" version="1" comment="cups-filters-libs is &lt;1.20.0-29.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842318" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el8_8.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842319" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el8_8.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842320" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el8_8.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842321" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el8_8.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842322" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.18-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842323" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.18-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842324" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.18-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842325" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.18-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842326" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.18-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842327" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.118-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842328" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.118-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842329" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.18-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842330" version="1" comment="dotnet-templates-6.0 is &lt;6.0.118-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842331" version="1" comment="c-ares is &lt;1.13.0-6.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842332" version="1" comment="c-ares-devel is &lt;1.13.0-6.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842333" version="1" comment="thunderbird is &lt;102.12.0-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842334" version="1" comment="firefox is &lt;102.12.0-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842335" version="1" comment="platform-python is &lt;3.6.8-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842336" version="1" comment="platform-python-debug is &lt;3.6.8-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842337" version="1" comment="platform-python-devel is &lt;3.6.8-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842338" version="1" comment="python3-idle is &lt;3.6.8-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842339" version="1" comment="python3-libs is &lt;3.6.8-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842340" version="1" comment="python3-test is &lt;3.6.8-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842341" version="1" comment="python3-tkinter is &lt;3.6.8-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842342" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.7-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842343" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.7-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842344" version="1" comment="dotnet is &lt;7.0.107-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842345" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.7-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842346" version="1" comment="dotnet-host is &lt;7.0.7-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842347" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.7-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842348" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.7-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842349" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.107-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842350" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.107-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842351" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.7-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842352" version="1" comment="dotnet-templates-7.0 is &lt;7.0.107-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842353" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.107-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842354" version="1" comment="python3.11 is &lt;3.11.2-2.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842355" version="1" comment="python3.11-debug is &lt;3.11.2-2.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842356" version="1" comment="python3.11-devel is &lt;3.11.2-2.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842357" version="1" comment="python3.11-idle is &lt;3.11.2-2.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842358" version="1" comment="python3.11-libs is &lt;3.11.2-2.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842359" version="1" comment="python3.11-rpm-macros is &lt;3.11.2-2.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842360" version="1" comment="python3.11-test is &lt;3.11.2-2.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842361" version="1" comment="python3.11-tkinter is &lt;3.11.2-2.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806093" version="1" comment="texlive is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806094" version="1" comment="texlive-adjustbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806095" version="1" comment="texlive-ae is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806096" version="1" comment="texlive-algorithms is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806097" version="1" comment="texlive-alphalph is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806098" version="1" comment="texlive-amscls is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806099" version="1" comment="texlive-amsfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806100" version="1" comment="texlive-amsmath is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806101" version="1" comment="texlive-anyfontsize is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806102" version="1" comment="texlive-anysize is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806103" version="1" comment="texlive-appendix is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806104" version="1" comment="texlive-arabxetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806105" version="1" comment="texlive-arphic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806106" version="1" comment="texlive-atbegshi is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806107" version="1" comment="texlive-attachfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806108" version="1" comment="texlive-attachfile2 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806109" version="1" comment="texlive-atveryend is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806110" version="1" comment="texlive-auxhook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806111" version="1" comment="texlive-avantgar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806112" version="1" comment="texlive-awesomebox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806113" version="1" comment="texlive-babel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806114" version="1" comment="texlive-babel-english is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806115" version="1" comment="texlive-babelbib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806116" version="1" comment="texlive-base is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806117" version="1" comment="texlive-beamer is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806118" version="1" comment="texlive-bera is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806119" version="1" comment="texlive-beton is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806120" version="1" comment="texlive-bibtex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806121" version="1" comment="texlive-bibtopic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806122" version="1" comment="texlive-bidi is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806123" version="1" comment="texlive-bigfoot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806124" version="1" comment="texlive-bigintcalc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806125" version="1" comment="texlive-bitset is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806126" version="1" comment="texlive-bookman is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806127" version="1" comment="texlive-bookmark is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806128" version="1" comment="texlive-booktabs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806129" version="1" comment="texlive-breakurl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806130" version="1" comment="texlive-breqn is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806131" version="1" comment="texlive-capt-of is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806132" version="1" comment="texlive-caption is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806133" version="1" comment="texlive-carlisle is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806134" version="1" comment="texlive-catchfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806135" version="1" comment="texlive-changebar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806136" version="1" comment="texlive-changepage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806137" version="1" comment="texlive-charter is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806138" version="1" comment="texlive-chngcntr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806139" version="1" comment="texlive-cite is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806140" version="1" comment="texlive-cjk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806141" version="1" comment="texlive-classpack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806142" version="1" comment="texlive-cm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806143" version="1" comment="texlive-cm-lgc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806144" version="1" comment="texlive-cm-super is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806145" version="1" comment="texlive-cmap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806146" version="1" comment="texlive-cmextra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806147" version="1" comment="texlive-cns is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806148" version="1" comment="texlive-collectbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806149" version="1" comment="texlive-collection-basic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806150" version="1" comment="texlive-collection-fontsrecommended is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806151" version="1" comment="texlive-collection-htmlxml is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806152" version="1" comment="texlive-collection-latex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806153" version="1" comment="texlive-collection-latexrecommended is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806154" version="1" comment="texlive-collection-xetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806155" version="1" comment="texlive-colorprofiles is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806156" version="1" comment="texlive-colortbl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806157" version="1" comment="texlive-context is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806158" version="1" comment="texlive-courier is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806159" version="1" comment="texlive-crop is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806160" version="1" comment="texlive-csquotes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806161" version="1" comment="texlive-ctable is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806162" version="1" comment="texlive-ctablestack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806163" version="1" comment="texlive-currfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806164" version="1" comment="texlive-datetime is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806165" version="1" comment="texlive-dehyph is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806166" version="1" comment="texlive-dvipdfmx is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806167" version="1" comment="texlive-dvipng is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806168" version="1" comment="texlive-dvips is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806169" version="1" comment="texlive-dvisvgm is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806170" version="1" comment="texlive-ec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806171" version="1" comment="texlive-eepic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806172" version="1" comment="texlive-enctex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806173" version="1" comment="texlive-enumitem is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806174" version="1" comment="texlive-environ is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806175" version="1" comment="texlive-epsf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806176" version="1" comment="texlive-epstopdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806177" version="1" comment="texlive-epstopdf-pkg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806178" version="1" comment="texlive-eqparbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806179" version="1" comment="texlive-eso-pic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806180" version="1" comment="texlive-etex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806181" version="1" comment="texlive-etex-pkg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806182" version="1" comment="texlive-etexcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806183" version="1" comment="texlive-etoc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806184" version="1" comment="texlive-etoolbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806185" version="1" comment="texlive-euenc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806186" version="1" comment="texlive-euler is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806187" version="1" comment="texlive-euro is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806188" version="1" comment="texlive-eurosym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806189" version="1" comment="texlive-extsizes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806190" version="1" comment="texlive-fancybox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806191" version="1" comment="texlive-fancyhdr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806192" version="1" comment="texlive-fancyref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806193" version="1" comment="texlive-fancyvrb is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806194" version="1" comment="texlive-filecontents is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806195" version="1" comment="texlive-filehook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806196" version="1" comment="texlive-finstrut is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806197" version="1" comment="texlive-fix2col is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806198" version="1" comment="texlive-fixlatvian is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806199" version="1" comment="texlive-float is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806200" version="1" comment="texlive-fmtcount is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806201" version="1" comment="texlive-fncychap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806202" version="1" comment="texlive-fontawesome is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806203" version="1" comment="texlive-fontbook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806204" version="1" comment="texlive-fonts-tlwg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806205" version="1" comment="texlive-fontspec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806206" version="1" comment="texlive-fontware is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806207" version="1" comment="texlive-fontwrap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806208" version="1" comment="texlive-footmisc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806209" version="1" comment="texlive-footnotehyper is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806210" version="1" comment="texlive-fp is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806211" version="1" comment="texlive-fpl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806212" version="1" comment="texlive-framed is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806213" version="1" comment="texlive-garuda-c90 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806214" version="1" comment="texlive-geometry is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806215" version="1" comment="texlive-gettitlestring is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806216" version="1" comment="texlive-glyphlist is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806217" version="1" comment="texlive-gnu-freefont is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806218" version="1" comment="texlive-graphics is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806219" version="1" comment="texlive-graphics-cfg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806220" version="1" comment="texlive-graphics-def is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806221" version="1" comment="texlive-grfext is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806222" version="1" comment="texlive-grffile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806223" version="1" comment="texlive-gsftopk is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806224" version="1" comment="texlive-hanging is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806225" version="1" comment="texlive-helvetic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806226" version="1" comment="texlive-hobsub is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806227" version="1" comment="texlive-hologo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806228" version="1" comment="texlive-hycolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806229" version="1" comment="texlive-hyperref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806230" version="1" comment="texlive-hyph-utf8 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806231" version="1" comment="texlive-hyphen-base is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806232" version="1" comment="texlive-hyphenat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806233" version="1" comment="texlive-hyphenex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806234" version="1" comment="texlive-ifetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806235" version="1" comment="texlive-ifluatex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806236" version="1" comment="texlive-ifmtarg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806237" version="1" comment="texlive-ifoddpage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806238" version="1" comment="texlive-ifplatform is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806239" version="1" comment="texlive-iftex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806240" version="1" comment="texlive-ifxetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806241" version="1" comment="texlive-import is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806242" version="1" comment="texlive-index is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806243" version="1" comment="texlive-infwarerr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806244" version="1" comment="texlive-intcalc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806245" version="1" comment="texlive-jadetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806246" version="1" comment="texlive-jknapltx is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806247" version="1" comment="texlive-kastrup is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806248" version="1" comment="texlive-kerkis is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806249" version="1" comment="texlive-knuth-lib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806250" version="1" comment="texlive-knuth-local is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806251" version="1" comment="texlive-koma-script is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806252" version="1" comment="texlive-kpathsea is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806253" version="1" comment="texlive-kvdefinekeys is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806254" version="1" comment="texlive-kvoptions is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806255" version="1" comment="texlive-kvsetkeys is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806256" version="1" comment="texlive-l3backend is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806257" version="1" comment="texlive-l3experimental is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806258" version="1" comment="texlive-l3kernel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806259" version="1" comment="texlive-l3packages is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806260" version="1" comment="texlive-lastpage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806261" version="1" comment="texlive-latex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806262" version="1" comment="texlive-latex-fonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806263" version="1" comment="texlive-latex2man is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806264" version="1" comment="texlive-latexbug is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806265" version="1" comment="texlive-latexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806266" version="1" comment="texlive-letltxmacro is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806267" version="1" comment="texlive-lettrine is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806268" version="1" comment="texlive-lib is &lt;20200406-26.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806269" version="1" comment="texlive-lib-devel is &lt;20200406-26.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806270" version="1" comment="texlive-linegoal is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806271" version="1" comment="texlive-lineno is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806272" version="1" comment="texlive-listings is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806273" version="1" comment="texlive-listofitems is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806274" version="1" comment="texlive-lm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806275" version="1" comment="texlive-lm-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806276" version="1" comment="texlive-ltabptch is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806277" version="1" comment="texlive-ltxcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806278" version="1" comment="texlive-ltxmisc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806279" version="1" comment="texlive-lua-alt-getopt is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806280" version="1" comment="texlive-luahbtex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806281" version="1" comment="texlive-lualatex-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806282" version="1" comment="texlive-lualibs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806283" version="1" comment="texlive-luaotfload is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806284" version="1" comment="texlive-luatex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806285" version="1" comment="texlive-luatex85 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806286" version="1" comment="texlive-luatexbase is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806287" version="1" comment="texlive-lwarp is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806288" version="1" comment="texlive-makecmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806289" version="1" comment="texlive-makeindex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806290" version="1" comment="texlive-manfnt-font is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806291" version="1" comment="texlive-marginnote is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806292" version="1" comment="texlive-marvosym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806293" version="1" comment="texlive-mathpazo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806294" version="1" comment="texlive-mathspec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806295" version="1" comment="texlive-mathtools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806296" version="1" comment="texlive-mdwtools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806297" version="1" comment="texlive-memoir is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806298" version="1" comment="texlive-metafont is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806299" version="1" comment="texlive-metalogo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806300" version="1" comment="texlive-metapost is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806301" version="1" comment="texlive-mflogo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806302" version="1" comment="texlive-mflogo-font is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806303" version="1" comment="texlive-mfnfss is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806304" version="1" comment="texlive-mfware is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806305" version="1" comment="texlive-microtype is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806306" version="1" comment="texlive-minitoc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806307" version="1" comment="texlive-mnsymbol is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806308" version="1" comment="texlive-modes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806309" version="1" comment="texlive-mparhack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806310" version="1" comment="texlive-mptopdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806311" version="1" comment="texlive-ms is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806312" version="1" comment="texlive-multido is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806313" version="1" comment="texlive-multirow is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806314" version="1" comment="texlive-natbib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806315" version="1" comment="texlive-ncctools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806316" version="1" comment="texlive-ncntrsbk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806317" version="1" comment="texlive-needspace is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806318" version="1" comment="texlive-newfloat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806319" version="1" comment="texlive-newunicodechar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806320" version="1" comment="texlive-norasi-c90 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806321" version="1" comment="texlive-notoccite is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806322" version="1" comment="texlive-ntgclass is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806323" version="1" comment="texlive-oberdiek is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806324" version="1" comment="texlive-obsolete is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806325" version="1" comment="texlive-overpic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806326" version="1" comment="texlive-palatino is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806327" version="1" comment="texlive-paralist is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806328" version="1" comment="texlive-parallel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806329" version="1" comment="texlive-parskip is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806330" version="1" comment="texlive-passivetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806331" version="1" comment="texlive-pdfcolmk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806332" version="1" comment="texlive-pdfescape is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806333" version="1" comment="texlive-pdflscape is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806334" version="1" comment="texlive-pdfpages is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806335" version="1" comment="texlive-pdftex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806336" version="1" comment="texlive-pdftexcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806337" version="1" comment="texlive-pgf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806338" version="1" comment="texlive-philokalia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806339" version="1" comment="texlive-placeins is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806340" version="1" comment="texlive-plain is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806341" version="1" comment="texlive-polyglossia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806342" version="1" comment="texlive-powerdot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806343" version="1" comment="texlive-preprint is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806344" version="1" comment="texlive-psfrag is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806345" version="1" comment="texlive-pslatex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806346" version="1" comment="texlive-psnfss is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806347" version="1" comment="texlive-pspicture is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806348" version="1" comment="texlive-pst-3d is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806349" version="1" comment="texlive-pst-arrow is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806350" version="1" comment="texlive-pst-blur is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806351" version="1" comment="texlive-pst-coil is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806352" version="1" comment="texlive-pst-eps is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806353" version="1" comment="texlive-pst-fill is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806354" version="1" comment="texlive-pst-grad is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806355" version="1" comment="texlive-pst-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806356" version="1" comment="texlive-pst-node is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806357" version="1" comment="texlive-pst-plot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806358" version="1" comment="texlive-pst-slpe is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806359" version="1" comment="texlive-pst-text is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806360" version="1" comment="texlive-pst-tools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806361" version="1" comment="texlive-pst-tree is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806362" version="1" comment="texlive-pstricks is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806363" version="1" comment="texlive-pstricks-add is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806364" version="1" comment="texlive-ptext is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806365" version="1" comment="texlive-pxfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806366" version="1" comment="texlive-qstest is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806367" version="1" comment="texlive-ragged2e is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806368" version="1" comment="texlive-rcs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806369" version="1" comment="texlive-realscripts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806370" version="1" comment="texlive-refcount is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806371" version="1" comment="texlive-rerunfilecheck is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806372" version="1" comment="texlive-rsfs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806373" version="1" comment="texlive-sansmath is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806374" version="1" comment="texlive-sansmathaccent is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806375" version="1" comment="texlive-sauerj is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806376" version="1" comment="texlive-scheme-basic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806377" version="1" comment="texlive-section is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806378" version="1" comment="texlive-sectsty is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806379" version="1" comment="texlive-seminar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806380" version="1" comment="texlive-sepnum is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806381" version="1" comment="texlive-setspace is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806382" version="1" comment="texlive-showexpl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806383" version="1" comment="texlive-soul is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806384" version="1" comment="texlive-stackengine is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806385" version="1" comment="texlive-stmaryrd is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806386" version="1" comment="texlive-stringenc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806387" version="1" comment="texlive-subfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806388" version="1" comment="texlive-subfigure is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806389" version="1" comment="texlive-svn-prov is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806390" version="1" comment="texlive-symbol is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806391" version="1" comment="texlive-t2 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806392" version="1" comment="texlive-tabu is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806393" version="1" comment="texlive-tabulary is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806394" version="1" comment="texlive-tetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806395" version="1" comment="texlive-tex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806396" version="1" comment="texlive-tex-gyre is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806397" version="1" comment="texlive-tex-gyre-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806398" version="1" comment="texlive-tex-ini-files is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806399" version="1" comment="texlive-tex4ht is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806400" version="1" comment="texlive-texconfig is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806401" version="1" comment="texlive-texlive-common-doc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806402" version="1" comment="texlive-texlive-docindex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806403" version="1" comment="texlive-texlive-en is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806404" version="1" comment="texlive-texlive-msg-translations is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806405" version="1" comment="texlive-texlive-scripts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806406" version="1" comment="texlive-texlive-scripts-extra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806407" version="1" comment="texlive-texlive.infra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806408" version="1" comment="texlive-textcase is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806409" version="1" comment="texlive-textpos is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806410" version="1" comment="texlive-threeparttable is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806411" version="1" comment="texlive-thumbpdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806412" version="1" comment="texlive-times is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806413" version="1" comment="texlive-tipa is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806414" version="1" comment="texlive-titlesec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806415" version="1" comment="texlive-titling is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806416" version="1" comment="texlive-tocloft is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806417" version="1" comment="texlive-tools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806418" version="1" comment="texlive-translator is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806419" version="1" comment="texlive-trimspaces is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806420" version="1" comment="texlive-txfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806421" version="1" comment="texlive-type1cm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806422" version="1" comment="texlive-typehtml is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806423" version="1" comment="texlive-ucharcat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806424" version="1" comment="texlive-ucharclasses is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806425" version="1" comment="texlive-ucs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806426" version="1" comment="texlive-uhc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806427" version="1" comment="texlive-ulem is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806428" version="1" comment="texlive-underscore is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806429" version="1" comment="texlive-unicode-data is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806430" version="1" comment="texlive-unicode-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806431" version="1" comment="texlive-uniquecounter is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806432" version="1" comment="texlive-unisugar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806433" version="1" comment="texlive-updmap-map is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806434" version="1" comment="texlive-upquote is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806435" version="1" comment="texlive-url is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806436" version="1" comment="texlive-utopia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806437" version="1" comment="texlive-varwidth is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806438" version="1" comment="texlive-wadalab is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806439" version="1" comment="texlive-was is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806440" version="1" comment="texlive-wasy is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806441" version="1" comment="texlive-wasy-type1 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806442" version="1" comment="texlive-wasy2-ps is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806443" version="1" comment="texlive-wasysym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806444" version="1" comment="texlive-wrapfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806445" version="1" comment="texlive-xcolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806446" version="1" comment="texlive-xdvi is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806447" version="1" comment="texlive-xecjk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806448" version="1" comment="texlive-xecolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806449" version="1" comment="texlive-xecyr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806450" version="1" comment="texlive-xeindex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806451" version="1" comment="texlive-xepersian is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806452" version="1" comment="texlive-xesearch is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806453" version="1" comment="texlive-xetex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806454" version="1" comment="texlive-xetex-itrans is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806455" version="1" comment="texlive-xetex-pstricks is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806456" version="1" comment="texlive-xetex-tibetan is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806457" version="1" comment="texlive-xetexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806458" version="1" comment="texlive-xetexfontinfo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806459" version="1" comment="texlive-xifthen is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806460" version="1" comment="texlive-xkeyval is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806461" version="1" comment="texlive-xltxtra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806462" version="1" comment="texlive-xmltex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806463" version="1" comment="texlive-xmltexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806464" version="1" comment="texlive-xstring is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806465" version="1" comment="texlive-xtab is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806466" version="1" comment="texlive-xunicode is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806467" version="1" comment="texlive-zapfchan is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806468" version="1" comment="texlive-zapfding is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806469" version="1" comment="texlive-zref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842362" version="1" comment="python2 is &lt;2.7.18-13.module+el8.8.0+19042+06909d2c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842363" version="1" comment="python2-debug is &lt;2.7.18-13.module+el8.8.0+19042+06909d2c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842364" version="1" comment="python2-devel is &lt;2.7.18-13.module+el8.8.0+19042+06909d2c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842365" version="1" comment="python2-libs is &lt;2.7.18-13.module+el8.8.0+19042+06909d2c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842366" version="1" comment="python2-test is &lt;2.7.18-13.module+el8.8.0+19042+06909d2c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842367" version="1" comment="python2-tkinter is &lt;2.7.18-13.module+el8.8.0+19042+06909d2c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842368" version="1" comment="python2-tools is &lt;2.7.18-13.module+el8.8.0+19042+06909d2c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842369" version="1" comment="python2-virtualenv is &lt;15.1.0-22.module+el8.8.0+18977+47894b34 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842370" version="1" comment="ruby is &lt;2.7.8-139.module+el8.8.0+18745+f1bef313 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842371" version="1" comment="ruby-default-gems is &lt;2.7.8-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842372" version="1" comment="ruby-devel is &lt;2.7.8-139.module+el8.8.0+18745+f1bef313 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842373" version="1" comment="ruby-doc is &lt;2.7.8-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842374" version="1" comment="ruby-libs is &lt;2.7.8-139.module+el8.8.0+18745+f1bef313 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842375" version="1" comment="rubygem-bigdecimal is &lt;2.0.0-139.module+el8.8.0+18745+f1bef313 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842376" version="1" comment="rubygem-bundler is &lt;2.2.24-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842377" version="1" comment="rubygem-io-console is &lt;0.5.6-139.module+el8.8.0+18745+f1bef313 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842378" version="1" comment="rubygem-irb is &lt;1.2.6-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842379" version="1" comment="rubygem-json is &lt;2.3.0-139.module+el8.8.0+18745+f1bef313 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842380" version="1" comment="rubygem-minitest is &lt;5.13.0-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842381" version="1" comment="rubygem-net-telnet is &lt;0.2.0-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842382" version="1" comment="rubygem-openssl is &lt;2.1.4-139.module+el8.8.0+18745+f1bef313 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842383" version="1" comment="rubygem-power_assert is &lt;1.1.7-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842384" version="1" comment="rubygem-psych is &lt;3.1.0-139.module+el8.8.0+18745+f1bef313 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842385" version="1" comment="rubygem-rake is &lt;13.0.1-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842386" version="1" comment="rubygem-rdoc is &lt;6.2.1.1-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842387" version="1" comment="rubygem-test-unit is &lt;3.3.4-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842388" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842389" version="1" comment="rubygems is &lt;3.1.6-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842390" version="1" comment="rubygems-devel is &lt;3.1.6-139.module+el8.8.0+18745+f1bef313 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842391" version="1" comment="libtiff is &lt;4.0.9-28.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842392" version="1" comment="libtiff-devel is &lt;4.0.9-28.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842393" version="1" comment="libtiff-tools is &lt;4.0.9-28.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842394" version="1" comment="systemd is &lt;239-74.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842395" version="1" comment="systemd-container is &lt;239-74.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842396" version="1" comment="systemd-devel is &lt;239-74.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842397" version="1" comment="systemd-journal-remote is &lt;239-74.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842398" version="1" comment="systemd-libs is &lt;239-74.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842399" version="1" comment="systemd-pam is &lt;239-74.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842400" version="1" comment="systemd-tests is &lt;239-74.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842401" version="1" comment="systemd-udev is &lt;239-74.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842402" version="1" comment="libssh is &lt;0.9.6-10.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842403" version="1" comment="libssh-config is &lt;0.9.6-10.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842404" version="1" comment="libssh-devel is &lt;0.9.6-10.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842405" version="1" comment="lemon is &lt;3.26.0-18.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842406" version="1" comment="sqlite is &lt;3.26.0-18.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842407" version="1" comment="sqlite-devel is &lt;3.26.0-18.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842408" version="1" comment="sqlite-doc is &lt;3.26.0-18.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842409" version="1" comment="sqlite-libs is &lt;3.26.0-18.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842410" version="1" comment="bpftool is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842411" version="1" comment="kernel is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842412" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-477.15.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842413" version="1" comment="kernel-core is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842414" version="1" comment="kernel-cross-headers is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842415" version="1" comment="kernel-debug is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842416" version="1" comment="kernel-debug-core is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842418" version="1" comment="kernel-debug-modules is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842419" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842421" version="1" comment="kernel-doc is &lt;4.18.0-477.15.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842422" version="1" comment="kernel-headers is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842423" version="1" comment="kernel-modules is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842424" version="1" comment="kernel-modules-extra is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842425" version="1" comment="kernel-tools is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842426" version="1" comment="kernel-tools-libs is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842428" version="1" comment="perf is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842429" version="1" comment="python3-perf is &lt;4.18.0-477.15.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842430" version="1" comment="go-toolset is &lt;1.19.10-1.module+el8.8.0+19203+782922b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842431" version="1" comment="golang is &lt;1.19.10-1.module+el8.8.0+19203+782922b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842432" version="1" comment="golang-bin is &lt;1.19.10-1.module+el8.8.0+19203+782922b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842433" version="1" comment="golang-docs is &lt;1.19.10-1.module+el8.8.0+19203+782922b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842434" version="1" comment="golang-misc is &lt;1.19.10-1.module+el8.8.0+19203+782922b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842435" version="1" comment="golang-race is &lt;1.19.10-1.module+el8.8.0+19203+782922b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842436" version="1" comment="golang-src is &lt;1.19.10-1.module+el8.8.0+19203+782922b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842437" version="1" comment="golang-tests is &lt;1.19.10-1.module+el8.8.0+19203+782922b7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842438" version="1" comment="nodejs is &lt;16.19.1-2.module+el8.8.0+19038+6f60344f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842439" version="1" comment="nodejs-devel is &lt;16.19.1-2.module+el8.8.0+19038+6f60344f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842440" version="1" comment="nodejs-docs is &lt;16.19.1-2.module+el8.8.0+19038+6f60344f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842441" version="1" comment="nodejs-full-i18n is &lt;16.19.1-2.module+el8.8.0+19038+6f60344f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842442" version="1" comment="nodejs-nodemon is &lt;2.0.20-3.module+el8.8.0+19038+6f60344f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842443" version="1" comment="npm is &lt;8.19.3-1.16.19.1.2.module+el8.8.0+19038+6f60344f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842444" version="1" comment="nodejs is &lt;18.14.2-3.module+el8.8.0+19021+4b8b11cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842445" version="1" comment="nodejs-devel is &lt;18.14.2-3.module+el8.8.0+19021+4b8b11cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842446" version="1" comment="nodejs-docs is &lt;18.14.2-3.module+el8.8.0+19021+4b8b11cc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842447" version="1" comment="nodejs-full-i18n is &lt;18.14.2-3.module+el8.8.0+19021+4b8b11cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842448" version="1" comment="nodejs-nodemon is &lt;2.0.20-2.module+el8.8.0+18432+27f188ac for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842449" version="1" comment="npm is &lt;9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842450" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.9-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842451" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.9-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842452" version="1" comment="dotnet is &lt;7.0.109-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842453" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.9-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842454" version="1" comment="dotnet-host is &lt;7.0.9-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842455" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.9-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842456" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.9-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842457" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.109-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842458" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.109-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842459" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.9-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842460" version="1" comment="dotnet-templates-7.0 is &lt;7.0.109-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842461" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.109-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842462" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.20-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842463" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.20-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842464" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.20-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842465" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.20-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842466" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.20-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842467" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.120-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842468" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.120-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842469" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.20-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842470" version="1" comment="dotnet-templates-6.0 is &lt;6.0.120-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842471" version="1" comment="thunderbird is &lt;102.13.0-2.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842472" version="1" comment="firefox is &lt;102.13.0-2.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842473" version="1" comment="bind9.16 is &lt;9.16.23-0.14.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842474" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.14.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842475" version="1" comment="bind9.16-devel is &lt;9.16.23-0.14.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842476" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.14.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842477" version="1" comment="bind9.16-doc is &lt;9.16.23-0.14.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842478" version="1" comment="bind9.16-libs is &lt;9.16.23-0.14.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842479" version="1" comment="bind9.16-license is &lt;9.16.23-0.14.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842480" version="1" comment="bind9.16-utils is &lt;9.16.23-0.14.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842481" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.14.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842482" version="1" comment="bind is &lt;9.11.36-8.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842483" version="1" comment="bind-chroot is &lt;9.11.36-8.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842484" version="1" comment="bind-devel is &lt;9.11.36-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842485" version="1" comment="bind-export-devel is &lt;9.11.36-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842486" version="1" comment="bind-export-libs is &lt;9.11.36-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842487" version="1" comment="bind-libs is &lt;9.11.36-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842488" version="1" comment="bind-libs-lite is &lt;9.11.36-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842489" version="1" comment="bind-license is &lt;9.11.36-8.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842490" version="1" comment="bind-lite-devel is &lt;9.11.36-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842491" version="1" comment="bind-pkcs11 is &lt;9.11.36-8.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842492" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842493" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842494" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-8.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842495" version="1" comment="bind-sdb is &lt;9.11.36-8.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842496" version="1" comment="bind-sdb-chroot is &lt;9.11.36-8.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842497" version="1" comment="bind-utils is &lt;9.11.36-8.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842498" version="1" comment="python3-bind is &lt;9.11.36-8.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842499" version="1" comment="java-17-openjdk is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842500" version="1" comment="java-17-openjdk-demo is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842501" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842502" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842503" version="1" comment="java-17-openjdk-devel is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842504" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842505" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842506" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842507" version="1" comment="java-17-openjdk-headless is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842508" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842509" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842510" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842511" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842512" version="1" comment="java-17-openjdk-jmods is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842513" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842514" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842515" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842516" version="1" comment="java-17-openjdk-src is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842517" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842518" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842519" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842520" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842521" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.8.0.7-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842522" version="1" comment="java-11-openjdk is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842523" version="1" comment="java-11-openjdk-demo is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842524" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842525" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842526" version="1" comment="java-11-openjdk-devel is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842527" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842528" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842529" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842530" version="1" comment="java-11-openjdk-headless is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842531" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842532" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842533" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842534" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842535" version="1" comment="java-11-openjdk-jmods is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842536" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842537" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842538" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842539" version="1" comment="java-11-openjdk-src is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842540" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842541" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842542" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842543" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842544" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.20.0.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842545" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842546" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842547" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842548" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842549" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842550" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842551" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842552" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842553" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842554" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842555" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842556" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842557" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842558" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842559" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.382.b05-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842560" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.382.b05-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842561" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842562" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842563" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842564" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.382.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842565" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el8_8.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842566" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el8_8.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842567" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el8_8.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842568" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el8_8.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842569" version="1" comment="ctdb is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842570" version="1" comment="libnetapi is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842571" version="1" comment="libnetapi-devel is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842572" version="1" comment="libsmbclient is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842573" version="1" comment="libsmbclient-devel is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842574" version="1" comment="libwbclient is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842575" version="1" comment="libwbclient-devel is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842576" version="1" comment="python3-samba is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842577" version="1" comment="python3-samba-dc is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842578" version="1" comment="python3-samba-devel is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842579" version="1" comment="python3-samba-test is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842580" version="1" comment="samba is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842581" version="1" comment="samba-client is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842582" version="1" comment="samba-client-libs is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842583" version="1" comment="samba-common is &lt;4.17.5-3.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842584" version="1" comment="samba-common-libs is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842585" version="1" comment="samba-common-tools is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842586" version="1" comment="samba-dc-libs is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842587" version="1" comment="samba-dcerpc is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842588" version="1" comment="samba-devel is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842589" version="1" comment="samba-krb5-printing is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842590" version="1" comment="samba-ldb-ldap-modules is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842591" version="1" comment="samba-libs is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842592" version="1" comment="samba-pidl is &lt;4.17.5-3.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842593" version="1" comment="samba-test is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842594" version="1" comment="samba-test-libs is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842595" version="1" comment="samba-tools is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842596" version="1" comment="samba-usershares is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842597" version="1" comment="samba-vfs-iouring is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842598" version="1" comment="samba-winbind is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842599" version="1" comment="samba-winbind-clients is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842600" version="1" comment="samba-winbind-krb5-locator is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842601" version="1" comment="samba-winbind-modules is &lt;4.17.5-3.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842602" version="1" comment="samba-winexe is &lt;4.17.5-3.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842603" version="1" comment="cjose is &lt;0.6.1-3.module+el8.8.0+19464+578f4546 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842604" version="1" comment="cjose-devel is &lt;0.6.1-3.module+el8.8.0+19464+578f4546 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842605" version="1" comment="mod_auth_openidc is &lt;2.4.9.4-1.module+el8.7.0+14797+4085fcb6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842606" version="1" comment="openssh is &lt;8.0p1-19.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842607" version="1" comment="openssh-askpass is &lt;8.0p1-19.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842608" version="1" comment="openssh-cavs is &lt;8.0p1-19.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842609" version="1" comment="openssh-clients is &lt;8.0p1-19.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842610" version="1" comment="openssh-keycat is &lt;8.0p1-19.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842611" version="1" comment="openssh-ldap is &lt;8.0p1-19.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842612" version="1" comment="openssh-server is &lt;8.0p1-19.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842613" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.19.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842614" version="1" comment="firefox is &lt;102.14.0-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842615" version="1" comment="thunderbird is &lt;102.14.0-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842616" version="1" comment="dbus is &lt;1.12.8-24.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842617" version="1" comment="dbus-common is &lt;1.12.8-24.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842618" version="1" comment="dbus-daemon is &lt;1.12.8-24.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842619" version="1" comment="dbus-devel is &lt;1.12.8-24.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842620" version="1" comment="dbus-libs is &lt;1.12.8-24.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842621" version="1" comment="dbus-tools is &lt;1.12.8-24.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842622" version="1" comment="dbus-x11 is &lt;1.12.8-24.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842623" version="1" comment="bpftool is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842624" version="1" comment="kernel is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842625" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-477.21.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842626" version="1" comment="kernel-core is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842627" version="1" comment="kernel-cross-headers is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842628" version="1" comment="kernel-debug is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842629" version="1" comment="kernel-debug-core is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842631" version="1" comment="kernel-debug-modules is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842632" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842634" version="1" comment="kernel-doc is &lt;4.18.0-477.21.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842635" version="1" comment="kernel-headers is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842636" version="1" comment="kernel-modules is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842637" version="1" comment="kernel-modules-extra is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842638" version="1" comment="kernel-tools is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842639" version="1" comment="kernel-tools-libs is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842641" version="1" comment="perf is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842642" version="1" comment="python3-perf is &lt;4.18.0-477.21.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842643" version="1" comment="python3-requests is &lt;2.20.0-3.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842644" version="1" comment="curl is &lt;7.61.1-30.el8_8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842645" version="1" comment="libcurl is &lt;7.61.1-30.el8_8.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842646" version="1" comment="libcurl-devel is &lt;7.61.1-30.el8_8.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842647" version="1" comment="libcurl-minimal is &lt;7.61.1-30.el8_8.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842648" version="1" comment="libcap is &lt;2.48-5.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842649" version="1" comment="libcap-devel is &lt;2.48-5.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842650" version="1" comment="libxml2 is &lt;2.9.7-16.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842651" version="1" comment="libxml2-devel is &lt;2.9.7-16.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842652" version="1" comment="python3-libxml2 is &lt;2.9.7-16.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842653" version="1" comment="nodejs is &lt;18.16.1-1.module+el8.8.0+19438+94e84959 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842654" version="1" comment="nodejs-devel is &lt;18.16.1-1.module+el8.8.0+19438+94e84959 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842655" version="1" comment="nodejs-docs is &lt;18.16.1-1.module+el8.8.0+19438+94e84959 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842656" version="1" comment="nodejs-full-i18n is &lt;18.16.1-1.module+el8.8.0+19438+94e84959 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842657" version="1" comment="npm is &lt;9.5.1-1.18.16.1.1.module+el8.8.0+19438+94e84959 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842658" version="1" comment="nodejs is &lt;16.20.1-1.module+el8.8.0+19440+ee8dbee5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842659" version="1" comment="nodejs-devel is &lt;16.20.1-1.module+el8.8.0+19440+ee8dbee5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842660" version="1" comment="nodejs-docs is &lt;16.20.1-1.module+el8.8.0+19440+ee8dbee5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842661" version="1" comment="nodejs-full-i18n is &lt;16.20.1-1.module+el8.8.0+19440+ee8dbee5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842662" version="1" comment="npm is &lt;8.19.4-1.16.20.1.1.module+el8.8.0+19440+ee8dbee5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842663" version="1" comment="iperf3 is &lt;3.5-7.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842664" version="1" comment="cargo is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842665" version="1" comment="clippy is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842666" version="1" comment="rust is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842667" version="1" comment="rust-analysis is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842668" version="1" comment="rust-analyzer is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842669" version="1" comment="rust-debugger-common is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842670" version="1" comment="rust-doc is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842671" version="1" comment="rust-gdb is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842672" version="1" comment="rust-lldb is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842673" version="1" comment="rust-src is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842674" version="1" comment="rust-std-static is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842675" version="1" comment="rust-std-static-wasm32-unknown-unknown is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842676" version="1" comment="rust-std-static-wasm32-wasi is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842677" version="1" comment="rust-toolset is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842678" version="1" comment="rustfmt is &lt;1.66.1-2.module+el8.8.0+19613+f0bba33b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842679" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.10-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842680" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.10-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842681" version="1" comment="dotnet is &lt;7.0.110-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842682" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.10-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842683" version="1" comment="dotnet-host is &lt;7.0.10-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842684" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.10-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842685" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.10-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842686" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.110-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842687" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.110-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842688" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.10-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842689" version="1" comment="dotnet-templates-7.0 is &lt;7.0.110-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842690" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.110-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842691" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.21-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842692" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.21-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842693" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.21-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842694" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.21-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842695" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.21-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842696" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.121-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842697" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.121-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842698" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.21-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842699" version="1" comment="dotnet-templates-6.0 is &lt;6.0.121-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842700" version="1" comment="cups is &lt;2.2.6-51.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842701" version="1" comment="cups-client is &lt;2.2.6-51.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842702" version="1" comment="cups-devel is &lt;2.2.6-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842703" version="1" comment="cups-filesystem is &lt;2.2.6-51.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842704" version="1" comment="cups-ipptool is &lt;2.2.6-51.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842705" version="1" comment="cups-libs is &lt;2.2.6-51.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842706" version="1" comment="cups-lpd is &lt;2.2.6-51.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842707" version="1" comment="firefox is &lt;102.15.0-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842708" version="1" comment="thunderbird is &lt;102.15.0-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842709" version="1" comment="flac is &lt;1.3.2-9.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842710" version="1" comment="flac-devel is &lt;1.3.2-9.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842711" version="1" comment="flac-libs is &lt;1.3.2-9.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842712" version="1" comment="httpd is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842713" version="1" comment="httpd-devel is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842714" version="1" comment="httpd-filesystem is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842715" version="1" comment="httpd-manual is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842716" version="1" comment="httpd-tools is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842717" version="1" comment="mod_http2 is &lt;1.15.7-8.module+el8.8.0+18751+b4557bca.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842718" version="1" comment="mod_ldap is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842719" version="1" comment="mod_proxy_html is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842720" version="1" comment="mod_session is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842721" version="1" comment="mod_ssl is &lt;2.4.37-56.module+el8.8.0+19808+379766d6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842722" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.22-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842723" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.22-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842724" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.22-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842725" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.22-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842726" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.22-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842727" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.122-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842728" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.122-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842729" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.22-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842730" version="1" comment="dotnet-templates-6.0 is &lt;6.0.122-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842731" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.11-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842732" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.11-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842733" version="1" comment="dotnet is &lt;7.0.111-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842734" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.11-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842735" version="1" comment="dotnet-host is &lt;7.0.11-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842736" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.11-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842737" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.11-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842738" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.111-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842739" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.111-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842740" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.11-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842741" version="1" comment="dotnet-templates-7.0 is &lt;7.0.111-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842742" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.111-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842743" version="1" comment="firefox is &lt;102.15.1-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842744" version="1" comment="thunderbird is &lt;102.15.1-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842745" version="1" comment="frr is &lt;7.5.1-7.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842746" version="1" comment="frr-selinux is &lt;7.5.1-7.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842747" version="1" comment="bpftool is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842748" version="1" comment="kernel is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842749" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-477.27.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842750" version="1" comment="kernel-core is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842751" version="1" comment="kernel-cross-headers is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842752" version="1" comment="kernel-debug is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842753" version="1" comment="kernel-debug-core is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842755" version="1" comment="kernel-debug-modules is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842756" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842758" version="1" comment="kernel-doc is &lt;4.18.0-477.27.1.el8_8 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842759" version="1" comment="kernel-headers is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842760" version="1" comment="kernel-modules is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842761" version="1" comment="kernel-modules-extra is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842762" version="1" comment="kernel-tools is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842763" version="1" comment="kernel-tools-libs is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842765" version="1" comment="perf is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842766" version="1" comment="python3-perf is &lt;4.18.0-477.27.1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842767" version="1" comment="ncurses is &lt;6.1-9.20180224.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842768" version="1" comment="ncurses-base is &lt;6.1-9.20180224.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842769" version="1" comment="ncurses-c++-libs is &lt;6.1-9.20180224.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842770" version="1" comment="ncurses-compat-libs is &lt;6.1-9.20180224.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842771" version="1" comment="ncurses-devel is &lt;6.1-9.20180224.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842772" version="1" comment="ncurses-libs is &lt;6.1-9.20180224.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842773" version="1" comment="ncurses-term is &lt;6.1-9.20180224.el8_8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842774" version="1" comment="dmidecode is &lt;3.3-4.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842775" version="1" comment="libwebp is &lt;1.0.0-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842776" version="1" comment="libwebp-devel is &lt;1.0.0-8.el8_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842777" version="1" comment="open-vm-tools is &lt;12.1.5-2.el8_8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842778" version="1" comment="open-vm-tools-desktop is &lt;12.1.5-2.el8_8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842779" version="1" comment="open-vm-tools-salt-minion is &lt;12.1.5-2.el8_8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842780" version="1" comment="open-vm-tools-sdmp is &lt;12.1.5-2.el8_8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842781" version="1" comment="libtiff is &lt;4.0.9-29.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842782" version="1" comment="libtiff-devel is &lt;4.0.9-29.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842783" version="1" comment="libtiff-tools is &lt;4.0.9-29.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842784" version="1" comment="nodejs is &lt;16.20.2-2.module+el8.8.0+19898+ab99ba34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842785" version="1" comment="nodejs-devel is &lt;16.20.2-2.module+el8.8.0+19898+ab99ba34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842786" version="1" comment="nodejs-docs is &lt;16.20.2-2.module+el8.8.0+19898+ab99ba34 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842787" version="1" comment="nodejs-full-i18n is &lt;16.20.2-2.module+el8.8.0+19898+ab99ba34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842788" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.8.0+19764+7eed1ca3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842789" version="1" comment="nodejs-packaging is &lt;26-1.module+el8.8.0+19857+6d2a104d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842790" version="1" comment="npm is &lt;8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842791" version="1" comment="nodejs is &lt;18.17.1-1.module+el8.8.0+19757+8ca87034 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842792" version="1" comment="nodejs-devel is &lt;18.17.1-1.module+el8.8.0+19757+8ca87034 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842793" version="1" comment="nodejs-docs is &lt;18.17.1-1.module+el8.8.0+19757+8ca87034 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842794" version="1" comment="nodejs-full-i18n is &lt;18.17.1-1.module+el8.8.0+19757+8ca87034 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842795" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.8.0+19757+8ca87034 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842796" version="1" comment="npm is &lt;9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842797" version="1" comment="thunderbird is &lt;115.3.1-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842798" version="1" comment="firefox is &lt;115.3.1-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842799" version="1" comment="compat-libpthread-nonshared is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842800" version="1" comment="glibc is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842801" version="1" comment="glibc-all-langpacks is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842802" version="1" comment="glibc-benchtests is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842803" version="1" comment="glibc-common is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842804" version="1" comment="glibc-devel is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842805" version="1" comment="glibc-doc is &lt;2.28-225.el8_8.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842806" version="1" comment="glibc-gconv-extra is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842807" version="1" comment="glibc-headers is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842808" version="1" comment="glibc-langpack-aa is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842809" version="1" comment="glibc-langpack-af is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842810" version="1" comment="glibc-langpack-agr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842811" version="1" comment="glibc-langpack-ak is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842812" version="1" comment="glibc-langpack-am is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842813" version="1" comment="glibc-langpack-an is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842814" version="1" comment="glibc-langpack-anp is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842815" version="1" comment="glibc-langpack-ar is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842816" version="1" comment="glibc-langpack-as is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842817" version="1" comment="glibc-langpack-ast is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842818" version="1" comment="glibc-langpack-ayc is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842819" version="1" comment="glibc-langpack-az is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842820" version="1" comment="glibc-langpack-be is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842821" version="1" comment="glibc-langpack-bem is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842822" version="1" comment="glibc-langpack-ber is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842823" version="1" comment="glibc-langpack-bg is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842824" version="1" comment="glibc-langpack-bhb is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842825" version="1" comment="glibc-langpack-bho is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842826" version="1" comment="glibc-langpack-bi is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842827" version="1" comment="glibc-langpack-bn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842828" version="1" comment="glibc-langpack-bo is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842829" version="1" comment="glibc-langpack-br is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842830" version="1" comment="glibc-langpack-brx is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842831" version="1" comment="glibc-langpack-bs is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842832" version="1" comment="glibc-langpack-byn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842833" version="1" comment="glibc-langpack-ca is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842834" version="1" comment="glibc-langpack-ce is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842835" version="1" comment="glibc-langpack-chr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842836" version="1" comment="glibc-langpack-cmn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842837" version="1" comment="glibc-langpack-crh is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842838" version="1" comment="glibc-langpack-cs is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842839" version="1" comment="glibc-langpack-csb is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842840" version="1" comment="glibc-langpack-cv is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842841" version="1" comment="glibc-langpack-cy is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842842" version="1" comment="glibc-langpack-da is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842843" version="1" comment="glibc-langpack-de is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842844" version="1" comment="glibc-langpack-doi is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842845" version="1" comment="glibc-langpack-dsb is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842846" version="1" comment="glibc-langpack-dv is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842847" version="1" comment="glibc-langpack-dz is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842848" version="1" comment="glibc-langpack-el is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842849" version="1" comment="glibc-langpack-en is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842850" version="1" comment="glibc-langpack-eo is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842851" version="1" comment="glibc-langpack-es is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842852" version="1" comment="glibc-langpack-et is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842853" version="1" comment="glibc-langpack-eu is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842854" version="1" comment="glibc-langpack-fa is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842855" version="1" comment="glibc-langpack-ff is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842856" version="1" comment="glibc-langpack-fi is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842857" version="1" comment="glibc-langpack-fil is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842858" version="1" comment="glibc-langpack-fo is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842859" version="1" comment="glibc-langpack-fr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842860" version="1" comment="glibc-langpack-fur is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842861" version="1" comment="glibc-langpack-fy is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842862" version="1" comment="glibc-langpack-ga is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842863" version="1" comment="glibc-langpack-gd is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842864" version="1" comment="glibc-langpack-gez is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842865" version="1" comment="glibc-langpack-gl is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842866" version="1" comment="glibc-langpack-gu is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842867" version="1" comment="glibc-langpack-gv is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842868" version="1" comment="glibc-langpack-ha is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842869" version="1" comment="glibc-langpack-hak is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842870" version="1" comment="glibc-langpack-he is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842871" version="1" comment="glibc-langpack-hi is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842872" version="1" comment="glibc-langpack-hif is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842873" version="1" comment="glibc-langpack-hne is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842874" version="1" comment="glibc-langpack-hr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842875" version="1" comment="glibc-langpack-hsb is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842876" version="1" comment="glibc-langpack-ht is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842877" version="1" comment="glibc-langpack-hu is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842878" version="1" comment="glibc-langpack-hy is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842879" version="1" comment="glibc-langpack-ia is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842880" version="1" comment="glibc-langpack-id is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842881" version="1" comment="glibc-langpack-ig is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842882" version="1" comment="glibc-langpack-ik is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842883" version="1" comment="glibc-langpack-is is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842884" version="1" comment="glibc-langpack-it is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842885" version="1" comment="glibc-langpack-iu is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842886" version="1" comment="glibc-langpack-ja is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842887" version="1" comment="glibc-langpack-ka is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842888" version="1" comment="glibc-langpack-kab is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842889" version="1" comment="glibc-langpack-kk is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842890" version="1" comment="glibc-langpack-kl is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842891" version="1" comment="glibc-langpack-km is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842892" version="1" comment="glibc-langpack-kn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842893" version="1" comment="glibc-langpack-ko is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842894" version="1" comment="glibc-langpack-kok is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842895" version="1" comment="glibc-langpack-ks is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842896" version="1" comment="glibc-langpack-ku is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842897" version="1" comment="glibc-langpack-kw is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842898" version="1" comment="glibc-langpack-ky is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842899" version="1" comment="glibc-langpack-lb is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842900" version="1" comment="glibc-langpack-lg is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842901" version="1" comment="glibc-langpack-li is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842902" version="1" comment="glibc-langpack-lij is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842903" version="1" comment="glibc-langpack-ln is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842904" version="1" comment="glibc-langpack-lo is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842905" version="1" comment="glibc-langpack-lt is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842906" version="1" comment="glibc-langpack-lv is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842907" version="1" comment="glibc-langpack-lzh is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842908" version="1" comment="glibc-langpack-mag is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842909" version="1" comment="glibc-langpack-mai is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842910" version="1" comment="glibc-langpack-mfe is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842911" version="1" comment="glibc-langpack-mg is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842912" version="1" comment="glibc-langpack-mhr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842913" version="1" comment="glibc-langpack-mi is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842914" version="1" comment="glibc-langpack-miq is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842915" version="1" comment="glibc-langpack-mjw is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842916" version="1" comment="glibc-langpack-mk is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842917" version="1" comment="glibc-langpack-ml is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842918" version="1" comment="glibc-langpack-mn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842919" version="1" comment="glibc-langpack-mni is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842920" version="1" comment="glibc-langpack-mr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842921" version="1" comment="glibc-langpack-ms is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842922" version="1" comment="glibc-langpack-mt is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842923" version="1" comment="glibc-langpack-my is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842924" version="1" comment="glibc-langpack-nan is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842925" version="1" comment="glibc-langpack-nb is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842926" version="1" comment="glibc-langpack-nds is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842927" version="1" comment="glibc-langpack-ne is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842928" version="1" comment="glibc-langpack-nhn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842929" version="1" comment="glibc-langpack-niu is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842930" version="1" comment="glibc-langpack-nl is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842931" version="1" comment="glibc-langpack-nn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842932" version="1" comment="glibc-langpack-nr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842933" version="1" comment="glibc-langpack-nso is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842934" version="1" comment="glibc-langpack-oc is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842935" version="1" comment="glibc-langpack-om is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842936" version="1" comment="glibc-langpack-or is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842937" version="1" comment="glibc-langpack-os is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842938" version="1" comment="glibc-langpack-pa is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842939" version="1" comment="glibc-langpack-pap is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842940" version="1" comment="glibc-langpack-pl is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842941" version="1" comment="glibc-langpack-ps is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842942" version="1" comment="glibc-langpack-pt is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842943" version="1" comment="glibc-langpack-quz is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842944" version="1" comment="glibc-langpack-raj is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842945" version="1" comment="glibc-langpack-ro is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842946" version="1" comment="glibc-langpack-ru is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842947" version="1" comment="glibc-langpack-rw is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842948" version="1" comment="glibc-langpack-sa is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842949" version="1" comment="glibc-langpack-sah is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842950" version="1" comment="glibc-langpack-sat is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842951" version="1" comment="glibc-langpack-sc is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842952" version="1" comment="glibc-langpack-sd is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842953" version="1" comment="glibc-langpack-se is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842954" version="1" comment="glibc-langpack-sgs is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842955" version="1" comment="glibc-langpack-shn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842956" version="1" comment="glibc-langpack-shs is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842957" version="1" comment="glibc-langpack-si is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842958" version="1" comment="glibc-langpack-sid is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842959" version="1" comment="glibc-langpack-sk is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842960" version="1" comment="glibc-langpack-sl is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842961" version="1" comment="glibc-langpack-sm is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842962" version="1" comment="glibc-langpack-so is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842963" version="1" comment="glibc-langpack-sq is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842964" version="1" comment="glibc-langpack-sr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842965" version="1" comment="glibc-langpack-ss is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842966" version="1" comment="glibc-langpack-st is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842967" version="1" comment="glibc-langpack-sv is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842968" version="1" comment="glibc-langpack-sw is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842969" version="1" comment="glibc-langpack-szl is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842970" version="1" comment="glibc-langpack-ta is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842971" version="1" comment="glibc-langpack-tcy is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842972" version="1" comment="glibc-langpack-te is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842973" version="1" comment="glibc-langpack-tg is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842974" version="1" comment="glibc-langpack-th is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842975" version="1" comment="glibc-langpack-the is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842976" version="1" comment="glibc-langpack-ti is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842977" version="1" comment="glibc-langpack-tig is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842978" version="1" comment="glibc-langpack-tk is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842979" version="1" comment="glibc-langpack-tl is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842980" version="1" comment="glibc-langpack-tn is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842981" version="1" comment="glibc-langpack-to is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842982" version="1" comment="glibc-langpack-tpi is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842983" version="1" comment="glibc-langpack-tr is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842984" version="1" comment="glibc-langpack-ts is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842985" version="1" comment="glibc-langpack-tt is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842986" version="1" comment="glibc-langpack-ug is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842987" version="1" comment="glibc-langpack-uk is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842988" version="1" comment="glibc-langpack-unm is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842989" version="1" comment="glibc-langpack-ur is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842990" version="1" comment="glibc-langpack-uz is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842991" version="1" comment="glibc-langpack-ve is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842992" version="1" comment="glibc-langpack-vi is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842993" version="1" comment="glibc-langpack-wa is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842994" version="1" comment="glibc-langpack-wae is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842995" version="1" comment="glibc-langpack-wal is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842996" version="1" comment="glibc-langpack-wo is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842997" version="1" comment="glibc-langpack-xh is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842998" version="1" comment="glibc-langpack-yi is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009842999" version="1" comment="glibc-langpack-yo is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843000" version="1" comment="glibc-langpack-yue is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843001" version="1" comment="glibc-langpack-yuw is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843002" version="1" comment="glibc-langpack-zh is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843003" version="1" comment="glibc-langpack-zu is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843004" version="1" comment="glibc-locale-source is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843005" version="1" comment="glibc-minimal-langpack is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843006" version="1" comment="glibc-nss-devel is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843007" version="1" comment="glibc-static is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843008" version="1" comment="glibc-utils is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843009" version="1" comment="libnsl is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843010" version="1" comment="nscd is &lt;2.28-225.el8_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843011" version="1" comment="nss_db is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843012" version="1" comment="nss_hesiod is &lt;2.28-225.el8_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843013" version="1" comment="bind9.16 is &lt;9.16.23-0.14.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843014" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.14.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843015" version="1" comment="bind9.16-devel is &lt;9.16.23-0.14.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843016" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.14.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843017" version="1" comment="bind9.16-doc is &lt;9.16.23-0.14.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843018" version="1" comment="bind9.16-libs is &lt;9.16.23-0.14.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843019" version="1" comment="bind9.16-license is &lt;9.16.23-0.14.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843020" version="1" comment="bind9.16-utils is &lt;9.16.23-0.14.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843021" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.14.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843022" version="1" comment="python3.11 is &lt;3.11.2-2.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843023" version="1" comment="python3.11-debug is &lt;3.11.2-2.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843024" version="1" comment="python3.11-devel is &lt;3.11.2-2.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843025" version="1" comment="python3.11-idle is &lt;3.11.2-2.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843026" version="1" comment="python3.11-libs is &lt;3.11.2-2.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843027" version="1" comment="python3.11-rpm-macros is &lt;3.11.2-2.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843028" version="1" comment="python3.11-test is &lt;3.11.2-2.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843029" version="1" comment="python3.11-tkinter is &lt;3.11.2-2.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843030" version="1" comment="bind is &lt;9.11.36-8.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843031" version="1" comment="bind-chroot is &lt;9.11.36-8.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843032" version="1" comment="bind-devel is &lt;9.11.36-8.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843033" version="1" comment="bind-export-devel is &lt;9.11.36-8.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843034" version="1" comment="bind-export-libs is &lt;9.11.36-8.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843035" version="1" comment="bind-libs is &lt;9.11.36-8.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843036" version="1" comment="bind-libs-lite is &lt;9.11.36-8.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843037" version="1" comment="bind-license is &lt;9.11.36-8.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843038" version="1" comment="bind-lite-devel is &lt;9.11.36-8.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843039" version="1" comment="bind-pkcs11 is &lt;9.11.36-8.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843040" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-8.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843041" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-8.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843042" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-8.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843043" version="1" comment="bind-sdb is &lt;9.11.36-8.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843044" version="1" comment="bind-sdb-chroot is &lt;9.11.36-8.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843045" version="1" comment="bind-utils is &lt;9.11.36-8.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843046" version="1" comment="python3-bind is &lt;9.11.36-8.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843047" version="1" comment="libvpx is &lt;1.7.0-10.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843048" version="1" comment="libvpx-devel is &lt;1.7.0-10.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843049" version="1" comment="galera is &lt;26.4.14-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843050" version="1" comment="mariadb is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843051" version="1" comment="mariadb-backup is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843052" version="1" comment="mariadb-common is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843053" version="1" comment="mariadb-devel is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843054" version="1" comment="mariadb-embedded is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843055" version="1" comment="mariadb-embedded-devel is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843056" version="1" comment="mariadb-errmsg is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843057" version="1" comment="mariadb-gssapi-server is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843058" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843059" version="1" comment="mariadb-pam is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843060" version="1" comment="mariadb-server is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843061" version="1" comment="mariadb-server-galera is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843062" version="1" comment="mariadb-server-utils is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843063" version="1" comment="mariadb-test is &lt;10.5.22-1.module+el8.8.0+20134+a92c7654 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843064" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.12-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843065" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.12-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843066" version="1" comment="dotnet is &lt;7.0.112-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843067" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.12-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843068" version="1" comment="dotnet-host is &lt;7.0.12-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843069" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.12-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843070" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.12-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843071" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.112-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843072" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.112-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843073" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.12-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843074" version="1" comment="dotnet-templates-7.0 is &lt;7.0.112-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843075" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.112-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843076" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.23-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843077" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.23-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843078" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.23-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843079" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.23-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843080" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.23-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843081" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.123-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843082" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.123-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843083" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.23-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843084" version="1" comment="dotnet-templates-6.0 is &lt;6.0.123-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843085" version="1" comment="nginx is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843086" version="1" comment="nginx-all-modules is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843087" version="1" comment="nginx-filesystem is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843088" version="1" comment="nginx-mod-devel is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843089" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843090" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843091" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843092" version="1" comment="nginx-mod-mail is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843093" version="1" comment="nginx-mod-stream is &lt;1.20.1-1.module+el8.8.0+20359+9bd89172.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843094" version="1" comment="nginx is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843095" version="1" comment="nginx-all-modules is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843096" version="1" comment="nginx-filesystem is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843097" version="1" comment="nginx-mod-devel is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843098" version="1" comment="nginx-mod-http-image-filter is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843099" version="1" comment="nginx-mod-http-perl is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843100" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843101" version="1" comment="nginx-mod-mail is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843102" version="1" comment="nginx-mod-stream is &lt;1.22.1-1.module+el8.8.0+20355+6d9c8a63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843103" version="1" comment="go-toolset is &lt;1.19.13-1.module+el8.8.0+20380+7171fefb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843104" version="1" comment="golang is &lt;1.19.13-1.module+el8.8.0+20373+d9cd605c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843105" version="1" comment="golang-bin is &lt;1.19.13-1.module+el8.8.0+20373+d9cd605c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843106" version="1" comment="golang-docs is &lt;1.19.13-1.module+el8.8.0+20373+d9cd605c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843107" version="1" comment="golang-misc is &lt;1.19.13-1.module+el8.8.0+20373+d9cd605c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843108" version="1" comment="golang-race is &lt;1.19.13-1.module+el8.8.0+20373+d9cd605c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843109" version="1" comment="golang-src is &lt;1.19.13-1.module+el8.8.0+20373+d9cd605c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843110" version="1" comment="golang-tests is &lt;1.19.13-1.module+el8.8.0+20373+d9cd605c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843111" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843112" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843113" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843114" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843115" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843116" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843117" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843118" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843119" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843120" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843121" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843122" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843123" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843124" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843125" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.392.b08-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843126" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.392.b08-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843127" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843128" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843129" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843130" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.392.b08-4.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843131" version="1" comment="java-11-openjdk is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843132" version="1" comment="java-11-openjdk-demo is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843133" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843134" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843135" version="1" comment="java-11-openjdk-devel is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843136" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843137" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843138" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843139" version="1" comment="java-11-openjdk-headless is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843140" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843141" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843142" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843143" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843144" version="1" comment="java-11-openjdk-jmods is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843145" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843146" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843147" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843148" version="1" comment="java-11-openjdk-src is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843149" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843150" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843151" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843152" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843153" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.21.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843154" version="1" comment="java-17-openjdk is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843155" version="1" comment="java-17-openjdk-demo is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843156" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843157" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843158" version="1" comment="java-17-openjdk-devel is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843159" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843160" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843161" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843162" version="1" comment="java-17-openjdk-headless is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843163" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843164" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843165" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843166" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843167" version="1" comment="java-17-openjdk-jmods is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843168" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843169" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843170" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843171" version="1" comment="java-17-openjdk-src is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843172" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843173" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843174" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843175" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843176" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.9.0.9-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843177" version="1" comment="python3-reportlab is &lt;3.4.0-8.el8_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843178" version="1" comment="libnghttp2 is &lt;1.33.0-5.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843179" version="1" comment="libnghttp2-devel is &lt;1.33.0-5.el8_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843180" version="1" comment="nghttp2 is &lt;1.33.0-5.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843181" version="1" comment="nodejs is &lt;16.20.2-3.module+el8.8.0+20386+0b1f3093 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843182" version="1" comment="nodejs-devel is &lt;16.20.2-3.module+el8.8.0+20386+0b1f3093 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843183" version="1" comment="nodejs-docs is &lt;16.20.2-3.module+el8.8.0+20386+0b1f3093 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843184" version="1" comment="nodejs-full-i18n is &lt;16.20.2-3.module+el8.8.0+20386+0b1f3093 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843185" version="1" comment="npm is &lt;8.19.4-1.16.20.2.3.module+el8.8.0+20386+0b1f3093 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843186" version="1" comment="grafana is &lt;7.5.15-5.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843187" version="1" comment="nodejs is &lt;18.18.2-1.module+el8.8.0+20407+c11d40bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843188" version="1" comment="nodejs-devel is &lt;18.18.2-1.module+el8.8.0+20407+c11d40bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843189" version="1" comment="nodejs-docs is &lt;18.18.2-1.module+el8.8.0+20407+c11d40bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843190" version="1" comment="nodejs-full-i18n is &lt;18.18.2-1.module+el8.8.0+20407+c11d40bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843191" version="1" comment="npm is &lt;9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843192" version="1" comment="php is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843193" version="1" comment="php-bcmath is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843194" version="1" comment="php-cli is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843195" version="1" comment="php-common is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843196" version="1" comment="php-dba is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843197" version="1" comment="php-dbg is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843198" version="1" comment="php-devel is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843199" version="1" comment="php-embedded is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843200" version="1" comment="php-enchant is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843201" version="1" comment="php-ffi is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843202" version="1" comment="php-fpm is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843203" version="1" comment="php-gd is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843204" version="1" comment="php-gmp is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843205" version="1" comment="php-intl is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843206" version="1" comment="php-ldap is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843207" version="1" comment="php-mbstring is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843208" version="1" comment="php-mysqlnd is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843209" version="1" comment="php-odbc is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843210" version="1" comment="php-opcache is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843211" version="1" comment="php-pdo is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843212" version="1" comment="php-pgsql is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843213" version="1" comment="php-process is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843214" version="1" comment="php-snmp is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843215" version="1" comment="php-soap is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843216" version="1" comment="php-xml is &lt;8.0.30-1.module+el8.8.0+20302+42d2b711 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843217" version="1" comment="tomcat is &lt;9.0.62-5.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843218" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-5.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843219" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-5.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843220" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-5.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843221" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-5.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843222" version="1" comment="tomcat-lib is &lt;9.0.62-5.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843223" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-5.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843224" version="1" comment="tomcat-webapps is &lt;9.0.62-5.el8_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843225" version="1" comment="varnish is &lt;6.0.8-3.module+el8.8.0+20455+bdc2c048.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843226" version="1" comment="varnish-devel is &lt;6.0.8-3.module+el8.8.0+20455+bdc2c048.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843227" version="1" comment="varnish-docs is &lt;6.0.8-3.module+el8.8.0+20455+bdc2c048.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843228" version="1" comment="python2 is &lt;2.7.18-13.module+el8.8.0+20144+beed974d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843229" version="1" comment="python2-debug is &lt;2.7.18-13.module+el8.8.0+20144+beed974d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843230" version="1" comment="python2-devel is &lt;2.7.18-13.module+el8.8.0+20144+beed974d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843231" version="1" comment="python2-libs is &lt;2.7.18-13.module+el8.8.0+20144+beed974d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843232" version="1" comment="python2-test is &lt;2.7.18-13.module+el8.8.0+20144+beed974d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843233" version="1" comment="python2-tkinter is &lt;2.7.18-13.module+el8.8.0+20144+beed974d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843234" version="1" comment="python2-tools is &lt;2.7.18-13.module+el8.8.0+20144+beed974d.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843235" version="1" comment="platform-python is &lt;3.6.8-51.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843236" version="1" comment="platform-python-debug is &lt;3.6.8-51.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843237" version="1" comment="platform-python-devel is &lt;3.6.8-51.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843238" version="1" comment="python3-idle is &lt;3.6.8-51.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843239" version="1" comment="python3-libs is &lt;3.6.8-51.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843240" version="1" comment="python3-test is &lt;3.6.8-51.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843241" version="1" comment="python3-tkinter is &lt;3.6.8-51.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843242" version="1" comment="python39 is &lt;3.9.16-1.module+el8.8.0+20025+f2100191.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843243" version="1" comment="python39-Cython is &lt;0.29.21-5.module+el8.4.0+9822+20bf1249 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843244" version="1" comment="python39-attrs is &lt;20.3.0-2.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843245" version="1" comment="python39-debug is &lt;3.9.16-1.module+el8.8.0+20025+f2100191.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843246" version="1" comment="python39-devel is &lt;3.9.16-1.module+el8.8.0+20025+f2100191.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843247" version="1" comment="python39-idle is &lt;3.9.16-1.module+el8.8.0+20025+f2100191.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843248" version="1" comment="python39-iniconfig is &lt;1.1.1-2.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843249" version="1" comment="python39-libs is &lt;3.9.16-1.module+el8.8.0+20025+f2100191.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843250" version="1" comment="python39-more-itertools is &lt;8.5.0-2.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843251" version="1" comment="python39-packaging is &lt;20.4-4.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843252" version="1" comment="python39-pluggy is &lt;0.13.1-3.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843253" version="1" comment="python39-py is &lt;1.10.0-1.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843254" version="1" comment="python39-pybind11 is &lt;2.7.1-1.module+el8.6.0+12838+640e6226 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843255" version="1" comment="python39-pybind11-devel is &lt;2.7.1-1.module+el8.6.0+12838+640e6226 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843256" version="1" comment="python39-pyparsing is &lt;2.4.7-5.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843257" version="1" comment="python39-pytest is &lt;6.0.2-2.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843258" version="1" comment="python39-rpm-macros is &lt;3.9.16-1.module+el8.8.0+20025+f2100191.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843259" version="1" comment="python39-test is &lt;3.9.16-1.module+el8.8.0+20025+f2100191.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843260" version="1" comment="python39-tkinter is &lt;3.9.16-1.module+el8.8.0+20025+f2100191.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843261" version="1" comment="python39-wcwidth is &lt;0.2.5-3.module+el8.4.0+9822+20bf1249 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843262" version="1" comment="firefox is &lt;115.4.0-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843263" version="1" comment="thunderbird is &lt;115.4.1-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843264" version="1" comment="binutils is &lt;2.30-119.el8_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843265" version="1" comment="binutils-devel is &lt;2.30-119.el8_8.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843266" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.24-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843267" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.24-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843268" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.24-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843269" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.24-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843270" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.24-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843271" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.124-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843272" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.124-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843273" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.24-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843274" version="1" comment="dotnet-templates-6.0 is &lt;6.0.124-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843275" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.13-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843276" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.13-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843277" version="1" comment="dotnet is &lt;7.0.113-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843278" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.13-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843279" version="1" comment="dotnet-host is &lt;7.0.13-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843280" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.13-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843281" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.13-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843282" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.113-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843283" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.113-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843284" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.13-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843285" version="1" comment="dotnet-templates-7.0 is &lt;7.0.113-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843286" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.113-1.el8_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843287" version="1" comment="java-21-openjdk is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843288" version="1" comment="java-21-openjdk-demo is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843289" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843290" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843291" version="1" comment="java-21-openjdk-devel is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843292" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843293" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843294" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843295" version="1" comment="java-21-openjdk-headless is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843296" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843297" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843298" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843299" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843300" version="1" comment="java-21-openjdk-jmods is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843301" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843302" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843303" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843304" version="1" comment="java-21-openjdk-src is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843305" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843306" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843307" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843308" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843309" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.1.0.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843310" version="1" comment="python3.11-pip is &lt;22.3.1-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843311" version="1" comment="python3.11-pip-wheel is &lt;22.3.1-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843312" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843313" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843314" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843315" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843316" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843317" version="1" comment="xorg-x11-server-common is &lt;1.20.11-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843318" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843319" version="1" comment="xorg-x11-server-source is &lt;1.20.11-17.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843320" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843321" version="1" comment="edk2-ovmf is &lt;20220126gitbb1bba3d77-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843322" version="1" comment="cjose is &lt;0.6.1-4.module+el8.9.0+19469+5b493da9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843323" version="1" comment="cjose-devel is &lt;0.6.1-4.module+el8.9.0+19469+5b493da9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843324" version="1" comment="mod_auth_openidc is &lt;2.4.9.4-5.module+el8.9.0+18723+672ccf5d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843325" version="1" comment="cloud-init is &lt;23.1.1-10.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843326" version="1" comment="protobuf-c is &lt;1.3.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843327" version="1" comment="protobuf-c-compiler is &lt;1.3.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843328" version="1" comment="protobuf-c-devel is &lt;1.3.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843329" version="1" comment="qt5-qtsvg is &lt;5.15.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843330" version="1" comment="qt5-qtsvg-devel is &lt;5.15.3-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843331" version="1" comment="qt5-qtsvg-examples is &lt;5.15.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843332" version="1" comment="qt5-qtbase is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843333" version="1" comment="qt5-qtbase-common is &lt;5.15.3-5.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843334" version="1" comment="qt5-qtbase-devel is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843335" version="1" comment="qt5-qtbase-examples is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843336" version="1" comment="qt5-qtbase-gui is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843337" version="1" comment="qt5-qtbase-mysql is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843338" version="1" comment="qt5-qtbase-odbc is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843339" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843340" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843341" version="1" comment="qt5-qtbase-static is &lt;5.15.3-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843342" version="1" comment="grafana is &lt;9.2.10-7.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843343" version="1" comment="libfastjson is &lt;0.99.9-2.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843344" version="1" comment="sysstat is &lt;11.7.3-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843345" version="1" comment="wireshark is &lt;2.6.2-17.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843346" version="1" comment="wireshark-cli is &lt;2.6.2-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843347" version="1" comment="wireshark-devel is &lt;2.6.2-17.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843348" version="1" comment="libpq is &lt;13.11-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843349" version="1" comment="libpq-devel is &lt;13.11-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843350" version="1" comment="tang is &lt;7-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843351" version="1" comment="python3.11 is &lt;3.11.5-1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843352" version="1" comment="python3.11-debug is &lt;3.11.5-1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843353" version="1" comment="python3.11-devel is &lt;3.11.5-1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843354" version="1" comment="python3.11-idle is &lt;3.11.5-1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843355" version="1" comment="python3.11-libs is &lt;3.11.5-1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843356" version="1" comment="python3.11-rpm-macros is &lt;3.11.5-1.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843357" version="1" comment="python3.11-test is &lt;3.11.5-1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843358" version="1" comment="python3.11-tkinter is &lt;3.11.5-1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843359" version="1" comment="ruby is &lt;2.5.9-111.module+el8.9.0+19193+435404ae for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843360" version="1" comment="ruby-devel is &lt;2.5.9-111.module+el8.9.0+19193+435404ae for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843361" version="1" comment="ruby-doc is &lt;2.5.9-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843362" version="1" comment="ruby-irb is &lt;2.5.9-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843363" version="1" comment="ruby-libs is &lt;2.5.9-111.module+el8.9.0+19193+435404ae for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843364" version="1" comment="rubygem-abrt is &lt;0.3.0-4.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843365" version="1" comment="rubygem-abrt-doc is &lt;0.3.0-4.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843366" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-111.module+el8.9.0+19193+435404ae for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843367" version="1" comment="rubygem-bson is &lt;4.3.0-2.module+el8.9.0+19193+435404ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843368" version="1" comment="rubygem-bson-doc is &lt;4.3.0-2.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843369" version="1" comment="rubygem-bundler is &lt;1.16.1-4.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843370" version="1" comment="rubygem-bundler-doc is &lt;1.16.1-4.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843371" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843372" version="1" comment="rubygem-io-console is &lt;0.4.6-111.module+el8.9.0+19193+435404ae for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843373" version="1" comment="rubygem-json is &lt;2.1.0-111.module+el8.9.0+19193+435404ae for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843374" version="1" comment="rubygem-minitest is &lt;5.10.3-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843375" version="1" comment="rubygem-mongo is &lt;2.5.1-2.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843376" version="1" comment="rubygem-mongo-doc is &lt;2.5.1-2.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843377" version="1" comment="rubygem-mysql2 is &lt;0.4.10-4.module+el8.9.0+19193+435404ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843378" version="1" comment="rubygem-mysql2-doc is &lt;0.4.10-4.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843379" version="1" comment="rubygem-net-telnet is &lt;0.1.1-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843380" version="1" comment="rubygem-openssl is &lt;2.1.2-111.module+el8.9.0+19193+435404ae for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843381" version="1" comment="rubygem-pg is &lt;1.0.0-3.module+el8.9.0+19193+435404ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843382" version="1" comment="rubygem-pg-doc is &lt;1.0.0-3.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843383" version="1" comment="rubygem-power_assert is &lt;1.1.1-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843384" version="1" comment="rubygem-psych is &lt;3.0.2-111.module+el8.9.0+19193+435404ae for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843385" version="1" comment="rubygem-rake is &lt;12.3.3-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843386" version="1" comment="rubygem-rdoc is &lt;6.0.1.1-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843387" version="1" comment="rubygem-test-unit is &lt;3.2.7-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843388" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843389" version="1" comment="rubygems is &lt;2.7.6.3-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843390" version="1" comment="rubygems-devel is &lt;2.7.6.3-111.module+el8.9.0+19193+435404ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843391" version="1" comment="libX11 is &lt;1.6.8-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843392" version="1" comment="libX11-common is &lt;1.6.8-6.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843393" version="1" comment="libX11-devel is &lt;1.6.8-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843394" version="1" comment="libX11-xcb is &lt;1.6.8-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843395" version="1" comment="flatpak is &lt;1.10.8-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843396" version="1" comment="flatpak-devel is &lt;1.10.8-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843397" version="1" comment="flatpak-libs is &lt;1.10.8-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843398" version="1" comment="flatpak-selinux is &lt;1.10.8-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843399" version="1" comment="flatpak-session-helper is &lt;1.10.8-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843400" version="1" comment="babel is &lt;2.5.1-10.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843401" version="1" comment="python-nose-docs is &lt;1.3.7-31.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843402" version="1" comment="python-psycopg2-doc is &lt;2.7.5-8.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843403" version="1" comment="python-sqlalchemy-doc is &lt;1.3.2-2.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843404" version="1" comment="python2 is &lt;2.7.18-15.module+el8.9.0+20125+68111a8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843405" version="1" comment="python2-Cython is &lt;0.28.1-7.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843406" version="1" comment="python2-PyMySQL is &lt;0.8.0-10.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843407" version="1" comment="python2-attrs is &lt;17.4.0-10.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843408" version="1" comment="python2-babel is &lt;2.5.1-10.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843409" version="1" comment="python2-backports is &lt;1.0-16.module+el8.9.0+18326+1b5baeee for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843410" version="1" comment="python2-backports-ssl_match_hostname is &lt;3.5.0.1-12.module+el8.9.0+18326+1b5baeee for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843411" version="1" comment="python2-bson is &lt;3.7.0-1.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843412" version="1" comment="python2-chardet is &lt;3.0.4-10.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843413" version="1" comment="python2-coverage is &lt;4.5.1-5.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843414" version="1" comment="python2-debug is &lt;2.7.18-15.module+el8.9.0+20125+68111a8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843415" version="1" comment="python2-devel is &lt;2.7.18-15.module+el8.9.0+20125+68111a8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843416" version="1" comment="python2-dns is &lt;1.15.0-10.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843417" version="1" comment="python2-docs is &lt;2.7.16-2.module+el8.9.0+18326+1b5baeee for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843418" version="1" comment="python2-docs-info is &lt;2.7.16-2.module+el8.9.0+18326+1b5baeee for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843419" version="1" comment="python2-docutils is &lt;0.14-12.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843420" version="1" comment="python2-funcsigs is &lt;1.0.2-13.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843421" version="1" comment="python2-idna is &lt;2.5-7.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843422" version="1" comment="python2-ipaddress is &lt;1.0.18-6.module+el8.9.0+18326+1b5baeee for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843423" version="1" comment="python2-jinja2 is &lt;2.10-9.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843424" version="1" comment="python2-libs is &lt;2.7.18-15.module+el8.9.0+20125+68111a8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843425" version="1" comment="python2-lxml is &lt;4.2.3-6.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843426" version="1" comment="python2-markupsafe is &lt;0.23-19.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843427" version="1" comment="python2-mock is &lt;2.0.0-13.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843428" version="1" comment="python2-nose is &lt;1.3.7-31.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843429" version="1" comment="python2-numpy is &lt;1.14.2-16.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843430" version="1" comment="python2-numpy-doc is &lt;1.14.2-16.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843431" version="1" comment="python2-numpy-f2py is &lt;1.14.2-16.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843432" version="1" comment="python2-pip is &lt;9.0.3-19.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843433" version="1" comment="python2-pip-wheel is &lt;9.0.3-19.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843434" version="1" comment="python2-pluggy is &lt;0.6.0-8.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843435" version="1" comment="python2-psycopg2 is &lt;2.7.5-8.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843436" version="1" comment="python2-psycopg2-debug is &lt;2.7.5-8.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843437" version="1" comment="python2-psycopg2-tests is &lt;2.7.5-8.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843438" version="1" comment="python2-py is &lt;1.5.3-6.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843439" version="1" comment="python2-pygments is &lt;2.2.0-22.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843440" version="1" comment="python2-pymongo is &lt;3.7.0-1.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843441" version="1" comment="python2-pymongo-gridfs is &lt;3.7.0-1.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843442" version="1" comment="python2-pysocks is &lt;1.6.8-6.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843443" version="1" comment="python2-pytest is &lt;3.4.2-13.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843444" version="1" comment="python2-pytest-mock is &lt;1.9.0-4.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843445" version="1" comment="python2-pytz is &lt;2017.2-13.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843446" version="1" comment="python2-pyyaml is &lt;3.12-16.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843447" version="1" comment="python2-requests is &lt;2.20.0-4.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843448" version="1" comment="python2-rpm-macros is &lt;3-38.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843449" version="1" comment="python2-scipy is &lt;1.0.0-22.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843450" version="1" comment="python2-setuptools is &lt;39.0.1-13.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843451" version="1" comment="python2-setuptools-wheel is &lt;39.0.1-13.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843452" version="1" comment="python2-setuptools_scm is &lt;1.15.7-6.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843453" version="1" comment="python2-six is &lt;1.11.0-6.module+el8.9.0+18326+1b5baeee for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843454" version="1" comment="python2-sqlalchemy is &lt;1.3.2-2.module+el8.9.0+19487+7dc18407 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843455" version="1" comment="python2-test is &lt;2.7.18-15.module+el8.9.0+20125+68111a8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843456" version="1" comment="python2-tkinter is &lt;2.7.18-15.module+el8.9.0+20125+68111a8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843457" version="1" comment="python2-tools is &lt;2.7.18-15.module+el8.9.0+20125+68111a8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843458" version="1" comment="python2-urllib3 is &lt;1.24.2-3.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843459" version="1" comment="python2-virtualenv is &lt;15.1.0-22.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843460" version="1" comment="python2-wheel is &lt;0.31.1-3.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843461" version="1" comment="python2-wheel-wheel is &lt;0.31.1-3.module+el8.9.0+19487+7dc18407 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843462" version="1" comment="dnsmasq is &lt;2.79-31.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843463" version="1" comment="dnsmasq-utils is &lt;2.79-31.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843464" version="1" comment="libreswan is &lt;4.12-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843465" version="1" comment="ghostscript is &lt;9.27-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843466" version="1" comment="ghostscript-doc is &lt;9.27-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843467" version="1" comment="ghostscript-tools-dvipdf is &lt;9.27-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843468" version="1" comment="ghostscript-tools-fonts is &lt;9.27-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843469" version="1" comment="ghostscript-tools-printing is &lt;9.27-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843470" version="1" comment="ghostscript-x11 is &lt;9.27-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843471" version="1" comment="libgs is &lt;9.27-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843472" version="1" comment="libgs-devel is &lt;9.27-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843473" version="1" comment="webkit2gtk3 is &lt;2.40.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843474" version="1" comment="webkit2gtk3-devel is &lt;2.40.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843475" version="1" comment="webkit2gtk3-jsc is &lt;2.40.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843476" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.40.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843477" version="1" comment="yajl is &lt;2.1.0-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843478" version="1" comment="yajl-devel is &lt;2.1.0-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843479" version="1" comment="tomcat is &lt;9.0.62-27.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843480" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-27.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843481" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-27.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843482" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-27.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843483" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-27.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843484" version="1" comment="tomcat-lib is &lt;9.0.62-27.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843485" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-27.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843486" version="1" comment="tomcat-webapps is &lt;9.0.62-27.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843487" version="1" comment="bpftool is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843488" version="1" comment="kernel is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843489" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-513.5.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843490" version="1" comment="kernel-core is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843491" version="1" comment="kernel-cross-headers is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843492" version="1" comment="kernel-debug is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843493" version="1" comment="kernel-debug-core is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843495" version="1" comment="kernel-debug-modules is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843496" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843498" version="1" comment="kernel-doc is &lt;4.18.0-513.5.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843499" version="1" comment="kernel-headers is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843500" version="1" comment="kernel-modules is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843501" version="1" comment="kernel-modules-extra is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843502" version="1" comment="kernel-tools is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843503" version="1" comment="kernel-tools-libs is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843505" version="1" comment="perf is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843506" version="1" comment="python3-perf is &lt;4.18.0-513.5.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843507" version="1" comment="emacs is &lt;26.1-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843508" version="1" comment="emacs-common is &lt;26.1-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843509" version="1" comment="emacs-filesystem is &lt;26.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843510" version="1" comment="emacs-lucid is &lt;26.1-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843511" version="1" comment="emacs-nox is &lt;26.1-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843512" version="1" comment="emacs-terminal is &lt;26.1-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843513" version="1" comment="libmicrohttpd is &lt;0.9.59-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843514" version="1" comment="libmicrohttpd-devel is &lt;0.9.59-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843515" version="1" comment="libmicrohttpd-doc is &lt;0.9.59-3.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843516" version="1" comment="python3-cryptography is &lt;3.2.1-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843517" version="1" comment="iwl100-firmware is &lt;39.31.5.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843518" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843519" version="1" comment="iwl105-firmware is &lt;18.168.6.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843520" version="1" comment="iwl135-firmware is &lt;18.168.6.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843521" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843522" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843523" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843524" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843525" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843526" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843527" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843528" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843529" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843530" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843531" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843532" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-119.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843533" version="1" comment="libertas-sd8686-firmware is &lt;20230824-119.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843534" version="1" comment="libertas-sd8787-firmware is &lt;20230824-119.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843535" version="1" comment="libertas-usb8388-firmware is &lt;20230824-119.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843536" version="1" comment="libertas-usb8388-olpc-firmware is &lt;20230824-119.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843537" version="1" comment="linux-firmware is &lt;20230824-119.git0e048b06.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843538" version="1" comment="shadow-utils is &lt;4.6-19.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843539" version="1" comment="shadow-utils-subid is &lt;4.6-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843540" version="1" comment="shadow-utils-subid-devel is &lt;4.6-19.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843541" version="1" comment="c-ares is &lt;1.13.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843542" version="1" comment="c-ares-devel is &lt;1.13.0-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879799" version="1" comment="ctdb is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879800" version="1" comment="evolution-mapi is &lt;3.28.3-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879801" version="1" comment="evolution-mapi-langpacks is &lt;3.28.3-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879802" version="1" comment="libnetapi is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879803" version="1" comment="libsmbclient is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879804" version="1" comment="libwbclient is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879805" version="1" comment="openchange is &lt;2.3-32.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879806" version="1" comment="python3-samba is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879807" version="1" comment="python3-samba-dc is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879808" version="1" comment="python3-samba-test is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879809" version="1" comment="samba is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879810" version="1" comment="samba-client is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879811" version="1" comment="samba-client-libs is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879812" version="1" comment="samba-common is &lt;4.18.6-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879813" version="1" comment="samba-common-libs is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879814" version="1" comment="samba-common-tools is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879815" version="1" comment="samba-dc-libs is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879816" version="1" comment="samba-dcerpc is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879817" version="1" comment="samba-krb5-printing is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879818" version="1" comment="samba-ldb-ldap-modules is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879819" version="1" comment="samba-libs is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879820" version="1" comment="samba-pidl is &lt;4.18.6-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879821" version="1" comment="samba-test is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879822" version="1" comment="samba-test-libs is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879823" version="1" comment="samba-tools is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879824" version="1" comment="samba-usershares is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879825" version="1" comment="samba-vfs-iouring is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879826" version="1" comment="samba-winbind is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879827" version="1" comment="samba-winbind-clients is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879828" version="1" comment="samba-winbind-krb5-locator is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879829" version="1" comment="samba-winbind-modules is &lt;4.18.6-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879830" version="1" comment="samba-winexe is &lt;4.18.6-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843543" version="1" comment="librabbitmq is &lt;0.9.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843544" version="1" comment="librabbitmq-devel is &lt;0.9.0-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843545" version="1" comment="platform-python is &lt;3.6.8-56.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843546" version="1" comment="platform-python-debug is &lt;3.6.8-56.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843547" version="1" comment="platform-python-devel is &lt;3.6.8-56.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843548" version="1" comment="python3-idle is &lt;3.6.8-56.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843549" version="1" comment="python3-libs is &lt;3.6.8-56.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843550" version="1" comment="python3-test is &lt;3.6.8-56.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843551" version="1" comment="python3-tkinter is &lt;3.6.8-56.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843552" version="1" comment="opensc is &lt;0.20.0-6.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843553" version="1" comment="cups is &lt;2.2.6-54.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843554" version="1" comment="cups-client is &lt;2.2.6-54.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843555" version="1" comment="cups-devel is &lt;2.2.6-54.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843556" version="1" comment="cups-filesystem is &lt;2.2.6-54.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843557" version="1" comment="cups-ipptool is &lt;2.2.6-54.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843558" version="1" comment="cups-libs is &lt;2.2.6-54.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843559" version="1" comment="cups-lpd is &lt;2.2.6-54.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843560" version="1" comment="tpm2-tss is &lt;2.3.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843561" version="1" comment="tpm2-tss-devel is &lt;2.3.2-5.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843562" version="1" comment="perl-HTTP-Tiny is &lt;0.074-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843563" version="1" comment="platform-python-pip is &lt;9.0.3-23.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843564" version="1" comment="python3-pip is &lt;9.0.3-23.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843565" version="1" comment="python3-pip-wheel is &lt;9.0.3-23.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843566" version="1" comment="bind is &lt;9.11.36-11.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843567" version="1" comment="bind-chroot is &lt;9.11.36-11.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843568" version="1" comment="bind-devel is &lt;9.11.36-11.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843569" version="1" comment="bind-export-devel is &lt;9.11.36-11.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843570" version="1" comment="bind-export-libs is &lt;9.11.36-11.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843571" version="1" comment="bind-libs is &lt;9.11.36-11.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843572" version="1" comment="bind-libs-lite is &lt;9.11.36-11.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843573" version="1" comment="bind-license is &lt;9.11.36-11.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843574" version="1" comment="bind-lite-devel is &lt;9.11.36-11.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843575" version="1" comment="bind-pkcs11 is &lt;9.11.36-11.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843576" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-11.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843577" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-11.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843578" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-11.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843579" version="1" comment="bind-sdb is &lt;9.11.36-11.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843580" version="1" comment="bind-sdb-chroot is &lt;9.11.36-11.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843581" version="1" comment="bind-utils is &lt;9.11.36-11.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843582" version="1" comment="python3-bind is &lt;9.11.36-11.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843583" version="1" comment="procps-ng is &lt;3.3.15-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843584" version="1" comment="procps-ng-devel is &lt;3.3.15-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843585" version="1" comment="procps-ng-i18n is &lt;3.3.15-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843586" version="1" comment="fwupd is &lt;1.7.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843587" version="1" comment="fwupd-devel is &lt;1.7.8-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843588" version="1" comment="avahi is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843589" version="1" comment="avahi-autoipd is &lt;0.7-21.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843590" version="1" comment="avahi-compat-howl is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843591" version="1" comment="avahi-compat-howl-devel is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843592" version="1" comment="avahi-compat-libdns_sd is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843593" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843594" version="1" comment="avahi-devel is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843595" version="1" comment="avahi-glib is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843596" version="1" comment="avahi-glib-devel is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843597" version="1" comment="avahi-gobject is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843598" version="1" comment="avahi-gobject-devel is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843599" version="1" comment="avahi-libs is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843600" version="1" comment="avahi-tools is &lt;0.7-21.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843601" version="1" comment="avahi-ui is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843602" version="1" comment="avahi-ui-devel is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843603" version="1" comment="avahi-ui-gtk3 is &lt;0.7-21.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843604" version="1" comment="python3-avahi is &lt;0.7-21.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843605" version="1" comment="nodejs is &lt;20.8.1-1.module+el8.9.0+20473+c4e3d824 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843606" version="1" comment="nodejs-devel is &lt;20.8.1-1.module+el8.9.0+20473+c4e3d824 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843607" version="1" comment="nodejs-docs is &lt;20.8.1-1.module+el8.9.0+20473+c4e3d824 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843608" version="1" comment="nodejs-full-i18n is &lt;20.8.1-1.module+el8.9.0+20473+c4e3d824 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843609" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.9.0+20473+c4e3d824 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843610" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.9.0+19519+e25b965a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843611" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.9.0+19519+e25b965a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843612" version="1" comment="npm is &lt;10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843613" version="1" comment="c-ares is &lt;1.13.0-9.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843614" version="1" comment="c-ares-devel is &lt;1.13.0-9.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850254" version="1" comment="libecap is &lt;1.0.1-2.module+el8.9.0+19703+a1da7223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850255" version="1" comment="libecap-devel is &lt;1.0.1-2.module+el8.9.0+19703+a1da7223 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850256" version="1" comment="squid is &lt;4.15-7.module+el8.9.0+20571+8d39338b.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843615" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.0-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843616" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.0-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843617" version="1" comment="dotnet is &lt;8.0.100-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843618" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.0-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843619" version="1" comment="dotnet-host is &lt;8.0.0-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843620" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.0-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843621" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.0-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843622" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.100-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843623" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.100-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843624" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.0-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843625" version="1" comment="dotnet-templates-8.0 is &lt;8.0.100-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843626" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.100-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843627" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.14-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843628" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.14-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843629" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.14-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843630" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.14-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843631" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.14-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843632" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.114-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843633" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.114-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843634" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.14-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843635" version="1" comment="dotnet-templates-7.0 is &lt;7.0.114-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843636" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.25-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843637" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.25-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843638" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.25-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843639" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.25-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843640" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.25-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843641" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.125-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843642" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.125-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843643" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.25-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843644" version="1" comment="dotnet-templates-6.0 is &lt;6.0.125-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843645" version="1" comment="ctdb is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843646" version="1" comment="libnetapi is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843647" version="1" comment="libnetapi-devel is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843648" version="1" comment="libsmbclient is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843649" version="1" comment="libsmbclient-devel is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843650" version="1" comment="libwbclient is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843651" version="1" comment="libwbclient-devel is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843652" version="1" comment="python3-samba is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843653" version="1" comment="python3-samba-dc is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843654" version="1" comment="python3-samba-devel is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843655" version="1" comment="python3-samba-test is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843656" version="1" comment="samba is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843657" version="1" comment="samba-client is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843658" version="1" comment="samba-client-libs is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843659" version="1" comment="samba-common is &lt;4.18.6-2.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843660" version="1" comment="samba-common-libs is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843661" version="1" comment="samba-common-tools is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843662" version="1" comment="samba-dc-libs is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843663" version="1" comment="samba-dcerpc is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843664" version="1" comment="samba-devel is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843665" version="1" comment="samba-krb5-printing is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843666" version="1" comment="samba-ldb-ldap-modules is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843667" version="1" comment="samba-libs is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843668" version="1" comment="samba-pidl is &lt;4.18.6-2.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843669" version="1" comment="samba-test is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843670" version="1" comment="samba-test-libs is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843671" version="1" comment="samba-tools is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843672" version="1" comment="samba-usershares is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843673" version="1" comment="samba-vfs-iouring is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843674" version="1" comment="samba-winbind is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843675" version="1" comment="samba-winbind-clients is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843676" version="1" comment="samba-winbind-krb5-locator is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843677" version="1" comment="samba-winbind-modules is &lt;4.18.6-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843678" version="1" comment="samba-winexe is &lt;4.18.6-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843679" version="1" comment="thunderbird is &lt;115.5.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843680" version="1" comment="firefox is &lt;115.5.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843681" version="1" comment="bpftool is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843682" version="1" comment="kernel is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843683" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-513.9.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843684" version="1" comment="kernel-core is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843685" version="1" comment="kernel-cross-headers is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843686" version="1" comment="kernel-debug is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843687" version="1" comment="kernel-debug-core is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843689" version="1" comment="kernel-debug-modules is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843690" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843692" version="1" comment="kernel-doc is &lt;4.18.0-513.9.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843693" version="1" comment="kernel-headers is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843694" version="1" comment="kernel-modules is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843695" version="1" comment="kernel-modules-extra is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843696" version="1" comment="kernel-tools is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843697" version="1" comment="kernel-tools-libs is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843699" version="1" comment="perf is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843700" version="1" comment="python3-perf is &lt;4.18.0-513.9.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843701" version="1" comment="webkit2gtk3 is &lt;2.40.5-1.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843702" version="1" comment="webkit2gtk3-devel is &lt;2.40.5-1.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843703" version="1" comment="webkit2gtk3-jsc is &lt;2.40.5-1.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843704" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.40.5-1.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843705" version="1" comment="tracker-miners is &lt;2.1.5-2.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843706" version="1" comment="avahi is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843707" version="1" comment="avahi-autoipd is &lt;0.7-21.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843708" version="1" comment="avahi-compat-howl is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843709" version="1" comment="avahi-compat-howl-devel is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843710" version="1" comment="avahi-compat-libdns_sd is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843711" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843712" version="1" comment="avahi-devel is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843713" version="1" comment="avahi-glib is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843714" version="1" comment="avahi-glib-devel is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843715" version="1" comment="avahi-gobject is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843716" version="1" comment="avahi-gobject-devel is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843717" version="1" comment="avahi-libs is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843718" version="1" comment="avahi-tools is &lt;0.7-21.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843719" version="1" comment="avahi-ui is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843720" version="1" comment="avahi-ui-devel is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843721" version="1" comment="avahi-ui-gtk3 is &lt;0.7-21.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843722" version="1" comment="python3-avahi is &lt;0.7-21.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843723" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.16.1-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843724" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.16.1-2.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843725" version="1" comment="opensc is &lt;0.20.0-7.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843726" version="1" comment="openssl is &lt;1.1.1k-12.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843727" version="1" comment="openssl-devel is &lt;1.1.1k-12.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843728" version="1" comment="openssl-libs is &lt;1.1.1k-12.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843729" version="1" comment="openssl-perl is &lt;1.1.1k-12.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843730" version="1" comment="thunderbird is &lt;115.6.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843731" version="1" comment="firefox is &lt;115.6.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843732" version="1" comment="tigervnc is &lt;1.13.1-2.el8_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843733" version="1" comment="tigervnc-icons is &lt;1.13.1-2.el8_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843734" version="1" comment="tigervnc-license is &lt;1.13.1-2.el8_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843735" version="1" comment="tigervnc-selinux is &lt;1.13.1-2.el8_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843736" version="1" comment="tigervnc-server is &lt;1.13.1-2.el8_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843737" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-2.el8_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843738" version="1" comment="tigervnc-server-module is &lt;1.13.1-2.el8_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850257" version="1" comment="squid is &lt;4.15-7.module+el8.9.0+20975+25f17541.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843739" version="1" comment="nss is &lt;3.90.0-4.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843740" version="1" comment="nss-devel is &lt;3.90.0-4.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843741" version="1" comment="nss-softokn is &lt;3.90.0-4.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843742" version="1" comment="nss-softokn-devel is &lt;3.90.0-4.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843743" version="1" comment="nss-softokn-freebl is &lt;3.90.0-4.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843744" version="1" comment="nss-softokn-freebl-devel is &lt;3.90.0-4.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843745" version="1" comment="nss-sysinit is &lt;3.90.0-4.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843746" version="1" comment="nss-tools is &lt;3.90.0-4.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843747" version="1" comment="nss-util is &lt;3.90.0-4.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843748" version="1" comment="nss-util-devel is &lt;3.90.0-4.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843749" version="1" comment="bpftool is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843750" version="1" comment="kernel is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843751" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-513.11.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843752" version="1" comment="kernel-core is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843753" version="1" comment="kernel-cross-headers is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843754" version="1" comment="kernel-debug is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843755" version="1" comment="kernel-debug-core is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843757" version="1" comment="kernel-debug-modules is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843758" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843760" version="1" comment="kernel-doc is &lt;4.18.0-513.11.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843761" version="1" comment="kernel-headers is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843762" version="1" comment="kernel-modules is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843763" version="1" comment="kernel-modules-extra is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843764" version="1" comment="kernel-tools is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843765" version="1" comment="kernel-tools-libs is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843767" version="1" comment="perf is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843768" version="1" comment="python3-perf is &lt;4.18.0-513.11.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844460" version="1" comment="python3-urllib3 is &lt;1.24.2-5.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844461" version="1" comment="libxml2 is &lt;2.9.7-18.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844462" version="1" comment="libxml2-devel is &lt;2.9.7-18.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844463" version="1" comment="python3-libxml2 is &lt;2.9.7-18.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843769" version="1" comment="frr is &lt;7.5.1-13.el8_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843770" version="1" comment="frr-selinux is &lt;7.5.1-13.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844294" version="1" comment="pixman is &lt;0.38.4-3.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844295" version="1" comment="pixman-devel is &lt;0.38.4-3.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874232" version="1" comment="fence-agents-aliyun is &lt;4.2.1-121.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874233" version="1" comment="fence-agents-all is &lt;4.2.1-121.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874234" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874235" version="1" comment="fence-agents-apc is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874236" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874237" version="1" comment="fence-agents-aws is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874238" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874239" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874240" version="1" comment="fence-agents-brocade is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874241" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874242" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874243" version="1" comment="fence-agents-common is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874244" version="1" comment="fence-agents-compute is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874245" version="1" comment="fence-agents-drac5 is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874246" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874247" version="1" comment="fence-agents-emerson is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874248" version="1" comment="fence-agents-eps is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874249" version="1" comment="fence-agents-gce is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874250" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874251" version="1" comment="fence-agents-hpblade is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874252" version="1" comment="fence-agents-ibm-powervs is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874253" version="1" comment="fence-agents-ibm-vpc is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874254" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874255" version="1" comment="fence-agents-ifmib is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874256" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874257" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874258" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874259" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874260" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874261" version="1" comment="fence-agents-ipdu is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874262" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874263" version="1" comment="fence-agents-kdump is &lt;4.2.1-121.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874264" version="1" comment="fence-agents-kubevirt is &lt;4.2.1-121.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874265" version="1" comment="fence-agents-lpar is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874266" version="1" comment="fence-agents-mpath is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874267" version="1" comment="fence-agents-openstack is &lt;4.2.1-121.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874268" version="1" comment="fence-agents-redfish is &lt;4.2.1-121.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874269" version="1" comment="fence-agents-rhevm is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874270" version="1" comment="fence-agents-rsa is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874271" version="1" comment="fence-agents-rsb is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874272" version="1" comment="fence-agents-sbd is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874273" version="1" comment="fence-agents-scsi is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874274" version="1" comment="fence-agents-virsh is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874275" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874276" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874277" version="1" comment="fence-agents-wti is &lt;4.2.1-121.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872168" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.1-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872169" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.1-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872170" version="1" comment="dotnet is &lt;8.0.101-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872171" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.1-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872172" version="1" comment="dotnet-host is &lt;8.0.1-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872173" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.1-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872174" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.1-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872175" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.101-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872176" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.101-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872177" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.1-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872178" version="1" comment="dotnet-templates-8.0 is &lt;8.0.101-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872179" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.101-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843771" version="1" comment="gnutls is &lt;3.6.16-8.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843772" version="1" comment="gnutls-c++ is &lt;3.6.16-8.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843773" version="1" comment="gnutls-dane is &lt;3.6.16-8.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843774" version="1" comment="gnutls-devel is &lt;3.6.16-8.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843775" version="1" comment="gnutls-utils is &lt;3.6.16-8.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872419" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.15-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872420" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.15-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872421" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.15-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872422" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.15-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872423" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.15-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872424" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.115-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872425" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.115-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872426" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.15-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872427" version="1" comment="dotnet-templates-7.0 is &lt;7.0.115-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843776" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.26-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843777" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.26-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843778" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.26-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843779" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.26-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843780" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.26-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843781" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.126-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843782" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.126-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843783" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.26-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843784" version="1" comment="dotnet-templates-6.0 is &lt;6.0.126-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843785" version="1" comment="java-21-openjdk is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843786" version="1" comment="java-21-openjdk-demo is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843787" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843788" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843789" version="1" comment="java-21-openjdk-devel is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843790" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843791" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843792" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843793" version="1" comment="java-21-openjdk-headless is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843794" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843795" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843796" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843797" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843798" version="1" comment="java-21-openjdk-jmods is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843799" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843800" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843801" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843802" version="1" comment="java-21-openjdk-src is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843803" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843804" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843805" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843806" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843807" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.2.0.13-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843808" version="1" comment="lemon is &lt;3.26.0-19.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843809" version="1" comment="sqlite is &lt;3.26.0-19.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843810" version="1" comment="sqlite-devel is &lt;3.26.0-19.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843811" version="1" comment="sqlite-doc is &lt;3.26.0-19.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843812" version="1" comment="sqlite-libs is &lt;3.26.0-19.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843813" version="1" comment="platform-python is &lt;3.6.8-56.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843814" version="1" comment="platform-python-debug is &lt;3.6.8-56.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843815" version="1" comment="platform-python-devel is &lt;3.6.8-56.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843816" version="1" comment="python3-idle is &lt;3.6.8-56.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843817" version="1" comment="python3-libs is &lt;3.6.8-56.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843818" version="1" comment="python3-test is &lt;3.6.8-56.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009843819" version="1" comment="python3-tkinter is &lt;3.6.8-56.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844464" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844465" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844466" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844467" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844468" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844469" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844470" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844471" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844472" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844473" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844474" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844475" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844476" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844477" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844478" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.402.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844479" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.402.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844480" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844481" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844482" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844483" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845119" version="1" comment="java-11-openjdk is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845120" version="1" comment="java-11-openjdk-demo is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845121" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845122" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845123" version="1" comment="java-11-openjdk-devel is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845124" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845125" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845126" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845127" version="1" comment="java-11-openjdk-headless is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845128" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845129" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845130" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845131" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845132" version="1" comment="java-11-openjdk-jmods is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845133" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845134" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845135" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845136" version="1" comment="java-11-openjdk-src is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845137" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845138" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845139" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845140" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845141" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849165" version="1" comment="java-17-openjdk is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849166" version="1" comment="java-17-openjdk-demo is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849167" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849168" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849169" version="1" comment="java-17-openjdk-devel is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849170" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849171" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849172" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849173" version="1" comment="java-17-openjdk-headless is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849174" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849175" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849176" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849177" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849178" version="1" comment="java-17-openjdk-jmods is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849179" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849180" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849181" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849182" version="1" comment="java-17-openjdk-src is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849183" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849184" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849185" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849186" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849187" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849870" version="1" comment="tomcat is &lt;9.0.62-27.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849871" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-27.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849872" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-27.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849873" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-27.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849874" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-27.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849875" version="1" comment="tomcat-lib is &lt;9.0.62-27.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849876" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-27.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849877" version="1" comment="tomcat-webapps is &lt;9.0.62-27.el8_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844788" version="1" comment="openssh is &lt;8.0p1-19.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844789" version="1" comment="openssh-askpass is &lt;8.0p1-19.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844790" version="1" comment="openssh-cavs is &lt;8.0p1-19.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844791" version="1" comment="openssh-clients is &lt;8.0p1-19.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844792" version="1" comment="openssh-keycat is &lt;8.0p1-19.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844793" version="1" comment="openssh-ldap is &lt;8.0p1-19.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844794" version="1" comment="openssh-server is &lt;8.0p1-19.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844795" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.19.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846258" version="1" comment="tigervnc is &lt;1.13.1-2.el8_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846259" version="1" comment="tigervnc-icons is &lt;1.13.1-2.el8_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846260" version="1" comment="tigervnc-license is &lt;1.13.1-2.el8_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846261" version="1" comment="tigervnc-selinux is &lt;1.13.1-2.el8_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846262" version="1" comment="tigervnc-server is &lt;1.13.1-2.el8_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846263" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-2.el8_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846264" version="1" comment="tigervnc-server-module is &lt;1.13.1-2.el8_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845276" version="1" comment="firefox is &lt;115.7.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845277" version="1" comment="thunderbird is &lt;115.7.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845142" version="1" comment="gnutls is &lt;3.6.16-8.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845143" version="1" comment="gnutls-c++ is &lt;3.6.16-8.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845144" version="1" comment="gnutls-dane is &lt;3.6.16-8.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845145" version="1" comment="gnutls-devel is &lt;3.6.16-8.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845146" version="1" comment="gnutls-utils is &lt;3.6.16-8.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845147" version="1" comment="libssh is &lt;0.9.6-13.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845148" version="1" comment="libssh-config is &lt;0.9.6-13.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845149" version="1" comment="libssh-devel is &lt;0.9.6-13.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845278" version="1" comment="python3-rpm is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845279" version="1" comment="rpm is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845280" version="1" comment="rpm-apidocs is &lt;4.14.3-28.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845281" version="1" comment="rpm-build is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845282" version="1" comment="rpm-build-libs is &lt;4.14.3-28.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845283" version="1" comment="rpm-cron is &lt;4.14.3-28.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845284" version="1" comment="rpm-devel is &lt;4.14.3-28.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845285" version="1" comment="rpm-libs is &lt;4.14.3-28.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845286" version="1" comment="rpm-plugin-fapolicyd is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845287" version="1" comment="rpm-plugin-ima is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845288" version="1" comment="rpm-plugin-prioreset is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845289" version="1" comment="rpm-plugin-selinux is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845290" version="1" comment="rpm-plugin-syslog is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845291" version="1" comment="rpm-plugin-systemd-inhibit is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845292" version="1" comment="rpm-sign is &lt;4.14.3-28.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846325" version="1" comment="aardvark-dns is &lt;1.7.0-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846326" version="1" comment="buildah is &lt;1.31.3-3.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846327" version="1" comment="buildah-tests is &lt;1.31.3-3.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846328" version="1" comment="cockpit-podman is &lt;75-1.module+el8.9.0+21243+a586538b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846329" version="1" comment="conmon is &lt;2.1.8-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846330" version="1" comment="container-selinux is &lt;2.221.0-1.module+el8.9.0+21243+a586538b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846331" version="1" comment="containernetworking-plugins is &lt;1.3.0-8.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846332" version="1" comment="containers-common is &lt;1-71.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846333" version="1" comment="crit is &lt;3.18-4.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846334" version="1" comment="criu is &lt;3.18-4.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846335" version="1" comment="criu-devel is &lt;3.18-4.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846336" version="1" comment="criu-libs is &lt;3.18-4.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846337" version="1" comment="crun is &lt;1.8.7-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846338" version="1" comment="fuse-overlayfs is &lt;1.12-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846339" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846340" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846341" version="1" comment="netavark is &lt;1.7.0-2.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846342" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.9-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846343" version="1" comment="podman is &lt;4.6.1-8.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846344" version="1" comment="podman-catatonit is &lt;4.6.1-8.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846345" version="1" comment="podman-docker is &lt;4.6.1-8.module+el8.9.0+21243+a586538b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846346" version="1" comment="podman-gvproxy is &lt;4.6.1-8.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846347" version="1" comment="podman-plugins is &lt;4.6.1-8.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846348" version="1" comment="podman-remote is &lt;4.6.1-8.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846349" version="1" comment="podman-tests is &lt;4.6.1-8.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846350" version="1" comment="python3-criu is &lt;3.18-4.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846351" version="1" comment="python3-podman is &lt;4.6.0-2.module+el8.9.0+21243+a586538b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846352" version="1" comment="runc is &lt;1.1.12-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846353" version="1" comment="skopeo is &lt;1.13.3-3.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846354" version="1" comment="skopeo-tests is &lt;1.13.3-3.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846355" version="1" comment="slirp4netns is &lt;1.2.1-1.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846356" version="1" comment="toolbox is &lt;0.0.99.4-5.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846357" version="1" comment="toolbox-tests is &lt;0.0.99.4-5.module+el8.9.0+21243+a586538b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846358" version="1" comment="udica is &lt;0.2.6-20.module+el8.9.0+21243+a586538b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849188" version="1" comment="libmaxminddb is &lt;1.2.0-10.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849189" version="1" comment="libmaxminddb-devel is &lt;1.2.0-10.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865913" version="1" comment="tcpdump is &lt;4.9.3-3.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848842" version="1" comment="nss is &lt;3.90.0-6.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848843" version="1" comment="nss-devel is &lt;3.90.0-6.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848844" version="1" comment="nss-softokn is &lt;3.90.0-6.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848845" version="1" comment="nss-softokn-devel is &lt;3.90.0-6.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848846" version="1" comment="nss-softokn-freebl is &lt;3.90.0-6.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848847" version="1" comment="nss-softokn-freebl-devel is &lt;3.90.0-6.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848848" version="1" comment="nss-sysinit is &lt;3.90.0-6.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848849" version="1" comment="nss-tools is &lt;3.90.0-6.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848850" version="1" comment="nss-util is &lt;3.90.0-6.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848851" version="1" comment="nss-util-devel is &lt;3.90.0-6.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872180" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.16-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872181" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.16-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872182" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.16-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872183" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.16-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872184" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.16-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872185" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.116-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872186" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.116-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872187" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.16-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872188" version="1" comment="dotnet-templates-7.0 is &lt;7.0.116-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846359" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.27-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846360" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.27-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846361" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.27-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846362" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.27-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846363" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.27-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846364" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.127-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846365" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.127-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846366" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.27-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846367" version="1" comment="dotnet-templates-6.0 is &lt;6.0.127-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848258" version="1" comment="sudo is &lt;1.9.5p2-10.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848259" version="1" comment="sudo-python-plugin is &lt;1.9.5p2-10.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872428" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872429" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872430" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872431" version="1" comment="dotnet is &lt;8.0.102-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872432" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872433" version="1" comment="dotnet-host is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872434" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872435" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872436" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872437" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.102-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872438" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.102-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872439" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.102-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872440" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.2-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872441" version="1" comment="dotnet-templates-8.0 is &lt;8.0.102-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872442" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.102-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848853" version="1" comment="go-toolset is &lt;1.20.12-1.module+el8.9.0+21033+5795bdf6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848854" version="1" comment="golang is &lt;1.20.12-2.module+el8.9.0+21033+5795bdf6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848855" version="1" comment="golang-bin is &lt;1.20.12-2.module+el8.9.0+21033+5795bdf6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848856" version="1" comment="golang-docs is &lt;1.20.12-2.module+el8.9.0+21033+5795bdf6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848857" version="1" comment="golang-misc is &lt;1.20.12-2.module+el8.9.0+21033+5795bdf6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848858" version="1" comment="golang-src is &lt;1.20.12-2.module+el8.9.0+21033+5795bdf6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848859" version="1" comment="golang-tests is &lt;1.20.12-2.module+el8.9.0+21033+5795bdf6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848860" version="1" comment="oniguruma is &lt;6.8.2-2.1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848861" version="1" comment="oniguruma-devel is &lt;6.8.2-2.1.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848862" version="1" comment="python3-pillow is &lt;5.1.1-18.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848863" version="1" comment="python3-pillow-devel is &lt;5.1.1-18.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848864" version="1" comment="python3-pillow-doc is &lt;5.1.1-18.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848865" version="1" comment="python3-pillow-tk is &lt;5.1.1-18.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848866" version="1" comment="bpftool is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848867" version="1" comment="kernel is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848868" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-513.18.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848869" version="1" comment="kernel-core is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848870" version="1" comment="kernel-cross-headers is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848871" version="1" comment="kernel-debug is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848872" version="1" comment="kernel-debug-core is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848874" version="1" comment="kernel-debug-modules is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848875" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848877" version="1" comment="kernel-doc is &lt;4.18.0-513.18.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848878" version="1" comment="kernel-headers is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848879" version="1" comment="kernel-modules is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848880" version="1" comment="kernel-modules-extra is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848881" version="1" comment="kernel-tools is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848882" version="1" comment="kernel-tools-libs is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848884" version="1" comment="perf is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848885" version="1" comment="python3-perf is &lt;4.18.0-513.18.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849190" version="1" comment="firefox is &lt;115.8.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849710" version="1" comment="thunderbird is &lt;115.8.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849485" version="1" comment="python3-unbound is &lt;1.16.2-5.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849486" version="1" comment="unbound is &lt;1.16.2-5.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849487" version="1" comment="unbound-devel is &lt;1.16.2-5.el8_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849488" version="1" comment="unbound-libs is &lt;1.16.2-5.el8_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849489" version="1" comment="opensc is &lt;0.20.0-8.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850258" version="1" comment="pg_repack is &lt;1.4.8-1.module+el8.9.0+19797+c4ce5969 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850259" version="1" comment="pgaudit is &lt;1.7.0-1.module+el8.9.0+19797+c4ce5969 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850260" version="1" comment="postgres-decoderbufs is &lt;1.9.7-1.Final.module+el8.9.0+19797+c4ce5969 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850261" version="1" comment="postgresql is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850262" version="1" comment="postgresql-contrib is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850263" version="1" comment="postgresql-docs is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850264" version="1" comment="postgresql-plperl is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850265" version="1" comment="postgresql-plpython3 is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850266" version="1" comment="postgresql-pltcl is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850267" version="1" comment="postgresql-private-devel is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850268" version="1" comment="postgresql-private-libs is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850269" version="1" comment="postgresql-server is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850270" version="1" comment="postgresql-server-devel is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850271" version="1" comment="postgresql-static is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850272" version="1" comment="postgresql-test is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850273" version="1" comment="postgresql-test-rpm-macros is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850274" version="1" comment="postgresql-upgrade is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850275" version="1" comment="postgresql-upgrade-devel is &lt;15.6-1.module+el8.9.0+21287+d0eecfe6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954958" version="1" comment="bpftool is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954959" version="1" comment="kernel is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954960" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.30.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954961" version="1" comment="kernel-core is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954962" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954963" version="1" comment="kernel-debug is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954964" version="1" comment="kernel-debug-core is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954966" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954967" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954969" version="1" comment="kernel-doc is &lt;4.18.0-553.30.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954970" version="1" comment="kernel-headers is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954971" version="1" comment="kernel-modules is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954972" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954973" version="1" comment="kernel-tools is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954974" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954976" version="1" comment="perf is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954977" version="1" comment="python3-perf is &lt;4.18.0-553.30.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954978" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954979" version="1" comment="buildah is &lt;1.33.11-1.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954980" version="1" comment="buildah-tests is &lt;1.33.11-1.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954981" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+22417+2fb00970 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954982" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954983" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+22417+2fb00970 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954984" version="1" comment="containernetworking-plugins is &lt;1.4.0-5.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954985" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954986" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954987" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954988" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954989" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954990" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954991" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954992" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954993" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954994" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954995" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954996" version="1" comment="podman is &lt;4.9.4-18.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954997" version="1" comment="podman-catatonit is &lt;4.9.4-18.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954998" version="1" comment="podman-docker is &lt;4.9.4-18.module+el8.10.0+22417+2fb00970 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954999" version="1" comment="podman-gvproxy is &lt;4.9.4-18.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955000" version="1" comment="podman-plugins is &lt;4.9.4-18.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955001" version="1" comment="podman-remote is &lt;4.9.4-18.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955002" version="1" comment="podman-tests is &lt;4.9.4-18.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955003" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955004" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+22417+2fb00970 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955005" version="1" comment="runc is &lt;1.1.12-5.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955006" version="1" comment="skopeo is &lt;1.14.5-3.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955007" version="1" comment="skopeo-tests is &lt;1.14.5-3.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955008" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955009" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955010" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+22417+2fb00970 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955011" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+22417+2fb00970 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955012" version="1" comment="pam is &lt;1.3.1-36.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955013" version="1" comment="pam-devel is &lt;1.3.1-36.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955236" version="1" comment="webkit2gtk3 is &lt;2.46.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955237" version="1" comment="webkit2gtk3-devel is &lt;2.46.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955238" version="1" comment="webkit2gtk3-jsc is &lt;2.46.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955239" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957048" version="1" comment="thunderbird is &lt;128.5.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956874" version="1" comment="firefox is &lt;128.5.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956562" version="1" comment="platform-python is &lt;3.6.8-69.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956563" version="1" comment="platform-python-debug is &lt;3.6.8-69.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956564" version="1" comment="platform-python-devel is &lt;3.6.8-69.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956565" version="1" comment="python3-idle is &lt;3.6.8-69.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956566" version="1" comment="python3-libs is &lt;3.6.8-69.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956567" version="1" comment="python3-test is &lt;3.6.8-69.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956568" version="1" comment="python3-tkinter is &lt;3.6.8-69.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956875" version="1" comment="pg_repack is &lt;1.5.1-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881424" version="1" comment="pgaudit is &lt;16.0-1.module+el8.10.0+20413+d8116364 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881425" version="1" comment="postgres-decoderbufs is &lt;2.4.0-1.Final.module+el8.10.0+20413+d8116364 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956876" version="1" comment="postgresql is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956877" version="1" comment="postgresql-contrib is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956878" version="1" comment="postgresql-docs is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956879" version="1" comment="postgresql-plperl is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956880" version="1" comment="postgresql-plpython3 is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956881" version="1" comment="postgresql-pltcl is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956882" version="1" comment="postgresql-private-devel is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956883" version="1" comment="postgresql-private-libs is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956884" version="1" comment="postgresql-server is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956885" version="1" comment="postgresql-server-devel is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956886" version="1" comment="postgresql-static is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956887" version="1" comment="postgresql-test is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956888" version="1" comment="postgresql-test-rpm-macros is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956889" version="1" comment="postgresql-upgrade is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956890" version="1" comment="postgresql-upgrade-devel is &lt;16.6-1.module+el8.10.0+22551+c0330dc9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957049" version="1" comment="ruby is &lt;3.1.5-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957050" version="1" comment="ruby-bundled-gems is &lt;3.1.5-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957051" version="1" comment="ruby-default-gems is &lt;3.1.5-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957052" version="1" comment="ruby-devel is &lt;3.1.5-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957053" version="1" comment="ruby-doc is &lt;3.1.5-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957054" version="1" comment="ruby-libs is &lt;3.1.5-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874596" version="1" comment="rubygem-abrt is &lt;0.4.0-1.module+el8.10.0+21470+43ec8058 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874597" version="1" comment="rubygem-abrt-doc is &lt;0.4.0-1.module+el8.10.0+21470+43ec8058 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957055" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957056" version="1" comment="rubygem-bundler is &lt;2.3.27-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957057" version="1" comment="rubygem-io-console is &lt;0.5.11-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957058" version="1" comment="rubygem-irb is &lt;1.4.1-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957059" version="1" comment="rubygem-json is &lt;2.6.1-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957060" version="1" comment="rubygem-minitest is &lt;5.15.0-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874604" version="1" comment="rubygem-mysql2 is &lt;0.5.3-3.module+el8.10.0+21470+43ec8058 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874605" version="1" comment="rubygem-mysql2-doc is &lt;0.5.3-3.module+el8.10.0+21470+43ec8058 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874606" version="1" comment="rubygem-pg is &lt;1.3.2-1.module+el8.10.0+21470+43ec8058 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874607" version="1" comment="rubygem-pg-doc is &lt;1.3.2-1.module+el8.10.0+21470+43ec8058 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957061" version="1" comment="rubygem-power_assert is &lt;2.0.1-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957062" version="1" comment="rubygem-psych is &lt;4.0.4-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957063" version="1" comment="rubygem-rake is &lt;13.0.6-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957064" version="1" comment="rubygem-rbs is &lt;2.7.0-144.module+el8.10.0+22580+b97d9670 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957065" version="1" comment="rubygem-rdoc is &lt;6.4.1.1-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957066" version="1" comment="rubygem-rexml is &lt;3.2.5-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957067" version="1" comment="rubygem-rss is &lt;0.2.9-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957068" version="1" comment="rubygem-test-unit is &lt;3.5.3-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957069" version="1" comment="rubygem-typeprof is &lt;0.21.3-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957070" version="1" comment="rubygems is &lt;3.3.27-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957071" version="1" comment="rubygems-devel is &lt;3.3.27-144.module+el8.10.0+22580+b97d9670 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957072" version="1" comment="ruby is &lt;2.5.9-113.module+el8.10.0+22581+23fc9c9e for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957073" version="1" comment="ruby-devel is &lt;2.5.9-113.module+el8.10.0+22581+23fc9c9e for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957074" version="1" comment="ruby-doc is &lt;2.5.9-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957075" version="1" comment="ruby-irb is &lt;2.5.9-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957076" version="1" comment="ruby-libs is &lt;2.5.9-113.module+el8.10.0+22581+23fc9c9e for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873732" version="1" comment="rubygem-abrt is &lt;0.3.0-4.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873733" version="1" comment="rubygem-abrt-doc is &lt;0.3.0-4.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957077" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-113.module+el8.10.0+22581+23fc9c9e for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873735" version="1" comment="rubygem-bundler is &lt;1.16.1-4.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873736" version="1" comment="rubygem-bundler-doc is &lt;1.16.1-4.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957078" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957079" version="1" comment="rubygem-io-console is &lt;0.4.6-113.module+el8.10.0+22581+23fc9c9e for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957080" version="1" comment="rubygem-json is &lt;2.1.0-113.module+el8.10.0+22581+23fc9c9e for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957081" version="1" comment="rubygem-minitest is &lt;5.10.3-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957082" version="1" comment="rubygem-net-telnet is &lt;0.1.1-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957083" version="1" comment="rubygem-openssl is &lt;2.1.2-113.module+el8.10.0+22581+23fc9c9e for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957084" version="1" comment="rubygem-power_assert is &lt;1.1.1-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957085" version="1" comment="rubygem-psych is &lt;3.0.2-113.module+el8.10.0+22581+23fc9c9e for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957086" version="1" comment="rubygem-rake is &lt;12.3.3-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957087" version="1" comment="rubygem-rdoc is &lt;6.0.1.1-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957088" version="1" comment="rubygem-test-unit is &lt;3.2.7-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957089" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957090" version="1" comment="rubygems is &lt;2.7.6.3-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957091" version="1" comment="rubygems-devel is &lt;2.7.6.3-113.module+el8.10.0+22581+23fc9c9e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957307" version="1" comment="bpftool is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957308" version="1" comment="kernel is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957309" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.32.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957310" version="1" comment="kernel-core is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957311" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957312" version="1" comment="kernel-debug is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957313" version="1" comment="kernel-debug-core is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957315" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957316" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957318" version="1" comment="kernel-doc is &lt;4.18.0-553.32.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957319" version="1" comment="kernel-headers is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957320" version="1" comment="kernel-modules is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957321" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957322" version="1" comment="kernel-tools is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957323" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957325" version="1" comment="perf is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957326" version="1" comment="python3-perf is &lt;4.18.0-553.32.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957327" version="1" comment="apcu-panel is &lt;5.1.23-1.module+el8.10.0+20770+a5eca186 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957328" version="1" comment="libzip is &lt;1.7.3-1.module+el8.10.0+20770+a5eca186 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957329" version="1" comment="libzip-devel is &lt;1.7.3-1.module+el8.10.0+20770+a5eca186 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957330" version="1" comment="libzip-tools is &lt;1.7.3-1.module+el8.10.0+20770+a5eca186 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957331" version="1" comment="php is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957332" version="1" comment="php-bcmath is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957333" version="1" comment="php-cli is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957334" version="1" comment="php-common is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957335" version="1" comment="php-dba is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957336" version="1" comment="php-dbg is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957337" version="1" comment="php-devel is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957338" version="1" comment="php-embedded is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957339" version="1" comment="php-enchant is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957340" version="1" comment="php-ffi is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957341" version="1" comment="php-fpm is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957342" version="1" comment="php-gd is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957343" version="1" comment="php-gmp is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957344" version="1" comment="php-intl is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957345" version="1" comment="php-ldap is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957346" version="1" comment="php-mbstring is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957347" version="1" comment="php-mysqlnd is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957348" version="1" comment="php-odbc is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957349" version="1" comment="php-opcache is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957350" version="1" comment="php-pdo is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957351" version="1" comment="php-pear is &lt;1.10.14-1.module+el8.10.0+20770+a5eca186 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957352" version="1" comment="php-pecl-apcu is &lt;5.1.23-1.module+el8.10.0+20770+a5eca186 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957353" version="1" comment="php-pecl-apcu-devel is &lt;5.1.23-1.module+el8.10.0+20770+a5eca186 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957354" version="1" comment="php-pecl-rrd is &lt;2.0.3-1.module+el8.10.0+20770+a5eca186 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957355" version="1" comment="php-pecl-xdebug3 is &lt;3.2.2-2.module+el8.10.0+20798+00eaeb41 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957356" version="1" comment="php-pecl-zip is &lt;1.22.3-1.module+el8.10.0+20770+a5eca186 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957357" version="1" comment="php-pgsql is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957358" version="1" comment="php-process is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957359" version="1" comment="php-snmp is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957360" version="1" comment="php-soap is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957361" version="1" comment="php-xml is &lt;8.2.25-1.module+el8.10.0+22478+9eb07224 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957362" version="1" comment="apcu-panel is &lt;5.1.18-1.module+el8.10.0+22485+a3539972 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957363" version="1" comment="libzip is &lt;1.6.1-1.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957364" version="1" comment="libzip-devel is &lt;1.6.1-1.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957365" version="1" comment="libzip-tools is &lt;1.6.1-1.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957366" version="1" comment="php is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957367" version="1" comment="php-bcmath is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957368" version="1" comment="php-cli is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957369" version="1" comment="php-common is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957370" version="1" comment="php-dba is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957371" version="1" comment="php-dbg is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957372" version="1" comment="php-devel is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957373" version="1" comment="php-embedded is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957374" version="1" comment="php-enchant is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957375" version="1" comment="php-ffi is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957376" version="1" comment="php-fpm is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957377" version="1" comment="php-gd is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957378" version="1" comment="php-gmp is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957379" version="1" comment="php-intl is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957380" version="1" comment="php-json is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957381" version="1" comment="php-ldap is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957382" version="1" comment="php-mbstring is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957383" version="1" comment="php-mysqlnd is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957384" version="1" comment="php-odbc is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957385" version="1" comment="php-opcache is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957386" version="1" comment="php-pdo is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957387" version="1" comment="php-pear is &lt;1.10.13-1.module+el8.10.0+22485+a3539972 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957388" version="1" comment="php-pecl-apcu is &lt;5.1.18-1.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957389" version="1" comment="php-pecl-apcu-devel is &lt;5.1.18-1.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957390" version="1" comment="php-pecl-rrd is &lt;2.0.1-1.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957391" version="1" comment="php-pecl-xdebug is &lt;2.9.5-1.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957392" version="1" comment="php-pecl-zip is &lt;1.18.2-1.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957393" version="1" comment="php-pgsql is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957394" version="1" comment="php-process is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957395" version="1" comment="php-snmp is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957396" version="1" comment="php-soap is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957397" version="1" comment="php-xml is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957398" version="1" comment="php-xmlrpc is &lt;7.4.33-2.module+el8.10.0+22485+a3539972 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957399" version="1" comment="python-nose-docs is &lt;1.3.7-31.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957400" version="1" comment="python-pymongo-doc is &lt;3.7.0-1.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957401" version="1" comment="python-sqlalchemy-doc is &lt;1.3.2-3.module+el8.10.0+20981+3704b446 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957402" version="1" comment="python-virtualenv-doc is &lt;15.1.0-23.module+el8.10.0+22619+61b70790 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957403" version="1" comment="python3-PyMySQL is &lt;0.10.1-2.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957404" version="1" comment="python3-bson is &lt;3.7.0-1.module+el8.10.0+20784+edafcd43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957405" version="1" comment="python3-distro is &lt;1.4.0-2.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957406" version="1" comment="python3-docs is &lt;3.6.7-2.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957407" version="1" comment="python3-docutils is &lt;0.14-12.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957408" version="1" comment="python3-nose is &lt;1.3.7-31.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957409" version="1" comment="python3-pygments is &lt;2.2.0-22.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957410" version="1" comment="python3-pymongo is &lt;3.7.0-1.module+el8.10.0+20784+edafcd43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957411" version="1" comment="python3-pymongo-gridfs is &lt;3.7.0-1.module+el8.10.0+20784+edafcd43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957412" version="1" comment="python3-scipy is &lt;1.0.0-21.module+el8.10.0+20784+edafcd43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957413" version="1" comment="python3-sqlalchemy is &lt;1.3.2-3.module+el8.10.0+20981+3704b446 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957414" version="1" comment="python3-virtualenv is &lt;15.1.0-23.module+el8.10.0+22619+61b70790 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957415" version="1" comment="python3-wheel is &lt;0.31.1-3.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957416" version="1" comment="python3-wheel-wheel is &lt;0.31.1-3.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957417" version="1" comment="python36 is &lt;3.6.8-39.module+el8.10.0+20784+edafcd43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957418" version="1" comment="python36-debug is &lt;3.6.8-39.module+el8.10.0+20784+edafcd43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957419" version="1" comment="python36-devel is &lt;3.6.8-39.module+el8.10.0+20784+edafcd43 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957420" version="1" comment="python36-rpm-macros is &lt;3.6.8-39.module+el8.10.0+20784+edafcd43 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957421" version="1" comment="python3.11 is &lt;3.11.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957422" version="1" comment="python3.11-debug is &lt;3.11.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957423" version="1" comment="python3.11-devel is &lt;3.11.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957424" version="1" comment="python3.11-idle is &lt;3.11.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957425" version="1" comment="python3.11-libs is &lt;3.11.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957426" version="1" comment="python3.11-rpm-macros is &lt;3.11.11-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957427" version="1" comment="python3.11-test is &lt;3.11.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957428" version="1" comment="python3.11-tkinter is &lt;3.11.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957429" version="1" comment="python3.12 is &lt;3.12.8-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957430" version="1" comment="python3.12-debug is &lt;3.12.8-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957431" version="1" comment="python3.12-devel is &lt;3.12.8-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957432" version="1" comment="python3.12-idle is &lt;3.12.8-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957433" version="1" comment="python3.12-libs is &lt;3.12.8-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957434" version="1" comment="python3.12-rpm-macros is &lt;3.12.8-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957435" version="1" comment="python3.12-test is &lt;3.12.8-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957436" version="1" comment="python3.12-tkinter is &lt;3.12.8-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958517" version="1" comment="pcs is &lt;0.10.18-2.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958518" version="1" comment="pcs-snmp is &lt;0.10.18-2.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958519" version="1" comment="bluez is &lt;5.63-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958520" version="1" comment="bluez-cups is &lt;5.63-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958521" version="1" comment="bluez-hid2hci is &lt;5.63-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958522" version="1" comment="bluez-libs is &lt;5.63-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958523" version="1" comment="bluez-libs-devel is &lt;5.63-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958524" version="1" comment="bluez-obexd is &lt;5.63-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958525" version="1" comment="tuned is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958526" version="1" comment="tuned-gtk is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958527" version="1" comment="tuned-profiles-atomic is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958528" version="1" comment="tuned-profiles-compat is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958529" version="1" comment="tuned-profiles-cpu-partitioning is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958530" version="1" comment="tuned-profiles-mssql is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958531" version="1" comment="tuned-profiles-oracle is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958532" version="1" comment="tuned-profiles-postgresql is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958533" version="1" comment="tuned-utils is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958534" version="1" comment="tuned-utils-systemtap is &lt;2.22.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958535" version="1" comment="edk2-ovmf is &lt;20220126gitbb1bba3d77-13.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958536" version="1" comment="python3.11-urllib3 is &lt;1.26.12-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958537" version="1" comment="libsndfile is &lt;1.0.28-16.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958538" version="1" comment="libsndfile-devel is &lt;1.0.28-16.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958539" version="1" comment="libsndfile-utils is &lt;1.0.28-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958540" version="1" comment="mpg123 is &lt;1.32.9-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958541" version="1" comment="mpg123-devel is &lt;1.32.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958542" version="1" comment="mpg123-libs is &lt;1.32.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958543" version="1" comment="mpg123-plugins-pulseaudio is &lt;1.32.9-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958562" version="1" comment="gstreamer1-plugins-good is &lt;1.16.1-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958563" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.16.1-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958564" version="1" comment="gstreamer1-plugins-base is &lt;1.16.1-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958565" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.16.1-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874278" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.17-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874279" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.17-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874280" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.17-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874281" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.17-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874282" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.17-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874283" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.117-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874284" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.117-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874285" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.17-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874286" version="1" comment="dotnet-templates-7.0 is &lt;7.0.117-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872443" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872444" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872445" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872446" version="1" comment="dotnet is &lt;8.0.103-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872447" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872448" version="1" comment="dotnet-host is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872449" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872450" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872451" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872452" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.103-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872453" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.103-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872454" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.103-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872455" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.3-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872456" version="1" comment="dotnet-templates-8.0 is &lt;8.0.103-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872457" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.103-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851376" version="1" comment="dnsmasq is &lt;2.79-31.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851377" version="1" comment="dnsmasq-utils is &lt;2.79-31.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851810" version="1" comment="squid is &lt;4.15-7.module+el8.9.0+21530+59b09a5b.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874287" version="1" comment="ruby is &lt;3.1.4-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874288" version="1" comment="ruby-bundled-gems is &lt;3.1.4-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874289" version="1" comment="ruby-default-gems is &lt;3.1.4-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874290" version="1" comment="ruby-devel is &lt;3.1.4-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874291" version="1" comment="ruby-doc is &lt;3.1.4-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874292" version="1" comment="ruby-libs is &lt;3.1.4-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874293" version="1" comment="rubygem-abrt is &lt;0.4.0-1.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874294" version="1" comment="rubygem-abrt-doc is &lt;0.4.0-1.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874295" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874296" version="1" comment="rubygem-bundler is &lt;2.3.26-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874297" version="1" comment="rubygem-io-console is &lt;0.5.11-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874298" version="1" comment="rubygem-irb is &lt;1.4.1-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874299" version="1" comment="rubygem-json is &lt;2.6.1-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874300" version="1" comment="rubygem-minitest is &lt;5.15.0-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874301" version="1" comment="rubygem-mysql2 is &lt;0.5.3-3.module+el8.9.0+21471+7d1e4a35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874302" version="1" comment="rubygem-mysql2-doc is &lt;0.5.3-3.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874303" version="1" comment="rubygem-pg is &lt;1.3.2-1.module+el8.9.0+21471+7d1e4a35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874304" version="1" comment="rubygem-pg-doc is &lt;1.3.2-1.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874305" version="1" comment="rubygem-power_assert is &lt;2.0.1-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874306" version="1" comment="rubygem-psych is &lt;4.0.4-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874307" version="1" comment="rubygem-rake is &lt;13.0.6-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874308" version="1" comment="rubygem-rbs is &lt;2.7.0-142.module+el8.9.0+21471+7d1e4a35 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874309" version="1" comment="rubygem-rdoc is &lt;6.4.0-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874310" version="1" comment="rubygem-rexml is &lt;3.2.5-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874311" version="1" comment="rubygem-rss is &lt;0.2.9-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874312" version="1" comment="rubygem-test-unit is &lt;3.5.3-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874313" version="1" comment="rubygem-typeprof is &lt;0.21.3-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874314" version="1" comment="rubygems is &lt;3.3.26-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874315" version="1" comment="rubygems-devel is &lt;3.3.26-142.module+el8.9.0+21471+7d1e4a35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851811" version="1" comment="postgresql-jdbc is &lt;42.2.14-3.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851812" version="1" comment="postgresql-jdbc-javadoc is &lt;42.2.14-3.el8_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851931" version="1" comment="nodejs is &lt;16.20.2-4.module+el8.9.0+21536+8fdee1fb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851932" version="1" comment="nodejs-devel is &lt;16.20.2-4.module+el8.9.0+21536+8fdee1fb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851933" version="1" comment="nodejs-docs is &lt;16.20.2-4.module+el8.9.0+21536+8fdee1fb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851934" version="1" comment="nodejs-full-i18n is &lt;16.20.2-4.module+el8.9.0+21536+8fdee1fb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851935" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.9.0+19741+03a9aaff for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851936" version="1" comment="nodejs-packaging is &lt;26-1.module+el8.9.0+19858+c237a2cf for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851937" version="1" comment="npm is &lt;8.19.4-1.16.20.2.4.module+el8.9.0+21536+8fdee1fb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851813" version="1" comment="golang is &lt;1.20.12-3.module+el8.9.0+21528+703c3aa2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851814" version="1" comment="golang-bin is &lt;1.20.12-3.module+el8.9.0+21528+703c3aa2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851815" version="1" comment="golang-docs is &lt;1.20.12-3.module+el8.9.0+21528+703c3aa2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851816" version="1" comment="golang-misc is &lt;1.20.12-3.module+el8.9.0+21528+703c3aa2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851817" version="1" comment="golang-src is &lt;1.20.12-3.module+el8.9.0+21528+703c3aa2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851818" version="1" comment="golang-tests is &lt;1.20.12-3.module+el8.9.0+21528+703c3aa2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851976" version="1" comment="firefox is &lt;115.9.1-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875429" version="1" comment="thunderbird is &lt;115.9.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852397" version="1" comment="nodejs is &lt;18.19.1-1.module+el8.9.0+21387+21356dec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852398" version="1" comment="nodejs-devel is &lt;18.19.1-1.module+el8.9.0+21387+21356dec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852399" version="1" comment="nodejs-docs is &lt;18.19.1-1.module+el8.9.0+21387+21356dec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852400" version="1" comment="nodejs-full-i18n is &lt;18.19.1-1.module+el8.9.0+21387+21356dec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852401" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.9.0+21190+5ebd2c33 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852402" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.9.0+21190+5ebd2c33 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852403" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.9.0+21190+5ebd2c33 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852404" version="1" comment="npm is &lt;10.2.4-1.18.19.1.1.module+el8.9.0+21387+21356dec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852716" version="1" comment="curl is &lt;7.61.1-33.el8_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852717" version="1" comment="libcurl is &lt;7.61.1-33.el8_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852718" version="1" comment="libcurl-devel is &lt;7.61.1-33.el8_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852719" version="1" comment="libcurl-minimal is &lt;7.61.1-33.el8_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853155" version="1" comment="bpftool is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853156" version="1" comment="kernel is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853157" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-513.24.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853158" version="1" comment="kernel-core is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853159" version="1" comment="kernel-cross-headers is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853160" version="1" comment="kernel-debug is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853161" version="1" comment="kernel-debug-core is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853163" version="1" comment="kernel-debug-modules is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853164" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853166" version="1" comment="kernel-doc is &lt;4.18.0-513.24.1.el8_9 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853167" version="1" comment="kernel-headers is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853168" version="1" comment="kernel-modules is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853169" version="1" comment="kernel-modules-extra is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853170" version="1" comment="kernel-tools is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853171" version="1" comment="kernel-tools-libs is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853173" version="1" comment="perf is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853174" version="1" comment="python3-perf is &lt;4.18.0-513.24.1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854095" version="1" comment="opencryptoki is &lt;3.21.0-10.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854096" version="1" comment="opencryptoki-devel is &lt;3.21.0-10.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854097" version="1" comment="opencryptoki-icsftok is &lt;3.21.0-10.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854098" version="1" comment="opencryptoki-libs is &lt;3.21.0-10.el8_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854099" version="1" comment="opencryptoki-swtok is &lt;3.21.0-10.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854100" version="1" comment="opencryptoki-tpmtok is &lt;3.21.0-10.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852720" version="1" comment="less is &lt;530-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852721" version="1" comment="expat is &lt;2.2.5-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852722" version="1" comment="expat-devel is &lt;2.2.5-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854101" version="1" comment="grafana-pcp is &lt;5.1.1-2.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854102" version="1" comment="grafana is &lt;9.2.10-8.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853712" version="1" comment="nodejs is &lt;20.11.1-1.module+el8.9.0+21380+12032667 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853713" version="1" comment="nodejs-devel is &lt;20.11.1-1.module+el8.9.0+21380+12032667 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853714" version="1" comment="nodejs-docs is &lt;20.11.1-1.module+el8.9.0+21380+12032667 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853715" version="1" comment="nodejs-full-i18n is &lt;20.11.1-1.module+el8.9.0+21380+12032667 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853716" version="1" comment="npm is &lt;10.2.4-1.20.11.1.1.module+el8.9.0+21380+12032667 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854103" version="1" comment="varnish is &lt;6.0.13-1.module+el8.9.0+21617+7578fa11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854104" version="1" comment="varnish-devel is &lt;6.0.13-1.module+el8.9.0+21617+7578fa11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854105" version="1" comment="varnish-docs is &lt;6.0.13-1.module+el8.9.0+21617+7578fa11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854106" version="1" comment="varnish-modules is &lt;0.15.0-6.module+el8.9.0+21617+7578fa11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854004" version="1" comment="rear is &lt;2.6-11.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854337" version="1" comment="python3-unbound is &lt;1.16.2-5.el8_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854338" version="1" comment="unbound is &lt;1.16.2-5.el8_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854339" version="1" comment="unbound-devel is &lt;1.16.2-5.el8_9.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854340" version="1" comment="unbound-libs is &lt;1.16.2-5.el8_9.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854341" version="1" comment="bind9.16 is &lt;9.16.23-0.16.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854342" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.16.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854343" version="1" comment="bind9.16-devel is &lt;9.16.23-0.16.el8_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854344" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.16.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854345" version="1" comment="bind9.16-doc is &lt;9.16.23-0.16.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854346" version="1" comment="bind9.16-libs is &lt;9.16.23-0.16.el8_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854347" version="1" comment="bind9.16-license is &lt;9.16.23-0.16.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854348" version="1" comment="bind9.16-utils is &lt;9.16.23-0.16.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854349" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.16.el8_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854350" version="1" comment="bind is &lt;9.11.36-11.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854351" version="1" comment="bind-chroot is &lt;9.11.36-11.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854352" version="1" comment="bind-devel is &lt;9.11.36-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854353" version="1" comment="bind-export-devel is &lt;9.11.36-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854354" version="1" comment="bind-export-libs is &lt;9.11.36-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854355" version="1" comment="bind-libs is &lt;9.11.36-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854356" version="1" comment="bind-libs-lite is &lt;9.11.36-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854357" version="1" comment="bind-license is &lt;9.11.36-11.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854358" version="1" comment="bind-lite-devel is &lt;9.11.36-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854359" version="1" comment="bind-pkcs11 is &lt;9.11.36-11.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854360" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854361" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-11.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854362" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-11.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854363" version="1" comment="bind-sdb is &lt;9.11.36-11.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854364" version="1" comment="bind-sdb-chroot is &lt;9.11.36-11.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854365" version="1" comment="bind-utils is &lt;9.11.36-11.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854366" version="1" comment="dhcp-client is &lt;4.3.6-49.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854367" version="1" comment="dhcp-common is &lt;4.3.6-49.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854368" version="1" comment="dhcp-libs is &lt;4.3.6-49.el8_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854369" version="1" comment="dhcp-relay is &lt;4.3.6-49.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854370" version="1" comment="dhcp-server is &lt;4.3.6-49.el8_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854371" version="1" comment="python3-bind is &lt;9.11.36-11.el8_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854372" version="1" comment="gnutls is &lt;3.6.16-8.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854373" version="1" comment="gnutls-c++ is &lt;3.6.16-8.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854374" version="1" comment="gnutls-dane is &lt;3.6.16-8.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854375" version="1" comment="gnutls-devel is &lt;3.6.16-8.el8_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854376" version="1" comment="gnutls-utils is &lt;3.6.16-8.el8_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854377" version="1" comment="httpd is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854378" version="1" comment="httpd-devel is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854379" version="1" comment="httpd-filesystem is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854380" version="1" comment="httpd-manual is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854381" version="1" comment="httpd-tools is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854382" version="1" comment="mod_http2 is &lt;1.15.7-8.module+el8.9.0+21652+2dd1200b.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854383" version="1" comment="mod_ldap is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854384" version="1" comment="mod_md is &lt;2.0.8-8.module+el8.9.0+19080+567b90f8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854385" version="1" comment="mod_proxy_html is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854386" version="1" comment="mod_session is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854387" version="1" comment="mod_ssl is &lt;2.4.37-62.module+el8.9.0+19699+7a7a2044 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858428" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858429" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859962" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859963" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858430" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858431" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858432" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858433" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858434" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858435" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858436" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858437" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858438" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858439" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858440" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.412.b08-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858441" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.412.b08-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858442" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858443" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858444" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858445" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856130" version="1" comment="java-11-openjdk is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856131" version="1" comment="java-11-openjdk-demo is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856132" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856133" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856134" version="1" comment="java-11-openjdk-devel is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856135" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856136" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856137" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856138" version="1" comment="java-11-openjdk-headless is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856139" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856140" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856141" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856142" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856143" version="1" comment="java-11-openjdk-jmods is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856144" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856145" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856146" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856147" version="1" comment="java-11-openjdk-src is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856148" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856149" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856150" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856151" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856152" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855576" version="1" comment="java-17-openjdk is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855577" version="1" comment="java-17-openjdk-demo is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855578" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855579" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855580" version="1" comment="java-17-openjdk-devel is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855581" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855582" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855583" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855584" version="1" comment="java-17-openjdk-headless is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855585" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855586" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855587" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855588" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855589" version="1" comment="java-17-openjdk-jmods is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855590" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855591" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855592" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855593" version="1" comment="java-17-openjdk-src is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855594" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855595" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855596" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855597" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855598" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855697" version="1" comment="java-21-openjdk is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855698" version="1" comment="java-21-openjdk-demo is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855699" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855700" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855701" version="1" comment="java-21-openjdk-devel is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855702" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855703" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855704" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855705" version="1" comment="java-21-openjdk-headless is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855706" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855707" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855708" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855709" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855710" version="1" comment="java-21-openjdk-jmods is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855711" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855712" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855713" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855714" version="1" comment="java-21-openjdk-src is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855715" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855716" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855717" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855718" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855719" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855720" version="1" comment="firefox is &lt;115.10.0-1.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858064" version="1" comment="libreswan is &lt;4.12-2.el8_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858065" version="1" comment="tigervnc is &lt;1.13.1-2.el8_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858066" version="1" comment="tigervnc-icons is &lt;1.13.1-2.el8_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858067" version="1" comment="tigervnc-license is &lt;1.13.1-2.el8_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858068" version="1" comment="tigervnc-selinux is &lt;1.13.1-2.el8_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858069" version="1" comment="tigervnc-server is &lt;1.13.1-2.el8_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858070" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-2.el8_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858071" version="1" comment="tigervnc-server-module is &lt;1.13.1-2.el8_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858446" version="1" comment="aardvark-dns is &lt;1.7.0-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858447" version="1" comment="buildah is &lt;1.31.5-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858448" version="1" comment="buildah-tests is &lt;1.31.5-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858449" version="1" comment="cockpit-podman is &lt;75-1.module+el8.9.0+21697+6a5e98e7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858450" version="1" comment="conmon is &lt;2.1.8-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858451" version="1" comment="container-selinux is &lt;2.229.0-1.module+el8.9.0+21697+6a5e98e7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858452" version="1" comment="containernetworking-plugins is &lt;1.3.0-8.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858453" version="1" comment="containers-common is &lt;1-71.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858454" version="1" comment="crit is &lt;3.18-4.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858455" version="1" comment="criu is &lt;3.18-4.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858456" version="1" comment="criu-devel is &lt;3.18-4.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858457" version="1" comment="criu-libs is &lt;3.18-4.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858458" version="1" comment="crun is &lt;1.8.7-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858459" version="1" comment="fuse-overlayfs is &lt;1.12-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858460" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858461" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858462" version="1" comment="netavark is &lt;1.7.0-2.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858463" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.9-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858464" version="1" comment="podman is &lt;4.6.1-9.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858465" version="1" comment="podman-catatonit is &lt;4.6.1-9.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858466" version="1" comment="podman-docker is &lt;4.6.1-9.module+el8.9.0+21697+6a5e98e7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858467" version="1" comment="podman-gvproxy is &lt;4.6.1-9.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858468" version="1" comment="podman-plugins is &lt;4.6.1-9.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858469" version="1" comment="podman-remote is &lt;4.6.1-9.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858470" version="1" comment="podman-tests is &lt;4.6.1-9.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858471" version="1" comment="python3-criu is &lt;3.18-4.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858472" version="1" comment="python3-podman is &lt;4.6.0-2.module+el8.9.0+21697+6a5e98e7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858473" version="1" comment="runc is &lt;1.1.12-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858474" version="1" comment="skopeo is &lt;1.13.3-3.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858475" version="1" comment="skopeo-tests is &lt;1.13.3-3.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858476" version="1" comment="slirp4netns is &lt;1.2.1-1.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858477" version="1" comment="toolbox is &lt;0.0.99.4-5.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858478" version="1" comment="toolbox-tests is &lt;0.0.99.4-5.module+el8.9.0+21697+6a5e98e7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858479" version="1" comment="udica is &lt;0.2.6-20.module+el8.9.0+21697+6a5e98e7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859181" version="1" comment="git-lfs is &lt;3.2.0-3.el8_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859964" version="1" comment="compat-libpthread-nonshared is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859965" version="1" comment="glibc is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859966" version="1" comment="glibc-all-langpacks is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859967" version="1" comment="glibc-benchtests is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859968" version="1" comment="glibc-common is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859969" version="1" comment="glibc-devel is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859970" version="1" comment="glibc-doc is &lt;2.28-236.el8_9.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859971" version="1" comment="glibc-gconv-extra is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859972" version="1" comment="glibc-headers is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859973" version="1" comment="glibc-langpack-aa is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859974" version="1" comment="glibc-langpack-af is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859975" version="1" comment="glibc-langpack-agr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859976" version="1" comment="glibc-langpack-ak is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859977" version="1" comment="glibc-langpack-am is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859978" version="1" comment="glibc-langpack-an is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859979" version="1" comment="glibc-langpack-anp is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859980" version="1" comment="glibc-langpack-ar is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859981" version="1" comment="glibc-langpack-as is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859982" version="1" comment="glibc-langpack-ast is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859983" version="1" comment="glibc-langpack-ayc is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859984" version="1" comment="glibc-langpack-az is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859985" version="1" comment="glibc-langpack-be is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859986" version="1" comment="glibc-langpack-bem is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859987" version="1" comment="glibc-langpack-ber is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859988" version="1" comment="glibc-langpack-bg is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859989" version="1" comment="glibc-langpack-bhb is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859990" version="1" comment="glibc-langpack-bho is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859991" version="1" comment="glibc-langpack-bi is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859992" version="1" comment="glibc-langpack-bn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859993" version="1" comment="glibc-langpack-bo is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859994" version="1" comment="glibc-langpack-br is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859995" version="1" comment="glibc-langpack-brx is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859996" version="1" comment="glibc-langpack-bs is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859997" version="1" comment="glibc-langpack-byn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859998" version="1" comment="glibc-langpack-ca is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859999" version="1" comment="glibc-langpack-ce is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860000" version="1" comment="glibc-langpack-chr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860001" version="1" comment="glibc-langpack-cmn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860002" version="1" comment="glibc-langpack-crh is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860003" version="1" comment="glibc-langpack-cs is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860004" version="1" comment="glibc-langpack-csb is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860005" version="1" comment="glibc-langpack-cv is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860006" version="1" comment="glibc-langpack-cy is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860007" version="1" comment="glibc-langpack-da is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860008" version="1" comment="glibc-langpack-de is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860009" version="1" comment="glibc-langpack-doi is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860010" version="1" comment="glibc-langpack-dsb is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860011" version="1" comment="glibc-langpack-dv is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860012" version="1" comment="glibc-langpack-dz is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860013" version="1" comment="glibc-langpack-el is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860014" version="1" comment="glibc-langpack-en is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860015" version="1" comment="glibc-langpack-eo is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860016" version="1" comment="glibc-langpack-es is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860017" version="1" comment="glibc-langpack-et is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860018" version="1" comment="glibc-langpack-eu is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860019" version="1" comment="glibc-langpack-fa is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860020" version="1" comment="glibc-langpack-ff is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860021" version="1" comment="glibc-langpack-fi is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860022" version="1" comment="glibc-langpack-fil is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860023" version="1" comment="glibc-langpack-fo is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860024" version="1" comment="glibc-langpack-fr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860025" version="1" comment="glibc-langpack-fur is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860026" version="1" comment="glibc-langpack-fy is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860027" version="1" comment="glibc-langpack-ga is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860028" version="1" comment="glibc-langpack-gd is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860029" version="1" comment="glibc-langpack-gez is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860030" version="1" comment="glibc-langpack-gl is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860031" version="1" comment="glibc-langpack-gu is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860032" version="1" comment="glibc-langpack-gv is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860033" version="1" comment="glibc-langpack-ha is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860034" version="1" comment="glibc-langpack-hak is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860035" version="1" comment="glibc-langpack-he is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860036" version="1" comment="glibc-langpack-hi is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860037" version="1" comment="glibc-langpack-hif is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860038" version="1" comment="glibc-langpack-hne is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860039" version="1" comment="glibc-langpack-hr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860040" version="1" comment="glibc-langpack-hsb is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860041" version="1" comment="glibc-langpack-ht is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860042" version="1" comment="glibc-langpack-hu is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860043" version="1" comment="glibc-langpack-hy is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860044" version="1" comment="glibc-langpack-ia is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860045" version="1" comment="glibc-langpack-id is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860046" version="1" comment="glibc-langpack-ig is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860047" version="1" comment="glibc-langpack-ik is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860048" version="1" comment="glibc-langpack-is is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860049" version="1" comment="glibc-langpack-it is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860050" version="1" comment="glibc-langpack-iu is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860051" version="1" comment="glibc-langpack-ja is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860052" version="1" comment="glibc-langpack-ka is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860053" version="1" comment="glibc-langpack-kab is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860054" version="1" comment="glibc-langpack-kk is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860055" version="1" comment="glibc-langpack-kl is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860056" version="1" comment="glibc-langpack-km is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860057" version="1" comment="glibc-langpack-kn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860058" version="1" comment="glibc-langpack-ko is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860059" version="1" comment="glibc-langpack-kok is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860060" version="1" comment="glibc-langpack-ks is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860061" version="1" comment="glibc-langpack-ku is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860062" version="1" comment="glibc-langpack-kw is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860063" version="1" comment="glibc-langpack-ky is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860064" version="1" comment="glibc-langpack-lb is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860065" version="1" comment="glibc-langpack-lg is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860066" version="1" comment="glibc-langpack-li is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860067" version="1" comment="glibc-langpack-lij is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860068" version="1" comment="glibc-langpack-ln is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860069" version="1" comment="glibc-langpack-lo is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860070" version="1" comment="glibc-langpack-lt is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860071" version="1" comment="glibc-langpack-lv is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860072" version="1" comment="glibc-langpack-lzh is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860073" version="1" comment="glibc-langpack-mag is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860074" version="1" comment="glibc-langpack-mai is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860075" version="1" comment="glibc-langpack-mfe is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860076" version="1" comment="glibc-langpack-mg is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860077" version="1" comment="glibc-langpack-mhr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860078" version="1" comment="glibc-langpack-mi is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860079" version="1" comment="glibc-langpack-miq is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860080" version="1" comment="glibc-langpack-mjw is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860081" version="1" comment="glibc-langpack-mk is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860082" version="1" comment="glibc-langpack-ml is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860083" version="1" comment="glibc-langpack-mn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860084" version="1" comment="glibc-langpack-mni is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860085" version="1" comment="glibc-langpack-mr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860086" version="1" comment="glibc-langpack-ms is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860087" version="1" comment="glibc-langpack-mt is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860088" version="1" comment="glibc-langpack-my is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860089" version="1" comment="glibc-langpack-nan is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860090" version="1" comment="glibc-langpack-nb is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860091" version="1" comment="glibc-langpack-nds is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860092" version="1" comment="glibc-langpack-ne is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860093" version="1" comment="glibc-langpack-nhn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860094" version="1" comment="glibc-langpack-niu is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860095" version="1" comment="glibc-langpack-nl is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860096" version="1" comment="glibc-langpack-nn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860097" version="1" comment="glibc-langpack-nr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860098" version="1" comment="glibc-langpack-nso is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860099" version="1" comment="glibc-langpack-oc is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860100" version="1" comment="glibc-langpack-om is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860101" version="1" comment="glibc-langpack-or is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860102" version="1" comment="glibc-langpack-os is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860103" version="1" comment="glibc-langpack-pa is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860104" version="1" comment="glibc-langpack-pap is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860105" version="1" comment="glibc-langpack-pl is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860106" version="1" comment="glibc-langpack-ps is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860107" version="1" comment="glibc-langpack-pt is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860108" version="1" comment="glibc-langpack-quz is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860109" version="1" comment="glibc-langpack-raj is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860110" version="1" comment="glibc-langpack-ro is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860111" version="1" comment="glibc-langpack-ru is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860112" version="1" comment="glibc-langpack-rw is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860113" version="1" comment="glibc-langpack-sa is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860114" version="1" comment="glibc-langpack-sah is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860115" version="1" comment="glibc-langpack-sat is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860116" version="1" comment="glibc-langpack-sc is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860117" version="1" comment="glibc-langpack-sd is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860118" version="1" comment="glibc-langpack-se is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860119" version="1" comment="glibc-langpack-sgs is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860120" version="1" comment="glibc-langpack-shn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860121" version="1" comment="glibc-langpack-shs is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860122" version="1" comment="glibc-langpack-si is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860123" version="1" comment="glibc-langpack-sid is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860124" version="1" comment="glibc-langpack-sk is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860125" version="1" comment="glibc-langpack-sl is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860126" version="1" comment="glibc-langpack-sm is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860127" version="1" comment="glibc-langpack-so is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860128" version="1" comment="glibc-langpack-sq is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860129" version="1" comment="glibc-langpack-sr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860130" version="1" comment="glibc-langpack-ss is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860131" version="1" comment="glibc-langpack-st is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860132" version="1" comment="glibc-langpack-sv is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860133" version="1" comment="glibc-langpack-sw is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860134" version="1" comment="glibc-langpack-szl is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860135" version="1" comment="glibc-langpack-ta is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860136" version="1" comment="glibc-langpack-tcy is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860137" version="1" comment="glibc-langpack-te is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860138" version="1" comment="glibc-langpack-tg is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860139" version="1" comment="glibc-langpack-th is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860140" version="1" comment="glibc-langpack-the is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860141" version="1" comment="glibc-langpack-ti is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860142" version="1" comment="glibc-langpack-tig is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860143" version="1" comment="glibc-langpack-tk is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860144" version="1" comment="glibc-langpack-tl is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860145" version="1" comment="glibc-langpack-tn is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860146" version="1" comment="glibc-langpack-to is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860147" version="1" comment="glibc-langpack-tpi is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860148" version="1" comment="glibc-langpack-tr is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860149" version="1" comment="glibc-langpack-ts is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860150" version="1" comment="glibc-langpack-tt is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860151" version="1" comment="glibc-langpack-ug is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860152" version="1" comment="glibc-langpack-uk is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860153" version="1" comment="glibc-langpack-unm is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860154" version="1" comment="glibc-langpack-ur is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860155" version="1" comment="glibc-langpack-uz is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860156" version="1" comment="glibc-langpack-ve is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860157" version="1" comment="glibc-langpack-vi is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860158" version="1" comment="glibc-langpack-wa is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860159" version="1" comment="glibc-langpack-wae is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860160" version="1" comment="glibc-langpack-wal is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860161" version="1" comment="glibc-langpack-wo is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860162" version="1" comment="glibc-langpack-xh is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860163" version="1" comment="glibc-langpack-yi is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860164" version="1" comment="glibc-langpack-yo is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860165" version="1" comment="glibc-langpack-yue is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860166" version="1" comment="glibc-langpack-yuw is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860167" version="1" comment="glibc-langpack-zh is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860168" version="1" comment="glibc-langpack-zu is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860169" version="1" comment="glibc-locale-source is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860170" version="1" comment="glibc-minimal-langpack is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860171" version="1" comment="glibc-nss-devel is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860172" version="1" comment="glibc-static is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860173" version="1" comment="glibc-utils is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860174" version="1" comment="libnsl is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860175" version="1" comment="nscd is &lt;2.28-236.el8_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860176" version="1" comment="nss_db is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860177" version="1" comment="nss_hesiod is &lt;2.28-236.el8_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860470" version="1" comment="nodejs is &lt;20.12.2-2.module+el8.9.0+21743+0b3f1be2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860471" version="1" comment="nodejs-devel is &lt;20.12.2-2.module+el8.9.0+21743+0b3f1be2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860472" version="1" comment="nodejs-docs is &lt;20.12.2-2.module+el8.9.0+21743+0b3f1be2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860473" version="1" comment="nodejs-full-i18n is &lt;20.12.2-2.module+el8.9.0+21743+0b3f1be2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860474" version="1" comment="npm is &lt;10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860400" version="1" comment="nodejs is &lt;18.20.2-1.module+el8.9.0+21767+537f34ee for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860401" version="1" comment="nodejs-devel is &lt;18.20.2-1.module+el8.9.0+21767+537f34ee for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860402" version="1" comment="nodejs-docs is &lt;18.20.2-1.module+el8.9.0+21767+537f34ee for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860403" version="1" comment="nodejs-full-i18n is &lt;18.20.2-1.module+el8.9.0+21767+537f34ee for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860404" version="1" comment="npm is &lt;10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865914" version="1" comment="resource-agents is &lt;4.9.0-54.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865915" version="1" comment="resource-agents-aliyun is &lt;4.9.0-54.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865916" version="1" comment="resource-agents-gcp is &lt;4.9.0-54.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865917" version="1" comment="resource-agents-paf is &lt;4.9.0-54.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872679" version="1" comment="pcs is &lt;0.10.18-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872680" version="1" comment="pcs-snmp is &lt;0.10.18-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874316" version="1" comment="ghostscript is &lt;9.27-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874317" version="1" comment="ghostscript-doc is &lt;9.27-12.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874318" version="1" comment="ghostscript-tools-dvipdf is &lt;9.27-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874319" version="1" comment="ghostscript-tools-fonts is &lt;9.27-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874320" version="1" comment="ghostscript-tools-printing is &lt;9.27-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874321" version="1" comment="ghostscript-x11 is &lt;9.27-12.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874322" version="1" comment="libgs is &lt;9.27-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874323" version="1" comment="libgs-devel is &lt;9.27-12.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865918" version="1" comment="fence-agents-aliyun is &lt;4.2.1-129.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865919" version="1" comment="fence-agents-all is &lt;4.2.1-129.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865920" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865921" version="1" comment="fence-agents-apc is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865922" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865923" version="1" comment="fence-agents-aws is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865924" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865925" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865926" version="1" comment="fence-agents-brocade is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865927" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865928" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865929" version="1" comment="fence-agents-common is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865930" version="1" comment="fence-agents-compute is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865931" version="1" comment="fence-agents-drac5 is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865932" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865933" version="1" comment="fence-agents-emerson is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865934" version="1" comment="fence-agents-eps is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865935" version="1" comment="fence-agents-gce is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865936" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865937" version="1" comment="fence-agents-hpblade is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865938" version="1" comment="fence-agents-ibm-powervs is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865939" version="1" comment="fence-agents-ibm-vpc is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865940" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865941" version="1" comment="fence-agents-ifmib is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865942" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865943" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865944" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865945" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865946" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865947" version="1" comment="fence-agents-ipdu is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865948" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865949" version="1" comment="fence-agents-kdump is &lt;4.2.1-129.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865950" version="1" comment="fence-agents-kubevirt is &lt;4.2.1-129.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865951" version="1" comment="fence-agents-lpar is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865952" version="1" comment="fence-agents-mpath is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865953" version="1" comment="fence-agents-openstack is &lt;4.2.1-129.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865954" version="1" comment="fence-agents-redfish is &lt;4.2.1-129.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865955" version="1" comment="fence-agents-rhevm is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865956" version="1" comment="fence-agents-rsa is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865957" version="1" comment="fence-agents-rsb is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865958" version="1" comment="fence-agents-sbd is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865959" version="1" comment="fence-agents-scsi is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865960" version="1" comment="fence-agents-virsh is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865961" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865962" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865963" version="1" comment="fence-agents-wti is &lt;4.2.1-129.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865964" version="1" comment="libX11 is &lt;1.6.8-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865965" version="1" comment="libX11-common is &lt;1.6.8-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865966" version="1" comment="libX11-devel is &lt;1.6.8-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865967" version="1" comment="libX11-xcb is &lt;1.6.8-8.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865968" version="1" comment="libXpm is &lt;3.5.12-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865969" version="1" comment="libXpm-devel is &lt;3.5.12-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865970" version="1" comment="poppler is &lt;20.11.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865971" version="1" comment="poppler-cpp is &lt;20.11.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865972" version="1" comment="poppler-cpp-devel is &lt;20.11.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865973" version="1" comment="poppler-devel is &lt;20.11.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865974" version="1" comment="poppler-glib is &lt;20.11.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865975" version="1" comment="poppler-glib-devel is &lt;20.11.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865976" version="1" comment="poppler-glib-doc is &lt;20.11.0-11.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865977" version="1" comment="poppler-qt5 is &lt;20.11.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865978" version="1" comment="poppler-qt5-devel is &lt;20.11.0-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865979" version="1" comment="poppler-utils is &lt;20.11.0-11.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867133" version="1" comment="harfbuzz is &lt;1.7.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867134" version="1" comment="harfbuzz-devel is &lt;1.7.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867135" version="1" comment="harfbuzz-icu is &lt;1.7.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865980" version="1" comment="frr is &lt;7.5.1-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865981" version="1" comment="frr-selinux is &lt;7.5.1-22.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874324" version="1" comment="webkit2gtk3 is &lt;2.42.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874325" version="1" comment="webkit2gtk3-devel is &lt;2.42.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874326" version="1" comment="webkit2gtk3-jsc is &lt;2.42.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874327" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.42.5-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865982" version="1" comment="python3.11-urllib3 is &lt;1.26.12-2.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872458" version="1" comment="python2 is &lt;2.7.18-17.module+el8.10.0+20822+a15ec22d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872459" version="1" comment="python2-debug is &lt;2.7.18-17.module+el8.10.0+20822+a15ec22d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872460" version="1" comment="python2-devel is &lt;2.7.18-17.module+el8.10.0+20822+a15ec22d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872461" version="1" comment="python2-jinja2 is &lt;2.10-10.module+el8.10.0+21290+abd5b761 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872462" version="1" comment="python2-libs is &lt;2.7.18-17.module+el8.10.0+20822+a15ec22d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872463" version="1" comment="python2-setuptools is &lt;39.0.1-14.module+el8.10.0+20444+3bf7fee4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872464" version="1" comment="python2-setuptools-wheel is &lt;39.0.1-14.module+el8.10.0+20444+3bf7fee4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872465" version="1" comment="python2-test is &lt;2.7.18-17.module+el8.10.0+20822+a15ec22d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872466" version="1" comment="python2-tkinter is &lt;2.7.18-17.module+el8.10.0+20822+a15ec22d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872467" version="1" comment="python2-tools is &lt;2.7.18-17.module+el8.10.0+20822+a15ec22d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872468" version="1" comment="python2-urllib3 is &lt;1.24.2-4.module+el8.10.0+20444+3bf7fee4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867155" version="1" comment="aardvark-dns is &lt;1.10.0-1.module+el8.10.0+21209+52deeb51 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867957" version="1" comment="buildah is &lt;1.33.6-2.module+el8.10.0+21371+46937ece for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867958" version="1" comment="buildah-tests is &lt;1.33.6-2.module+el8.10.0+21371+46937ece for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867158" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+21373+0d273fdf for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867159" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+21077+98b84d8a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867160" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+21196+3f0abbca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867161" version="1" comment="containernetworking-plugins is &lt;1.4.0-2.module+el8.10.0+21366+f9cb49f8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867162" version="1" comment="containers-common is &lt;1-81.module+el8.10.0+21340+c6c7475a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867959" version="1" comment="crit is &lt;3.18-4.module+el8.9.0+20326+387084d0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867960" version="1" comment="criu is &lt;3.18-4.module+el8.9.0+20326+387084d0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867961" version="1" comment="criu-devel is &lt;3.18-4.module+el8.9.0+20326+387084d0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867962" version="1" comment="criu-libs is &lt;3.18-4.module+el8.9.0+20326+387084d0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867167" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+21340+c6c7475a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867168" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+20412+95ee28e2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867963" version="1" comment="libslirp is &lt;4.4.0-1.module+el8.9.0+20326+387084d0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867964" version="1" comment="libslirp-devel is &lt;4.4.0-1.module+el8.9.0+20326+387084d0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867171" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+21306+6be40ce7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867172" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+20565+a40ba0e5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867965" version="1" comment="podman is &lt;4.9.4-0.1.module+el8.10.0+21350+ea09fba1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867966" version="1" comment="podman-catatonit is &lt;4.9.4-0.1.module+el8.10.0+21350+ea09fba1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867967" version="1" comment="podman-docker is &lt;4.9.4-0.1.module+el8.10.0+21350+ea09fba1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867968" version="1" comment="podman-gvproxy is &lt;4.9.4-0.1.module+el8.10.0+21350+ea09fba1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867969" version="1" comment="podman-plugins is &lt;4.9.4-0.1.module+el8.10.0+21350+ea09fba1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867970" version="1" comment="podman-remote is &lt;4.9.4-0.1.module+el8.10.0+21350+ea09fba1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867971" version="1" comment="podman-tests is &lt;4.9.4-0.1.module+el8.10.0+21350+ea09fba1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867972" version="1" comment="python3-criu is &lt;3.18-4.module+el8.9.0+20326+387084d0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867181" version="1" comment="python3-podman is &lt;4.9.0-1.module+el8.10.0+21196+3f0abbca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867182" version="1" comment="runc is &lt;1.1.12-1.module+el8.10.0+21251+62b7388c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867973" version="1" comment="skopeo is &lt;1.14.3-0.1.module+el8.10.0+21251+62b7388c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867974" version="1" comment="skopeo-tests is &lt;1.14.3-0.1.module+el8.10.0+21251+62b7388c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867185" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+21306+6be40ce7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867186" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+21341+ff0b5f89 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867187" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+21341+ff0b5f89 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867975" version="1" comment="udica is &lt;0.2.6-20.module+el8.9.0+20326+387084d0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865983" version="1" comment="LibRaw is &lt;0.19.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865984" version="1" comment="LibRaw-devel is &lt;0.19.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865985" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865986" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865987" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865988" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865989" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865990" version="1" comment="xorg-x11-server-common is &lt;1.20.11-22.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865991" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-22.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865992" version="1" comment="xorg-x11-server-source is &lt;1.20.11-22.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865993" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-15.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865994" version="1" comment="python3-pillow is &lt;5.1.1-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865995" version="1" comment="python3-pillow-devel is &lt;5.1.1-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865996" version="1" comment="python3-pillow-doc is &lt;5.1.1-20.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865997" version="1" comment="python3-pillow-tk is &lt;5.1.1-20.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865998" version="1" comment="pmix is &lt;2.2.5-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865999" version="1" comment="pmix-devel is &lt;2.2.5-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866000" version="1" comment="edk2-ovmf is &lt;20220126gitbb1bba3d77-13.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866001" version="1" comment="motif is &lt;2.3.4-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866002" version="1" comment="motif-devel is &lt;2.3.4-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866003" version="1" comment="motif-static is &lt;2.3.4-20.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866004" version="1" comment="libsndfile is &lt;1.0.28-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866005" version="1" comment="libsndfile-devel is &lt;1.0.28-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866006" version="1" comment="libsndfile-utils is &lt;1.0.28-14.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872681" version="1" comment="ansible-core is &lt;2.16.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872682" version="1" comment="ansible-test is &lt;2.16.3-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866007" version="1" comment="389-ds-base is &lt;1.4.3.39-3.module+el8.10.0+21535+f663b039 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866008" version="1" comment="389-ds-base-devel is &lt;1.4.3.39-3.module+el8.10.0+21535+f663b039 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866009" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.39-3.module+el8.10.0+21535+f663b039 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866010" version="1" comment="389-ds-base-libs is &lt;1.4.3.39-3.module+el8.10.0+21535+f663b039 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866011" version="1" comment="389-ds-base-snmp is &lt;1.4.3.39-3.module+el8.10.0+21535+f663b039 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866012" version="1" comment="python3-lib389 is &lt;1.4.3.39-3.module+el8.10.0+21535+f663b039 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866013" version="1" comment="perl-Convert-ASN1 is &lt;0.27-18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867136" version="1" comment="qt5-qtbase is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867137" version="1" comment="qt5-qtbase-common is &lt;5.15.3-7.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867138" version="1" comment="qt5-qtbase-devel is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867139" version="1" comment="qt5-qtbase-examples is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867140" version="1" comment="qt5-qtbase-gui is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867141" version="1" comment="qt5-qtbase-mysql is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867142" version="1" comment="qt5-qtbase-odbc is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867143" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867144" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867145" version="1" comment="qt5-qtbase-static is &lt;5.15.3-7.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866014" version="1" comment="mutt is &lt;2.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866015" version="1" comment="libtiff is &lt;4.0.9-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866016" version="1" comment="libtiff-devel is &lt;4.0.9-31.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866017" version="1" comment="libtiff-tools is &lt;4.0.9-31.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867146" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.16.1-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867147" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.16.1-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866018" version="1" comment="python3.11 is &lt;3.11.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866019" version="1" comment="python3.11-debug is &lt;3.11.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866020" version="1" comment="python3.11-devel is &lt;3.11.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866021" version="1" comment="python3.11-idle is &lt;3.11.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866022" version="1" comment="python3.11-libs is &lt;3.11.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866023" version="1" comment="python3.11-rpm-macros is &lt;3.11.7-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866024" version="1" comment="python3.11-test is &lt;3.11.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866025" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866026" version="1" comment="exempi is &lt;2.4.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866027" version="1" comment="exempi-devel is &lt;2.4.5-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866028" version="1" comment="tigervnc is &lt;1.13.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866029" version="1" comment="tigervnc-icons is &lt;1.13.1-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866030" version="1" comment="tigervnc-license is &lt;1.13.1-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866031" version="1" comment="tigervnc-selinux is &lt;1.13.1-8.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866032" version="1" comment="tigervnc-server is &lt;1.13.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866033" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866034" version="1" comment="tigervnc-server-module is &lt;1.13.1-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867148" version="1" comment="gstreamer1-plugins-base is &lt;1.16.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867149" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.16.1-3.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009198835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867150" version="1" comment="gstreamer1-plugins-good is &lt;1.16.1-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867151" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.16.1-4.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866035" version="1" comment="perl-CPAN is &lt;2.18-399.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866036" version="1" comment="vorbis-tools is &lt;1.4.0-29.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866037" version="1" comment="python3-jinja2 is &lt;2.10.1-4.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866038" version="1" comment="python3.11-cryptography is &lt;37.0.2-6.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866039" version="1" comment="freeglut is &lt;3.0.0-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866040" version="1" comment="freeglut-devel is &lt;3.0.0-9.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866041" version="1" comment="httpd is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866042" version="1" comment="httpd-devel is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866043" version="1" comment="httpd-filesystem is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866044" version="1" comment="httpd-manual is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866045" version="1" comment="httpd-tools is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866046" version="1" comment="mod_http2 is &lt;1.15.7-10.module+el8.10.0+21653+eaff63f0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866047" version="1" comment="mod_ldap is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866048" version="1" comment="mod_proxy_html is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866049" version="1" comment="mod_session is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866050" version="1" comment="mod_ssl is &lt;2.4.37-64.module+el8.10.0+21332+dfb1b40e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867152" version="1" comment="zziplib is &lt;0.13.68-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867153" version="1" comment="zziplib-devel is &lt;0.13.68-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867154" version="1" comment="zziplib-utils is &lt;0.13.68-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874328" version="1" comment="perl is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874329" version="1" comment="perl-Algorithm-Diff is &lt;1.1903-10.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874330" version="1" comment="perl-Archive-Tar is &lt;2.38-3.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874331" version="1" comment="perl-Archive-Zip is &lt;1.68-3.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874332" version="1" comment="perl-Attribute-Handlers is &lt;1.01-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874333" version="1" comment="perl-AutoLoader is &lt;5.74-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874334" version="1" comment="perl-AutoSplit is &lt;5.74-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874335" version="1" comment="perl-B is &lt;1.80-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874336" version="1" comment="perl-Benchmark is &lt;1.23-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874337" version="1" comment="perl-CPAN is &lt;2.28-5.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874338" version="1" comment="perl-CPAN-DistnameInfo is &lt;0.12-13.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874339" version="1" comment="perl-CPAN-Meta is &lt;2.150010-397.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874340" version="1" comment="perl-CPAN-Meta-Requirements is &lt;2.140-397.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874341" version="1" comment="perl-CPAN-Meta-YAML is &lt;0.018-1001.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874342" version="1" comment="perl-Carp is &lt;1.50-439.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874343" version="1" comment="perl-Class-Struct is &lt;0.66-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874344" version="1" comment="perl-Compress-Bzip2 is &lt;2.28-2.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874345" version="1" comment="perl-Compress-Raw-Bzip2 is &lt;2.096-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874346" version="1" comment="perl-Compress-Raw-Lzma is &lt;2.096-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874347" version="1" comment="perl-Compress-Raw-Zlib is &lt;2.096-2.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874348" version="1" comment="perl-Config-Extensions is &lt;0.03-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874349" version="1" comment="perl-Config-Perl-V is &lt;0.32-441.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874350" version="1" comment="perl-DBM_Filter is &lt;0.06-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874351" version="1" comment="perl-DB_File is &lt;1.855-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874352" version="1" comment="perl-Data-Dumper is &lt;2.174-440.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874353" version="1" comment="perl-Data-OptList is &lt;0.110-7.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874354" version="1" comment="perl-Data-Section is &lt;0.200007-8.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874355" version="1" comment="perl-Devel-PPPort is &lt;3.62-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874356" version="1" comment="perl-Devel-Peek is &lt;1.28-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874357" version="1" comment="perl-Devel-SelfStubber is &lt;1.06-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874358" version="1" comment="perl-Devel-Size is &lt;0.83-3.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874359" version="1" comment="perl-Digest is &lt;1.20-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874360" version="1" comment="perl-Digest-MD5 is &lt;2.58-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874361" version="1" comment="perl-Digest-SHA is &lt;6.02-2.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874362" version="1" comment="perl-DirHandle is &lt;1.05-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874363" version="1" comment="perl-Dumpvalue is &lt;2.27-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874364" version="1" comment="perl-DynaLoader is &lt;1.47-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874365" version="1" comment="perl-Encode is &lt;3.08-461.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874366" version="1" comment="perl-Encode-Locale is &lt;1.05-10.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874367" version="1" comment="perl-Encode-devel is &lt;3.08-461.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874368" version="1" comment="perl-English is &lt;1.11-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874369" version="1" comment="perl-Env is &lt;1.04-396.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874370" version="1" comment="perl-Errno is &lt;1.30-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874371" version="1" comment="perl-Exporter is &lt;5.74-458.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874372" version="1" comment="perl-ExtUtils-CBuilder is &lt;0.280236-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874373" version="1" comment="perl-ExtUtils-Command is &lt;7.46-3.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874374" version="1" comment="perl-ExtUtils-Constant is &lt;0.25-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874375" version="1" comment="perl-ExtUtils-Embed is &lt;1.35-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874376" version="1" comment="perl-ExtUtils-Install is &lt;2.20-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874377" version="1" comment="perl-ExtUtils-MM-Utils is &lt;7.46-3.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874378" version="1" comment="perl-ExtUtils-MakeMaker is &lt;7.46-3.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874379" version="1" comment="perl-ExtUtils-Manifest is &lt;1.73-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874380" version="1" comment="perl-ExtUtils-Miniperl is &lt;1.09-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874381" version="1" comment="perl-ExtUtils-ParseXS is &lt;3.40-439.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874382" version="1" comment="perl-Fcntl is &lt;1.13-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874383" version="1" comment="perl-Fedora-VSP is &lt;0.001-10.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874384" version="1" comment="perl-File-Basename is &lt;2.85-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874385" version="1" comment="perl-File-Compare is &lt;1.100.600-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874386" version="1" comment="perl-File-Copy is &lt;2.34-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874387" version="1" comment="perl-File-DosGlob is &lt;1.12-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874388" version="1" comment="perl-File-Fetch is &lt;1.00-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874389" version="1" comment="perl-File-Find is &lt;1.37-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874390" version="1" comment="perl-File-HomeDir is &lt;1.004-6.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874391" version="1" comment="perl-File-Path is &lt;2.16-439.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874392" version="1" comment="perl-File-Temp is &lt;0.231.100-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874393" version="1" comment="perl-File-Which is &lt;1.23-4.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874394" version="1" comment="perl-File-stat is &lt;1.09-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874395" version="1" comment="perl-FileCache is &lt;1.10-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874396" version="1" comment="perl-FileHandle is &lt;2.03-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874397" version="1" comment="perl-Filter is &lt;1.60-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874398" version="1" comment="perl-Filter-Simple is &lt;0.96-457.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874399" version="1" comment="perl-FindBin is &lt;1.51-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874400" version="1" comment="perl-GDBM_File is &lt;1.18-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874401" version="1" comment="perl-Getopt-Long is &lt;2.52-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874402" version="1" comment="perl-Getopt-Std is &lt;1.12-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874403" version="1" comment="perl-HTTP-Tiny is &lt;0.078-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874404" version="1" comment="perl-Hash-Util is &lt;0.23-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874405" version="1" comment="perl-Hash-Util-FieldHash is &lt;1.20-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874406" version="1" comment="perl-I18N-Collate is &lt;1.02-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874407" version="1" comment="perl-I18N-LangTags is &lt;0.44-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874408" version="1" comment="perl-I18N-Langinfo is &lt;0.19-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874409" version="1" comment="perl-IO is &lt;1.43-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874410" version="1" comment="perl-IO-Compress is &lt;2.096-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874411" version="1" comment="perl-IO-Compress-Lzma is &lt;2.096-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874412" version="1" comment="perl-IO-Socket-IP is &lt;0.41-2.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874413" version="1" comment="perl-IO-Zlib is &lt;1.10-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874414" version="1" comment="perl-IPC-Cmd is &lt;1.04-2.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874415" version="1" comment="perl-IPC-Open3 is &lt;1.21-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874416" version="1" comment="perl-IPC-SysV is &lt;2.09-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874417" version="1" comment="perl-IPC-System-Simple is &lt;1.30-3.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874418" version="1" comment="perl-Importer is &lt;0.025-6.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874419" version="1" comment="perl-JSON-PP is &lt;4.04-2.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874420" version="1" comment="perl-Locale-Maketext is &lt;1.29-440.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874421" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874422" version="1" comment="perl-MIME-Base64 is &lt;3.15-1001.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874423" version="1" comment="perl-MRO-Compat is &lt;0.13-5.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874424" version="1" comment="perl-Math-BigInt is &lt;1.9998.18-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874425" version="1" comment="perl-Math-BigInt-FastCalc is &lt;0.500.900-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874426" version="1" comment="perl-Math-BigRat is &lt;0.2614-2.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874427" version="1" comment="perl-Math-Complex is &lt;1.59-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874428" version="1" comment="perl-Memoize is &lt;1.03-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874429" version="1" comment="perl-Module-Build is &lt;0.42.31-5.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874430" version="1" comment="perl-Module-CoreList is &lt;5.20211020-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874431" version="1" comment="perl-Module-CoreList-tools is &lt;5.20211020-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874432" version="1" comment="perl-Module-Load is &lt;0.36-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874433" version="1" comment="perl-Module-Load-Conditional is &lt;0.74-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874434" version="1" comment="perl-Module-Loaded is &lt;0.08-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874435" version="1" comment="perl-Module-Metadata is &lt;1.000037-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874436" version="1" comment="perl-NDBM_File is &lt;1.15-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874437" version="1" comment="perl-NEXT is &lt;0.67-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874438" version="1" comment="perl-Net is &lt;1.02-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874439" version="1" comment="perl-Net-Ping is &lt;2.72-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874440" version="1" comment="perl-ODBM_File is &lt;1.16-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874441" version="1" comment="perl-Object-HashBase is &lt;0.009-4.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874442" version="1" comment="perl-Object-HashBase-tools is &lt;0.009-4.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874443" version="1" comment="perl-Opcode is &lt;1.48-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874444" version="1" comment="perl-POSIX is &lt;1.94-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874445" version="1" comment="perl-Package-Generator is &lt;1.106-12.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874446" version="1" comment="perl-Params-Check is &lt;0.38-396.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874447" version="1" comment="perl-Params-Util is &lt;1.102-2.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874448" version="1" comment="perl-PathTools is &lt;3.78-439.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874449" version="1" comment="perl-Perl-OSType is &lt;1.010-397.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874450" version="1" comment="perl-PerlIO-via-QuotedPrint is &lt;0.09-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874451" version="1" comment="perl-Pod-Checker is &lt;1.74-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874452" version="1" comment="perl-Pod-Escapes is &lt;1.07-396.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874453" version="1" comment="perl-Pod-Functions is &lt;1.13-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874454" version="1" comment="perl-Pod-Html is &lt;1.25-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874455" version="1" comment="perl-Pod-Parser is &lt;1.63-1001.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874456" version="1" comment="perl-Pod-Perldoc is &lt;3.28.01-443.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874457" version="1" comment="perl-Pod-Simple is &lt;3.42-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874458" version="1" comment="perl-Pod-Usage is &lt;2.01-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874459" version="1" comment="perl-Safe is &lt;2.41-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874460" version="1" comment="perl-Scalar-List-Utils is &lt;1.55-457.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874461" version="1" comment="perl-Search-Dict is &lt;1.07-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874462" version="1" comment="perl-SelectSaver is &lt;1.02-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874463" version="1" comment="perl-SelfLoader is &lt;1.26-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874464" version="1" comment="perl-Socket is &lt;2.031-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874465" version="1" comment="perl-Software-License is &lt;0.103014-5.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874466" version="1" comment="perl-Storable is &lt;3.21-457.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874467" version="1" comment="perl-Sub-Exporter is &lt;0.987-17.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874468" version="1" comment="perl-Sub-Install is &lt;0.928-15.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874469" version="1" comment="perl-Symbol is &lt;1.08-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874470" version="1" comment="perl-Sys-Hostname is &lt;1.23-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874471" version="1" comment="perl-Sys-Syslog is &lt;0.36-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874472" version="1" comment="perl-Term-ANSIColor is &lt;5.01-458.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874473" version="1" comment="perl-Term-Cap is &lt;1.17-396.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874474" version="1" comment="perl-Term-Complete is &lt;1.403-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874475" version="1" comment="perl-Term-ReadLine is &lt;1.17-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874476" version="1" comment="perl-Term-Table is &lt;0.015-2.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874477" version="1" comment="perl-Test is &lt;1.31-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874478" version="1" comment="perl-Test-Harness is &lt;3.42-2.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874479" version="1" comment="perl-Test-Simple is &lt;1.302181-2.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874480" version="1" comment="perl-Text-Abbrev is &lt;1.02-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874481" version="1" comment="perl-Text-Balanced is &lt;2.04-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874482" version="1" comment="perl-Text-Diff is &lt;1.45-7.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874483" version="1" comment="perl-Text-Glob is &lt;0.11-5.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874484" version="1" comment="perl-Text-ParseWords is &lt;3.30-396.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874485" version="1" comment="perl-Text-Tabs+Wrap is &lt;2013.0523-396.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874486" version="1" comment="perl-Text-Template is &lt;1.58-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874487" version="1" comment="perl-Thread is &lt;3.05-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874488" version="1" comment="perl-Thread-Queue is &lt;3.14-457.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874489" version="1" comment="perl-Thread-Semaphore is &lt;2.13-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874490" version="1" comment="perl-Tie is &lt;4.6-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874491" version="1" comment="perl-Tie-File is &lt;1.06-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874492" version="1" comment="perl-Tie-Memoize is &lt;1.1-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874493" version="1" comment="perl-Tie-RefHash is &lt;1.39-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874494" version="1" comment="perl-Time is &lt;1.03-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874495" version="1" comment="perl-Time-HiRes is &lt;1.9764-459.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874496" version="1" comment="perl-Time-Local is &lt;1.300-4.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874497" version="1" comment="perl-Time-Piece is &lt;1.3401-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874498" version="1" comment="perl-URI is &lt;1.76-5.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874499" version="1" comment="perl-Unicode-Collate is &lt;1.29-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874500" version="1" comment="perl-Unicode-Normalize is &lt;1.27-458.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874501" version="1" comment="perl-Unicode-UCD is &lt;0.75-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874502" version="1" comment="perl-User-pwent is &lt;1.03-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874503" version="1" comment="perl-autodie is &lt;2.34-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874504" version="1" comment="perl-autouse is &lt;1.11-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874505" version="1" comment="perl-base is &lt;2.27-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874506" version="1" comment="perl-bignum is &lt;0.51-439.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874507" version="1" comment="perl-blib is &lt;1.07-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874508" version="1" comment="perl-constant is &lt;1.33-1001.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874509" version="1" comment="perl-debugger is &lt;1.56-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874510" version="1" comment="perl-deprecate is &lt;0.04-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874511" version="1" comment="perl-devel is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874512" version="1" comment="perl-diagnostics is &lt;1.37-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874513" version="1" comment="perl-doc is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874514" version="1" comment="perl-encoding is &lt;3.00-461.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874515" version="1" comment="perl-encoding-warnings is &lt;0.13-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874516" version="1" comment="perl-experimental is &lt;0.025-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874517" version="1" comment="perl-fields is &lt;2.27-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874518" version="1" comment="perl-filetest is &lt;1.03-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874519" version="1" comment="perl-generators is &lt;1.13-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874520" version="1" comment="perl-homedir is &lt;2.000024-7.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874521" version="1" comment="perl-if is &lt;0.60.800-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874522" version="1" comment="perl-inc-latest is &lt;0.500-10.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874523" version="1" comment="perl-interpreter is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874524" version="1" comment="perl-less is &lt;0.03-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874525" version="1" comment="perl-lib is &lt;0.65-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874526" version="1" comment="perl-libnet is &lt;3.13-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874527" version="1" comment="perl-libnetcfg is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874528" version="1" comment="perl-libs is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874529" version="1" comment="perl-local-lib is &lt;2.000024-7.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874530" version="1" comment="perl-locale is &lt;1.09-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874531" version="1" comment="perl-macros is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874532" version="1" comment="perl-meta-notation is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874533" version="1" comment="perl-mro is &lt;1.23-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874534" version="1" comment="perl-open is &lt;1.12-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874535" version="1" comment="perl-overload is &lt;1.31-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874536" version="1" comment="perl-overloading is &lt;0.02-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874537" version="1" comment="perl-parent is &lt;0.238-457.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874538" version="1" comment="perl-perlfaq is &lt;5.20210520-1.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874539" version="1" comment="perl-ph is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874540" version="1" comment="perl-podlators is &lt;4.14-457.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874541" version="1" comment="perl-sigtrap is &lt;1.09-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874542" version="1" comment="perl-sort is &lt;2.04-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874543" version="1" comment="perl-subs is &lt;1.03-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874544" version="1" comment="perl-threads is &lt;2.25-457.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874545" version="1" comment="perl-threads-shared is &lt;1.61-457.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874546" version="1" comment="perl-utils is &lt;5.32.1-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874547" version="1" comment="perl-vars is &lt;1.05-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874548" version="1" comment="perl-version is &lt;0.99.29-1.module+el8.10.0+21354+3ad137bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874549" version="1" comment="perl-vmsish is &lt;1.04-473.module+el8.10.0+21354+3ad137bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866051" version="1" comment="bpftool is &lt;4.18.0-553.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866052" version="1" comment="kernel is &lt;4.18.0-553.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866053" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866054" version="1" comment="kernel-core is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866055" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866056" version="1" comment="kernel-debug is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866057" version="1" comment="kernel-debug-core is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866059" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866060" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866062" version="1" comment="kernel-doc is &lt;4.18.0-553.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866063" version="1" comment="kernel-headers is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866064" version="1" comment="kernel-modules is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866065" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866066" version="1" comment="kernel-tools is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866067" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866069" version="1" comment="perf is &lt;4.18.0-553.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866070" version="1" comment="python3-perf is &lt;4.18.0-553.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866071" version="1" comment="squashfs-tools is &lt;4.3-21.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866072" version="1" comment="pam is &lt;1.3.1-33.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866073" version="1" comment="pam-devel is &lt;1.3.1-33.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866074" version="1" comment="openssh is &lt;8.0p1-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866075" version="1" comment="openssh-askpass is &lt;8.0p1-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866076" version="1" comment="openssh-cavs is &lt;8.0p1-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866077" version="1" comment="openssh-clients is &lt;8.0p1-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866078" version="1" comment="openssh-keycat is &lt;8.0p1-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866079" version="1" comment="openssh-ldap is &lt;8.0p1-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866080" version="1" comment="openssh-server is &lt;8.0p1-24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866081" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.24.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866082" version="1" comment="iwl100-firmware is &lt;39.31.5.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866083" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866084" version="1" comment="iwl105-firmware is &lt;18.168.6.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866085" version="1" comment="iwl135-firmware is &lt;18.168.6.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866086" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866087" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866088" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866089" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866090" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866091" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866092" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866093" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866094" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866095" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866096" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866097" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-121.el8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866098" version="1" comment="libertas-sd8686-firmware is &lt;20240111-121.gitb3132c18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866099" version="1" comment="libertas-sd8787-firmware is &lt;20240111-121.gitb3132c18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866100" version="1" comment="libertas-usb8388-firmware is &lt;20240111-121.gitb3132c18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866101" version="1" comment="libertas-usb8388-olpc-firmware is &lt;20240111-121.gitb3132c18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866102" version="1" comment="linux-firmware is &lt;20240111-121.gitb3132c18.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866103" version="1" comment="grub2-common is &lt;2.02-156.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866104" version="1" comment="grub2-efi-ia32 is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866105" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866106" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-156.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866107" version="1" comment="grub2-efi-x64 is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866108" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866109" version="1" comment="grub2-efi-x64-modules is &lt;2.02-156.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866110" version="1" comment="grub2-pc is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866111" version="1" comment="grub2-pc-modules is &lt;2.02-156.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866112" version="1" comment="grub2-tools is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866113" version="1" comment="grub2-tools-efi is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866114" version="1" comment="grub2-tools-extra is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866115" version="1" comment="grub2-tools-minimal is &lt;2.02-156.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866116" version="1" comment="systemd is &lt;239-82.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866117" version="1" comment="systemd-container is &lt;239-82.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866118" version="1" comment="systemd-devel is &lt;239-82.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866119" version="1" comment="systemd-journal-remote is &lt;239-82.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866120" version="1" comment="systemd-libs is &lt;239-82.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866121" version="1" comment="systemd-pam is &lt;239-82.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866122" version="1" comment="systemd-tests is &lt;239-82.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866123" version="1" comment="systemd-udev is &lt;239-82.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866124" version="1" comment="traceroute is &lt;2.1.0-8.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866125" version="1" comment="gmp is &lt;6.1.2-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866126" version="1" comment="gmp-c++ is &lt;6.1.2-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866127" version="1" comment="gmp-devel is &lt;6.1.2-11.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866128" version="1" comment="libssh is &lt;0.9.6-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866129" version="1" comment="libssh-config is &lt;0.9.6-14.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866130" version="1" comment="libssh-devel is &lt;0.9.6-14.el8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867156" version="1" comment="buildah is &lt;1.33.7-1.module+el8.10.0+21590+d7d75709 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867157" version="1" comment="buildah-tests is &lt;1.33.7-1.module+el8.10.0+21590+d7d75709 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867163" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+21672+01ba06ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867164" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+21672+01ba06ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867165" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+21672+01ba06ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867166" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+21672+01ba06ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867169" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+21672+01ba06ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867170" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+21672+01ba06ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867173" version="1" comment="podman is &lt;4.9.4-1.module+el8.10.0+21632+761e0d34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867174" version="1" comment="podman-catatonit is &lt;4.9.4-1.module+el8.10.0+21632+761e0d34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867175" version="1" comment="podman-docker is &lt;4.9.4-1.module+el8.10.0+21632+761e0d34 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867176" version="1" comment="podman-gvproxy is &lt;4.9.4-1.module+el8.10.0+21632+761e0d34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867177" version="1" comment="podman-plugins is &lt;4.9.4-1.module+el8.10.0+21632+761e0d34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867178" version="1" comment="podman-remote is &lt;4.9.4-1.module+el8.10.0+21632+761e0d34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867179" version="1" comment="podman-tests is &lt;4.9.4-1.module+el8.10.0+21632+761e0d34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867180" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+21672+01ba06ae for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867183" version="1" comment="skopeo is &lt;1.14.3-2.module+el8.10.0+21728+a1d9b0ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867184" version="1" comment="skopeo-tests is &lt;1.14.3-2.module+el8.10.0+21728+a1d9b0ab for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867188" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+21672+01ba06ae for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866131" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866132" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866133" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866134" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866135" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866136" version="1" comment="xorg-x11-server-common is &lt;1.20.11-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866137" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866138" version="1" comment="xorg-x11-server-source is &lt;1.20.11-23.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866139" version="1" comment="delve is &lt;1.21.2-3.module+el8.10.0+21244+5b2d9000 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866140" version="1" comment="go-toolset is &lt;1.21.9-1.module+el8.10.0+21671+b35c3b78 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866141" version="1" comment="golang is &lt;1.21.9-1.module+el8.10.0+21671+b35c3b78 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866142" version="1" comment="golang-bin is &lt;1.21.9-1.module+el8.10.0+21671+b35c3b78 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866143" version="1" comment="golang-docs is &lt;1.21.9-1.module+el8.10.0+21671+b35c3b78 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866144" version="1" comment="golang-misc is &lt;1.21.9-1.module+el8.10.0+21671+b35c3b78 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866145" version="1" comment="golang-src is &lt;1.21.9-1.module+el8.10.0+21671+b35c3b78 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866146" version="1" comment="golang-tests is &lt;1.21.9-1.module+el8.10.0+21671+b35c3b78 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866147" version="1" comment="tigervnc is &lt;1.13.1-10.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866148" version="1" comment="tigervnc-icons is &lt;1.13.1-10.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866149" version="1" comment="tigervnc-license is &lt;1.13.1-10.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866150" version="1" comment="tigervnc-selinux is &lt;1.13.1-10.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866151" version="1" comment="tigervnc-server is &lt;1.13.1-10.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866152" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-10.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866153" version="1" comment="tigervnc-server-module is &lt;1.13.1-10.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872469" version="1" comment="pcp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872470" version="1" comment="pcp-conf is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872471" version="1" comment="pcp-devel is &lt;5.3.7-20.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872472" version="1" comment="pcp-doc is &lt;5.3.7-20.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872473" version="1" comment="pcp-export-pcp2elasticsearch is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872474" version="1" comment="pcp-export-pcp2graphite is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872475" version="1" comment="pcp-export-pcp2influxdb is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872476" version="1" comment="pcp-export-pcp2json is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872477" version="1" comment="pcp-export-pcp2spark is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872478" version="1" comment="pcp-export-pcp2xml is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872479" version="1" comment="pcp-export-pcp2zabbix is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872480" version="1" comment="pcp-export-zabbix-agent is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872481" version="1" comment="pcp-gui is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872482" version="1" comment="pcp-import-collectl2pcp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872483" version="1" comment="pcp-import-ganglia2pcp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872484" version="1" comment="pcp-import-iostat2pcp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872485" version="1" comment="pcp-import-mrtg2pcp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872486" version="1" comment="pcp-import-sar2pcp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872487" version="1" comment="pcp-libs is &lt;5.3.7-20.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872488" version="1" comment="pcp-libs-devel is &lt;5.3.7-20.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872489" version="1" comment="pcp-pmda-activemq is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872490" version="1" comment="pcp-pmda-apache is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872491" version="1" comment="pcp-pmda-bash is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872492" version="1" comment="pcp-pmda-bcc is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872493" version="1" comment="pcp-pmda-bind2 is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872494" version="1" comment="pcp-pmda-bonding is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872495" version="1" comment="pcp-pmda-bpftrace is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872496" version="1" comment="pcp-pmda-cifs is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872497" version="1" comment="pcp-pmda-cisco is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872498" version="1" comment="pcp-pmda-dbping is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872499" version="1" comment="pcp-pmda-denki is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872500" version="1" comment="pcp-pmda-dm is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872501" version="1" comment="pcp-pmda-docker is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872502" version="1" comment="pcp-pmda-ds389 is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872503" version="1" comment="pcp-pmda-ds389log is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872504" version="1" comment="pcp-pmda-elasticsearch is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872505" version="1" comment="pcp-pmda-gfs2 is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872506" version="1" comment="pcp-pmda-gluster is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872507" version="1" comment="pcp-pmda-gpfs is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872508" version="1" comment="pcp-pmda-gpsd is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872509" version="1" comment="pcp-pmda-hacluster is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872510" version="1" comment="pcp-pmda-haproxy is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872511" version="1" comment="pcp-pmda-infiniband is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872512" version="1" comment="pcp-pmda-json is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872513" version="1" comment="pcp-pmda-libvirt is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872514" version="1" comment="pcp-pmda-lio is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872515" version="1" comment="pcp-pmda-lmsensors is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872516" version="1" comment="pcp-pmda-logger is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872517" version="1" comment="pcp-pmda-lustre is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872518" version="1" comment="pcp-pmda-lustrecomm is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872519" version="1" comment="pcp-pmda-mailq is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872520" version="1" comment="pcp-pmda-memcache is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872521" version="1" comment="pcp-pmda-mic is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872522" version="1" comment="pcp-pmda-mongodb is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872523" version="1" comment="pcp-pmda-mounts is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872524" version="1" comment="pcp-pmda-mssql is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872525" version="1" comment="pcp-pmda-mysql is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872526" version="1" comment="pcp-pmda-named is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872527" version="1" comment="pcp-pmda-netcheck is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872528" version="1" comment="pcp-pmda-netfilter is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872529" version="1" comment="pcp-pmda-news is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872530" version="1" comment="pcp-pmda-nfsclient is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872531" version="1" comment="pcp-pmda-nginx is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872532" version="1" comment="pcp-pmda-nvidia-gpu is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872533" version="1" comment="pcp-pmda-openmetrics is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872534" version="1" comment="pcp-pmda-openvswitch is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872535" version="1" comment="pcp-pmda-oracle is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872536" version="1" comment="pcp-pmda-pdns is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872537" version="1" comment="pcp-pmda-perfevent is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872538" version="1" comment="pcp-pmda-podman is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872539" version="1" comment="pcp-pmda-postfix is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872540" version="1" comment="pcp-pmda-postgresql is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872541" version="1" comment="pcp-pmda-rabbitmq is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872542" version="1" comment="pcp-pmda-redis is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872543" version="1" comment="pcp-pmda-roomtemp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872544" version="1" comment="pcp-pmda-rsyslog is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872545" version="1" comment="pcp-pmda-samba is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872546" version="1" comment="pcp-pmda-sendmail is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872547" version="1" comment="pcp-pmda-shping is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872548" version="1" comment="pcp-pmda-slurm is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872549" version="1" comment="pcp-pmda-smart is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872550" version="1" comment="pcp-pmda-snmp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872551" version="1" comment="pcp-pmda-sockets is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872552" version="1" comment="pcp-pmda-statsd is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872553" version="1" comment="pcp-pmda-summary is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872554" version="1" comment="pcp-pmda-systemd is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872555" version="1" comment="pcp-pmda-trace is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872556" version="1" comment="pcp-pmda-unbound is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872557" version="1" comment="pcp-pmda-weblog is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872558" version="1" comment="pcp-pmda-zimbra is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872559" version="1" comment="pcp-pmda-zswap is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872560" version="1" comment="pcp-selinux is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872561" version="1" comment="pcp-system-tools is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872562" version="1" comment="pcp-zeroconf is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872563" version="1" comment="perl-PCP-LogImport is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872564" version="1" comment="perl-PCP-LogSummary is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872565" version="1" comment="perl-PCP-MMV is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872566" version="1" comment="perl-PCP-PMDA is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872567" version="1" comment="python3-pcp is &lt;5.3.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866154" version="1" comment="grafana is &lt;9.2.10-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866155" version="1" comment="grafana-selinux is &lt;9.2.10-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866156" version="1" comment="krb5-devel is &lt;1.18.2-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866157" version="1" comment="krb5-libs is &lt;1.18.2-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866158" version="1" comment="krb5-pkinit is &lt;1.18.2-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866159" version="1" comment="krb5-server is &lt;1.18.2-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866160" version="1" comment="krb5-server-ldap is &lt;1.18.2-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866161" version="1" comment="krb5-workstation is &lt;1.18.2-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866162" version="1" comment="libkadm5 is &lt;1.18.2-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866163" version="1" comment="compat-libpthread-nonshared is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866164" version="1" comment="glibc is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866165" version="1" comment="glibc-all-langpacks is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866166" version="1" comment="glibc-benchtests is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866167" version="1" comment="glibc-common is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866168" version="1" comment="glibc-devel is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866169" version="1" comment="glibc-doc is &lt;2.28-251.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866170" version="1" comment="glibc-gconv-extra is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866171" version="1" comment="glibc-headers is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866172" version="1" comment="glibc-langpack-aa is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866173" version="1" comment="glibc-langpack-af is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866174" version="1" comment="glibc-langpack-agr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866175" version="1" comment="glibc-langpack-ak is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866176" version="1" comment="glibc-langpack-am is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866177" version="1" comment="glibc-langpack-an is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866178" version="1" comment="glibc-langpack-anp is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866179" version="1" comment="glibc-langpack-ar is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866180" version="1" comment="glibc-langpack-as is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866181" version="1" comment="glibc-langpack-ast is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866182" version="1" comment="glibc-langpack-ayc is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866183" version="1" comment="glibc-langpack-az is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866184" version="1" comment="glibc-langpack-be is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866185" version="1" comment="glibc-langpack-bem is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866186" version="1" comment="glibc-langpack-ber is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866187" version="1" comment="glibc-langpack-bg is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866188" version="1" comment="glibc-langpack-bhb is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866189" version="1" comment="glibc-langpack-bho is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866190" version="1" comment="glibc-langpack-bi is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866191" version="1" comment="glibc-langpack-bn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866192" version="1" comment="glibc-langpack-bo is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866193" version="1" comment="glibc-langpack-br is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866194" version="1" comment="glibc-langpack-brx is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866195" version="1" comment="glibc-langpack-bs is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866196" version="1" comment="glibc-langpack-byn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866197" version="1" comment="glibc-langpack-ca is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866198" version="1" comment="glibc-langpack-ce is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866199" version="1" comment="glibc-langpack-chr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866200" version="1" comment="glibc-langpack-cmn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866201" version="1" comment="glibc-langpack-crh is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866202" version="1" comment="glibc-langpack-cs is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866203" version="1" comment="glibc-langpack-csb is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866204" version="1" comment="glibc-langpack-cv is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866205" version="1" comment="glibc-langpack-cy is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866206" version="1" comment="glibc-langpack-da is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866207" version="1" comment="glibc-langpack-de is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866208" version="1" comment="glibc-langpack-doi is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866209" version="1" comment="glibc-langpack-dsb is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866210" version="1" comment="glibc-langpack-dv is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866211" version="1" comment="glibc-langpack-dz is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866212" version="1" comment="glibc-langpack-el is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866213" version="1" comment="glibc-langpack-en is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866214" version="1" comment="glibc-langpack-eo is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866215" version="1" comment="glibc-langpack-es is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866216" version="1" comment="glibc-langpack-et is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866217" version="1" comment="glibc-langpack-eu is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866218" version="1" comment="glibc-langpack-fa is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866219" version="1" comment="glibc-langpack-ff is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866220" version="1" comment="glibc-langpack-fi is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866221" version="1" comment="glibc-langpack-fil is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866222" version="1" comment="glibc-langpack-fo is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866223" version="1" comment="glibc-langpack-fr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866224" version="1" comment="glibc-langpack-fur is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866225" version="1" comment="glibc-langpack-fy is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866226" version="1" comment="glibc-langpack-ga is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866227" version="1" comment="glibc-langpack-gd is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866228" version="1" comment="glibc-langpack-gez is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866229" version="1" comment="glibc-langpack-gl is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866230" version="1" comment="glibc-langpack-gu is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866231" version="1" comment="glibc-langpack-gv is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866232" version="1" comment="glibc-langpack-ha is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866233" version="1" comment="glibc-langpack-hak is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866234" version="1" comment="glibc-langpack-he is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866235" version="1" comment="glibc-langpack-hi is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866236" version="1" comment="glibc-langpack-hif is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866237" version="1" comment="glibc-langpack-hne is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866238" version="1" comment="glibc-langpack-hr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866239" version="1" comment="glibc-langpack-hsb is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866240" version="1" comment="glibc-langpack-ht is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866241" version="1" comment="glibc-langpack-hu is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866242" version="1" comment="glibc-langpack-hy is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866243" version="1" comment="glibc-langpack-ia is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866244" version="1" comment="glibc-langpack-id is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866245" version="1" comment="glibc-langpack-ig is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866246" version="1" comment="glibc-langpack-ik is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866247" version="1" comment="glibc-langpack-is is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866248" version="1" comment="glibc-langpack-it is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866249" version="1" comment="glibc-langpack-iu is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866250" version="1" comment="glibc-langpack-ja is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866251" version="1" comment="glibc-langpack-ka is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866252" version="1" comment="glibc-langpack-kab is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866253" version="1" comment="glibc-langpack-kk is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866254" version="1" comment="glibc-langpack-kl is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866255" version="1" comment="glibc-langpack-km is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866256" version="1" comment="glibc-langpack-kn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866257" version="1" comment="glibc-langpack-ko is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866258" version="1" comment="glibc-langpack-kok is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866259" version="1" comment="glibc-langpack-ks is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866260" version="1" comment="glibc-langpack-ku is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866261" version="1" comment="glibc-langpack-kw is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866262" version="1" comment="glibc-langpack-ky is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866263" version="1" comment="glibc-langpack-lb is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866264" version="1" comment="glibc-langpack-lg is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866265" version="1" comment="glibc-langpack-li is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866266" version="1" comment="glibc-langpack-lij is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866267" version="1" comment="glibc-langpack-ln is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866268" version="1" comment="glibc-langpack-lo is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866269" version="1" comment="glibc-langpack-lt is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866270" version="1" comment="glibc-langpack-lv is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866271" version="1" comment="glibc-langpack-lzh is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866272" version="1" comment="glibc-langpack-mag is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866273" version="1" comment="glibc-langpack-mai is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866274" version="1" comment="glibc-langpack-mfe is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866275" version="1" comment="glibc-langpack-mg is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866276" version="1" comment="glibc-langpack-mhr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866277" version="1" comment="glibc-langpack-mi is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866278" version="1" comment="glibc-langpack-miq is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866279" version="1" comment="glibc-langpack-mjw is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866280" version="1" comment="glibc-langpack-mk is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866281" version="1" comment="glibc-langpack-ml is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866282" version="1" comment="glibc-langpack-mn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866283" version="1" comment="glibc-langpack-mni is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866284" version="1" comment="glibc-langpack-mr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866285" version="1" comment="glibc-langpack-ms is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866286" version="1" comment="glibc-langpack-mt is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866287" version="1" comment="glibc-langpack-my is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866288" version="1" comment="glibc-langpack-nan is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866289" version="1" comment="glibc-langpack-nb is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866290" version="1" comment="glibc-langpack-nds is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866291" version="1" comment="glibc-langpack-ne is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866292" version="1" comment="glibc-langpack-nhn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866293" version="1" comment="glibc-langpack-niu is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866294" version="1" comment="glibc-langpack-nl is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866295" version="1" comment="glibc-langpack-nn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866296" version="1" comment="glibc-langpack-nr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866297" version="1" comment="glibc-langpack-nso is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866298" version="1" comment="glibc-langpack-oc is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866299" version="1" comment="glibc-langpack-om is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866300" version="1" comment="glibc-langpack-or is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866301" version="1" comment="glibc-langpack-os is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866302" version="1" comment="glibc-langpack-pa is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866303" version="1" comment="glibc-langpack-pap is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866304" version="1" comment="glibc-langpack-pl is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866305" version="1" comment="glibc-langpack-ps is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866306" version="1" comment="glibc-langpack-pt is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866307" version="1" comment="glibc-langpack-quz is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866308" version="1" comment="glibc-langpack-raj is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866309" version="1" comment="glibc-langpack-ro is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866310" version="1" comment="glibc-langpack-ru is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866311" version="1" comment="glibc-langpack-rw is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866312" version="1" comment="glibc-langpack-sa is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866313" version="1" comment="glibc-langpack-sah is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866314" version="1" comment="glibc-langpack-sat is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866315" version="1" comment="glibc-langpack-sc is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866316" version="1" comment="glibc-langpack-sd is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866317" version="1" comment="glibc-langpack-se is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866318" version="1" comment="glibc-langpack-sgs is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866319" version="1" comment="glibc-langpack-shn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866320" version="1" comment="glibc-langpack-shs is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866321" version="1" comment="glibc-langpack-si is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866322" version="1" comment="glibc-langpack-sid is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866323" version="1" comment="glibc-langpack-sk is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866324" version="1" comment="glibc-langpack-sl is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866325" version="1" comment="glibc-langpack-sm is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866326" version="1" comment="glibc-langpack-so is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866327" version="1" comment="glibc-langpack-sq is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866328" version="1" comment="glibc-langpack-sr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866329" version="1" comment="glibc-langpack-ss is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866330" version="1" comment="glibc-langpack-st is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866331" version="1" comment="glibc-langpack-sv is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866332" version="1" comment="glibc-langpack-sw is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866333" version="1" comment="glibc-langpack-szl is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866334" version="1" comment="glibc-langpack-ta is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866335" version="1" comment="glibc-langpack-tcy is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866336" version="1" comment="glibc-langpack-te is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866337" version="1" comment="glibc-langpack-tg is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866338" version="1" comment="glibc-langpack-th is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866339" version="1" comment="glibc-langpack-the is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866340" version="1" comment="glibc-langpack-ti is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866341" version="1" comment="glibc-langpack-tig is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866342" version="1" comment="glibc-langpack-tk is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866343" version="1" comment="glibc-langpack-tl is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866344" version="1" comment="glibc-langpack-tn is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866345" version="1" comment="glibc-langpack-to is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866346" version="1" comment="glibc-langpack-tpi is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866347" version="1" comment="glibc-langpack-tr is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866348" version="1" comment="glibc-langpack-ts is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866349" version="1" comment="glibc-langpack-tt is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866350" version="1" comment="glibc-langpack-ug is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866351" version="1" comment="glibc-langpack-uk is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866352" version="1" comment="glibc-langpack-unm is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866353" version="1" comment="glibc-langpack-ur is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866354" version="1" comment="glibc-langpack-uz is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866355" version="1" comment="glibc-langpack-ve is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866356" version="1" comment="glibc-langpack-vi is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866357" version="1" comment="glibc-langpack-wa is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866358" version="1" comment="glibc-langpack-wae is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866359" version="1" comment="glibc-langpack-wal is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866360" version="1" comment="glibc-langpack-wo is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866361" version="1" comment="glibc-langpack-xh is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866362" version="1" comment="glibc-langpack-yi is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866363" version="1" comment="glibc-langpack-yo is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866364" version="1" comment="glibc-langpack-yue is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866365" version="1" comment="glibc-langpack-yuw is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866366" version="1" comment="glibc-langpack-zh is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866367" version="1" comment="glibc-langpack-zu is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866368" version="1" comment="glibc-locale-source is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866369" version="1" comment="glibc-minimal-langpack is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866370" version="1" comment="glibc-nss-devel is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866371" version="1" comment="glibc-static is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866372" version="1" comment="glibc-utils is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866373" version="1" comment="libnsl is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866374" version="1" comment="nscd is &lt;2.28-251.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866375" version="1" comment="nss_db is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866376" version="1" comment="nss_hesiod is &lt;2.28-251.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872683" version="1" comment="libipa_hbac is &lt;2.9.4-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872684" version="1" comment="libsss_autofs is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872685" version="1" comment="libsss_certmap is &lt;2.9.4-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872686" version="1" comment="libsss_idmap is &lt;2.9.4-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872687" version="1" comment="libsss_nss_idmap is &lt;2.9.4-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872688" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.4-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872689" version="1" comment="libsss_simpleifp is &lt;2.9.4-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872690" version="1" comment="libsss_sudo is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872691" version="1" comment="python3-libipa_hbac is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872692" version="1" comment="python3-libsss_nss_idmap is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872693" version="1" comment="python3-sss is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872694" version="1" comment="python3-sss-murmur is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872695" version="1" comment="python3-sssdconfig is &lt;2.9.4-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872696" version="1" comment="sssd is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872697" version="1" comment="sssd-ad is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872698" version="1" comment="sssd-client is &lt;2.9.4-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872699" version="1" comment="sssd-common is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872700" version="1" comment="sssd-common-pac is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872701" version="1" comment="sssd-dbus is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872702" version="1" comment="sssd-idp is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872703" version="1" comment="sssd-ipa is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872704" version="1" comment="sssd-kcm is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872705" version="1" comment="sssd-krb5 is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872706" version="1" comment="sssd-krb5-common is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872707" version="1" comment="sssd-ldap is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872708" version="1" comment="sssd-nfs-idmap is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872709" version="1" comment="sssd-polkit-rules is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872710" version="1" comment="sssd-proxy is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872711" version="1" comment="sssd-tools is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872712" version="1" comment="sssd-winbind-idmap is &lt;2.9.4-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867189" version="1" comment="bind is &lt;9.11.36-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867190" version="1" comment="bind-chroot is &lt;9.11.36-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867191" version="1" comment="bind-devel is &lt;9.11.36-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867192" version="1" comment="bind-export-devel is &lt;9.11.36-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867193" version="1" comment="bind-export-libs is &lt;9.11.36-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867194" version="1" comment="bind-libs is &lt;9.11.36-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867195" version="1" comment="bind-libs-lite is &lt;9.11.36-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867196" version="1" comment="bind-license is &lt;9.11.36-14.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867197" version="1" comment="bind-lite-devel is &lt;9.11.36-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867198" version="1" comment="bind-pkcs11 is &lt;9.11.36-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867199" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867200" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867201" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867202" version="1" comment="bind-sdb is &lt;9.11.36-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867203" version="1" comment="bind-sdb-chroot is &lt;9.11.36-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867204" version="1" comment="bind-utils is &lt;9.11.36-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867205" version="1" comment="dhcp-client is &lt;4.3.6-50.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867206" version="1" comment="dhcp-common is &lt;4.3.6-50.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867207" version="1" comment="dhcp-libs is &lt;4.3.6-50.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867208" version="1" comment="dhcp-relay is &lt;4.3.6-50.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867209" version="1" comment="dhcp-server is &lt;4.3.6-50.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867210" version="1" comment="python3-bind is &lt;9.11.36-14.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866377" version="1" comment="python3-dns is &lt;1.15.0-12.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874550" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.19-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874551" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.19-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874552" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.19-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874553" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.19-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874554" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.19-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874555" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.119-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874556" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.119-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874557" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.19-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874558" version="1" comment="dotnet-templates-7.0 is &lt;7.0.119-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874559" version="1" comment="gdk-pixbuf2 is &lt;2.36.12-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874560" version="1" comment="gdk-pixbuf2-devel is &lt;2.36.12-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874561" version="1" comment="gdk-pixbuf2-modules is &lt;2.36.12-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874168" version="1" comment="gdk-pixbuf2-xlib is &lt;2.36.12-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874169" version="1" comment="gdk-pixbuf2-xlib-devel is &lt;2.36.12-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866378" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873490" version="1" comment="compat-libpthread-nonshared is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873491" version="1" comment="glibc is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873492" version="1" comment="glibc-all-langpacks is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873493" version="1" comment="glibc-benchtests is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873494" version="1" comment="glibc-common is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873495" version="1" comment="glibc-devel is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873496" version="1" comment="glibc-doc is &lt;2.28-251.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873497" version="1" comment="glibc-gconv-extra is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873498" version="1" comment="glibc-headers is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873499" version="1" comment="glibc-langpack-aa is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873500" version="1" comment="glibc-langpack-af is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873501" version="1" comment="glibc-langpack-agr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873502" version="1" comment="glibc-langpack-ak is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873503" version="1" comment="glibc-langpack-am is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873504" version="1" comment="glibc-langpack-an is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873505" version="1" comment="glibc-langpack-anp is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873506" version="1" comment="glibc-langpack-ar is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873507" version="1" comment="glibc-langpack-as is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873508" version="1" comment="glibc-langpack-ast is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873509" version="1" comment="glibc-langpack-ayc is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873510" version="1" comment="glibc-langpack-az is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873511" version="1" comment="glibc-langpack-be is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873512" version="1" comment="glibc-langpack-bem is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873513" version="1" comment="glibc-langpack-ber is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873514" version="1" comment="glibc-langpack-bg is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873515" version="1" comment="glibc-langpack-bhb is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873516" version="1" comment="glibc-langpack-bho is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873517" version="1" comment="glibc-langpack-bi is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873518" version="1" comment="glibc-langpack-bn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873519" version="1" comment="glibc-langpack-bo is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873520" version="1" comment="glibc-langpack-br is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873521" version="1" comment="glibc-langpack-brx is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873522" version="1" comment="glibc-langpack-bs is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873523" version="1" comment="glibc-langpack-byn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873524" version="1" comment="glibc-langpack-ca is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873525" version="1" comment="glibc-langpack-ce is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873526" version="1" comment="glibc-langpack-chr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873527" version="1" comment="glibc-langpack-cmn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873528" version="1" comment="glibc-langpack-crh is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873529" version="1" comment="glibc-langpack-cs is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873530" version="1" comment="glibc-langpack-csb is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873531" version="1" comment="glibc-langpack-cv is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873532" version="1" comment="glibc-langpack-cy is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873533" version="1" comment="glibc-langpack-da is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873534" version="1" comment="glibc-langpack-de is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873535" version="1" comment="glibc-langpack-doi is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873536" version="1" comment="glibc-langpack-dsb is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873537" version="1" comment="glibc-langpack-dv is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873538" version="1" comment="glibc-langpack-dz is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873539" version="1" comment="glibc-langpack-el is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873540" version="1" comment="glibc-langpack-en is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873541" version="1" comment="glibc-langpack-eo is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873542" version="1" comment="glibc-langpack-es is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873543" version="1" comment="glibc-langpack-et is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873544" version="1" comment="glibc-langpack-eu is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873545" version="1" comment="glibc-langpack-fa is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873546" version="1" comment="glibc-langpack-ff is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873547" version="1" comment="glibc-langpack-fi is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873548" version="1" comment="glibc-langpack-fil is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873549" version="1" comment="glibc-langpack-fo is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873550" version="1" comment="glibc-langpack-fr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873551" version="1" comment="glibc-langpack-fur is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873552" version="1" comment="glibc-langpack-fy is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873553" version="1" comment="glibc-langpack-ga is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873554" version="1" comment="glibc-langpack-gd is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873555" version="1" comment="glibc-langpack-gez is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873556" version="1" comment="glibc-langpack-gl is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873557" version="1" comment="glibc-langpack-gu is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873558" version="1" comment="glibc-langpack-gv is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873559" version="1" comment="glibc-langpack-ha is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873560" version="1" comment="glibc-langpack-hak is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873561" version="1" comment="glibc-langpack-he is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873562" version="1" comment="glibc-langpack-hi is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873563" version="1" comment="glibc-langpack-hif is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873564" version="1" comment="glibc-langpack-hne is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873565" version="1" comment="glibc-langpack-hr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873566" version="1" comment="glibc-langpack-hsb is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873567" version="1" comment="glibc-langpack-ht is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873568" version="1" comment="glibc-langpack-hu is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873569" version="1" comment="glibc-langpack-hy is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873570" version="1" comment="glibc-langpack-ia is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873571" version="1" comment="glibc-langpack-id is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873572" version="1" comment="glibc-langpack-ig is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873573" version="1" comment="glibc-langpack-ik is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873574" version="1" comment="glibc-langpack-is is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873575" version="1" comment="glibc-langpack-it is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873576" version="1" comment="glibc-langpack-iu is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873577" version="1" comment="glibc-langpack-ja is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873578" version="1" comment="glibc-langpack-ka is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873579" version="1" comment="glibc-langpack-kab is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873580" version="1" comment="glibc-langpack-kk is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873581" version="1" comment="glibc-langpack-kl is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873582" version="1" comment="glibc-langpack-km is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873583" version="1" comment="glibc-langpack-kn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873584" version="1" comment="glibc-langpack-ko is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873585" version="1" comment="glibc-langpack-kok is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873586" version="1" comment="glibc-langpack-ks is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873587" version="1" comment="glibc-langpack-ku is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873588" version="1" comment="glibc-langpack-kw is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873589" version="1" comment="glibc-langpack-ky is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873590" version="1" comment="glibc-langpack-lb is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873591" version="1" comment="glibc-langpack-lg is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873592" version="1" comment="glibc-langpack-li is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873593" version="1" comment="glibc-langpack-lij is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873594" version="1" comment="glibc-langpack-ln is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873595" version="1" comment="glibc-langpack-lo is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873596" version="1" comment="glibc-langpack-lt is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873597" version="1" comment="glibc-langpack-lv is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873598" version="1" comment="glibc-langpack-lzh is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873599" version="1" comment="glibc-langpack-mag is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873600" version="1" comment="glibc-langpack-mai is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873601" version="1" comment="glibc-langpack-mfe is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873602" version="1" comment="glibc-langpack-mg is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873603" version="1" comment="glibc-langpack-mhr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873604" version="1" comment="glibc-langpack-mi is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873605" version="1" comment="glibc-langpack-miq is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873606" version="1" comment="glibc-langpack-mjw is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873607" version="1" comment="glibc-langpack-mk is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873608" version="1" comment="glibc-langpack-ml is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873609" version="1" comment="glibc-langpack-mn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873610" version="1" comment="glibc-langpack-mni is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873611" version="1" comment="glibc-langpack-mr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873612" version="1" comment="glibc-langpack-ms is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873613" version="1" comment="glibc-langpack-mt is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873614" version="1" comment="glibc-langpack-my is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873615" version="1" comment="glibc-langpack-nan is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873616" version="1" comment="glibc-langpack-nb is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873617" version="1" comment="glibc-langpack-nds is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873618" version="1" comment="glibc-langpack-ne is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873619" version="1" comment="glibc-langpack-nhn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873620" version="1" comment="glibc-langpack-niu is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873621" version="1" comment="glibc-langpack-nl is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873622" version="1" comment="glibc-langpack-nn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873623" version="1" comment="glibc-langpack-nr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873624" version="1" comment="glibc-langpack-nso is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873625" version="1" comment="glibc-langpack-oc is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873626" version="1" comment="glibc-langpack-om is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873627" version="1" comment="glibc-langpack-or is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873628" version="1" comment="glibc-langpack-os is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873629" version="1" comment="glibc-langpack-pa is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873630" version="1" comment="glibc-langpack-pap is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873631" version="1" comment="glibc-langpack-pl is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873632" version="1" comment="glibc-langpack-ps is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873633" version="1" comment="glibc-langpack-pt is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873634" version="1" comment="glibc-langpack-quz is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873635" version="1" comment="glibc-langpack-raj is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873636" version="1" comment="glibc-langpack-ro is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873637" version="1" comment="glibc-langpack-ru is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873638" version="1" comment="glibc-langpack-rw is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873639" version="1" comment="glibc-langpack-sa is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873640" version="1" comment="glibc-langpack-sah is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873641" version="1" comment="glibc-langpack-sat is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873642" version="1" comment="glibc-langpack-sc is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873643" version="1" comment="glibc-langpack-sd is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873644" version="1" comment="glibc-langpack-se is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873645" version="1" comment="glibc-langpack-sgs is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873646" version="1" comment="glibc-langpack-shn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873647" version="1" comment="glibc-langpack-shs is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873648" version="1" comment="glibc-langpack-si is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873649" version="1" comment="glibc-langpack-sid is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873650" version="1" comment="glibc-langpack-sk is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873651" version="1" comment="glibc-langpack-sl is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873652" version="1" comment="glibc-langpack-sm is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873653" version="1" comment="glibc-langpack-so is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873654" version="1" comment="glibc-langpack-sq is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873655" version="1" comment="glibc-langpack-sr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873656" version="1" comment="glibc-langpack-ss is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873657" version="1" comment="glibc-langpack-st is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873658" version="1" comment="glibc-langpack-sv is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873659" version="1" comment="glibc-langpack-sw is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873660" version="1" comment="glibc-langpack-szl is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873661" version="1" comment="glibc-langpack-ta is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873662" version="1" comment="glibc-langpack-tcy is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873663" version="1" comment="glibc-langpack-te is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873664" version="1" comment="glibc-langpack-tg is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873665" version="1" comment="glibc-langpack-th is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873666" version="1" comment="glibc-langpack-the is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873667" version="1" comment="glibc-langpack-ti is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873668" version="1" comment="glibc-langpack-tig is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873669" version="1" comment="glibc-langpack-tk is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873670" version="1" comment="glibc-langpack-tl is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873671" version="1" comment="glibc-langpack-tn is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873672" version="1" comment="glibc-langpack-to is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873673" version="1" comment="glibc-langpack-tpi is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873674" version="1" comment="glibc-langpack-tr is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873675" version="1" comment="glibc-langpack-ts is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873676" version="1" comment="glibc-langpack-tt is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873677" version="1" comment="glibc-langpack-ug is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873678" version="1" comment="glibc-langpack-uk is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873679" version="1" comment="glibc-langpack-unm is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873680" version="1" comment="glibc-langpack-ur is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873681" version="1" comment="glibc-langpack-uz is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873682" version="1" comment="glibc-langpack-ve is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873683" version="1" comment="glibc-langpack-vi is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873684" version="1" comment="glibc-langpack-wa is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873685" version="1" comment="glibc-langpack-wae is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873686" version="1" comment="glibc-langpack-wal is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873687" version="1" comment="glibc-langpack-wo is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873688" version="1" comment="glibc-langpack-xh is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873689" version="1" comment="glibc-langpack-yi is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873690" version="1" comment="glibc-langpack-yo is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873691" version="1" comment="glibc-langpack-yue is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873692" version="1" comment="glibc-langpack-yuw is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873693" version="1" comment="glibc-langpack-zh is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873694" version="1" comment="glibc-langpack-zu is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873695" version="1" comment="glibc-locale-source is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873696" version="1" comment="glibc-minimal-langpack is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873697" version="1" comment="glibc-nss-devel is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873698" version="1" comment="glibc-static is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873699" version="1" comment="glibc-utils is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873700" version="1" comment="libnsl is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873701" version="1" comment="nscd is &lt;2.28-251.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873702" version="1" comment="nss_db is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873703" version="1" comment="nss_hesiod is &lt;2.28-251.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873290" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873291" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873292" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873293" version="1" comment="dotnet is &lt;8.0.105-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873294" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873295" version="1" comment="dotnet-host is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873296" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873297" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873298" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873299" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.105-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873300" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.105-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873301" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.105-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873302" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873303" version="1" comment="dotnet-templates-8.0 is &lt;8.0.105-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873304" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.105-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873704" version="1" comment="git-lfs is &lt;3.4.1-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866379" version="1" comment="platform-python is &lt;3.6.8-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866380" version="1" comment="platform-python-debug is &lt;3.6.8-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866381" version="1" comment="platform-python-devel is &lt;3.6.8-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866382" version="1" comment="python3-idle is &lt;3.6.8-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866383" version="1" comment="python3-libs is &lt;3.6.8-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866384" version="1" comment="python3-test is &lt;3.6.8-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866385" version="1" comment="python3-tkinter is &lt;3.6.8-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874562" version="1" comment="ruby is &lt;3.0.7-143.module+el8.10.0+21858+d19f3934 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874563" version="1" comment="ruby-default-gems is &lt;3.0.7-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874564" version="1" comment="ruby-devel is &lt;3.0.7-143.module+el8.10.0+21858+d19f3934 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874565" version="1" comment="ruby-doc is &lt;3.0.7-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874566" version="1" comment="ruby-libs is &lt;3.0.7-143.module+el8.10.0+21858+d19f3934 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874567" version="1" comment="rubygem-abrt is &lt;0.4.0-1.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874568" version="1" comment="rubygem-abrt-doc is &lt;0.4.0-1.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874569" version="1" comment="rubygem-bigdecimal is &lt;3.0.0-143.module+el8.10.0+21858+d19f3934 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874570" version="1" comment="rubygem-bundler is &lt;2.2.33-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874571" version="1" comment="rubygem-io-console is &lt;0.5.7-143.module+el8.10.0+21858+d19f3934 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874572" version="1" comment="rubygem-irb is &lt;1.3.5-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874573" version="1" comment="rubygem-json is &lt;2.5.1-143.module+el8.10.0+21858+d19f3934 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874574" version="1" comment="rubygem-minitest is &lt;5.14.2-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874575" version="1" comment="rubygem-mysql2 is &lt;0.5.3-2.module+el8.10.0+21858+d19f3934 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874576" version="1" comment="rubygem-mysql2-doc is &lt;0.5.3-2.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874577" version="1" comment="rubygem-pg is &lt;1.2.3-1.module+el8.10.0+21858+d19f3934 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874578" version="1" comment="rubygem-pg-doc is &lt;1.2.3-1.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874579" version="1" comment="rubygem-power_assert is &lt;1.2.1-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874580" version="1" comment="rubygem-psych is &lt;3.3.2-143.module+el8.10.0+21858+d19f3934 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874581" version="1" comment="rubygem-rake is &lt;13.0.3-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874582" version="1" comment="rubygem-rbs is &lt;1.4.0-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874583" version="1" comment="rubygem-rdoc is &lt;6.3.4.1-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874584" version="1" comment="rubygem-rexml is &lt;3.2.5-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874585" version="1" comment="rubygem-rss is &lt;0.2.9-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874586" version="1" comment="rubygem-test-unit is &lt;3.3.7-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874587" version="1" comment="rubygem-typeprof is &lt;0.15.2-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874588" version="1" comment="rubygems is &lt;3.2.33-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874589" version="1" comment="rubygems-devel is &lt;3.2.33-143.module+el8.10.0+21858+d19f3934 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874590" version="1" comment="ruby is &lt;3.1.5-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874591" version="1" comment="ruby-bundled-gems is &lt;3.1.5-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874592" version="1" comment="ruby-default-gems is &lt;3.1.5-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874593" version="1" comment="ruby-devel is &lt;3.1.5-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874594" version="1" comment="ruby-doc is &lt;3.1.5-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874595" version="1" comment="ruby-libs is &lt;3.1.5-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874598" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874599" version="1" comment="rubygem-bundler is &lt;2.3.27-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874600" version="1" comment="rubygem-io-console is &lt;0.5.11-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874601" version="1" comment="rubygem-irb is &lt;1.4.1-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874602" version="1" comment="rubygem-json is &lt;2.6.1-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874603" version="1" comment="rubygem-minitest is &lt;5.15.0-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874608" version="1" comment="rubygem-power_assert is &lt;2.0.1-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874609" version="1" comment="rubygem-psych is &lt;4.0.4-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874610" version="1" comment="rubygem-rake is &lt;13.0.6-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874611" version="1" comment="rubygem-rbs is &lt;2.7.0-143.module+el8.10.0+21792+e2f63d26 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874612" version="1" comment="rubygem-rdoc is &lt;6.4.1.1-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874613" version="1" comment="rubygem-rexml is &lt;3.2.5-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874614" version="1" comment="rubygem-rss is &lt;0.2.9-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874615" version="1" comment="rubygem-test-unit is &lt;3.5.3-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874616" version="1" comment="rubygem-typeprof is &lt;0.21.3-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874617" version="1" comment="rubygems is &lt;3.3.27-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874618" version="1" comment="rubygems-devel is &lt;3.3.27-143.module+el8.10.0+21792+e2f63d26 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866386" version="1" comment="bpftool is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866387" version="1" comment="kernel is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866388" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.5.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866389" version="1" comment="kernel-core is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866390" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866391" version="1" comment="kernel-debug is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866392" version="1" comment="kernel-debug-core is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866394" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866395" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866397" version="1" comment="kernel-doc is &lt;4.18.0-553.5.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866398" version="1" comment="kernel-headers is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866399" version="1" comment="kernel-modules is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866400" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866401" version="1" comment="kernel-tools is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866402" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866404" version="1" comment="perf is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866405" version="1" comment="python3-perf is &lt;4.18.0-553.5.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866406" version="1" comment="libxml2 is &lt;2.9.7-18.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866407" version="1" comment="libxml2-devel is &lt;2.9.7-18.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866408" version="1" comment="python3-libxml2 is &lt;2.9.7-18.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866409" version="1" comment="tomcat is &lt;9.0.87-1.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866410" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866411" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866412" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866413" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866414" version="1" comment="tomcat-lib is &lt;9.0.87-1.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866415" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866416" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866417" version="1" comment="cockpit is &lt;310.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866418" version="1" comment="cockpit-bridge is &lt;310.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866419" version="1" comment="cockpit-doc is &lt;310.4-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866420" version="1" comment="cockpit-system is &lt;310.4-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866421" version="1" comment="cockpit-ws is &lt;310.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874619" version="1" comment="ruby is &lt;3.3.1-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874620" version="1" comment="ruby-bundled-gems is &lt;3.3.1-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874621" version="1" comment="ruby-default-gems is &lt;3.3.1-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874622" version="1" comment="ruby-devel is &lt;3.3.1-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874623" version="1" comment="ruby-doc is &lt;3.3.1-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874624" version="1" comment="ruby-libs is &lt;3.3.1-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874625" version="1" comment="rubygem-abrt is &lt;0.4.0-1.module+el8.10.0+21226+b78a28c4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874626" version="1" comment="rubygem-abrt-doc is &lt;0.4.0-1.module+el8.10.0+21226+b78a28c4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874627" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874628" version="1" comment="rubygem-bundler is &lt;2.5.9-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874629" version="1" comment="rubygem-io-console is &lt;0.7.1-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874630" version="1" comment="rubygem-irb is &lt;1.11.0-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874631" version="1" comment="rubygem-json is &lt;2.7.1-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874632" version="1" comment="rubygem-minitest is &lt;5.20.0-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874633" version="1" comment="rubygem-mysql2 is &lt;0.5.5-1.module+el8.10.0+21226+b78a28c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874634" version="1" comment="rubygem-mysql2-doc is &lt;0.5.5-1.module+el8.10.0+21226+b78a28c4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874635" version="1" comment="rubygem-pg is &lt;1.5.4-1.module+el8.10.0+21226+b78a28c4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874636" version="1" comment="rubygem-pg-doc is &lt;1.5.4-1.module+el8.10.0+21226+b78a28c4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874637" version="1" comment="rubygem-power_assert is &lt;2.0.3-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874638" version="1" comment="rubygem-psych is &lt;5.1.2-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874639" version="1" comment="rubygem-racc is &lt;1.7.3-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874640" version="1" comment="rubygem-rake is &lt;13.1.0-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874641" version="1" comment="rubygem-rbs is &lt;3.4.0-2.module+el8.10.0+21860+47fbda2a for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874642" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874643" version="1" comment="rubygem-rexml is &lt;3.2.6-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874644" version="1" comment="rubygem-rss is &lt;0.3.0-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874645" version="1" comment="rubygem-test-unit is &lt;3.6.1-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874646" version="1" comment="rubygem-typeprof is &lt;0.21.9-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874647" version="1" comment="rubygems is &lt;3.5.9-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874648" version="1" comment="rubygems-devel is &lt;3.5.9-2.module+el8.10.0+21860+47fbda2a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866422" version="1" comment="firefox is &lt;115.11.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866423" version="1" comment="thunderbird is &lt;115.11.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869888" version="1" comment="firefox is &lt;115.12.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872713" version="1" comment="flatpak is &lt;1.12.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872714" version="1" comment="flatpak-devel is &lt;1.12.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872715" version="1" comment="flatpak-libs is &lt;1.12.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872716" version="1" comment="flatpak-selinux is &lt;1.12.9-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872717" version="1" comment="flatpak-session-helper is &lt;1.12.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873923" version="1" comment="aardvark-dns is &lt;1.10.0-1.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873924" version="1" comment="buildah is &lt;1.33.7-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873925" version="1" comment="buildah-tests is &lt;1.33.7-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873926" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+21962+8143777b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873927" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873928" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+21962+8143777b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873929" version="1" comment="containernetworking-plugins is &lt;1.4.0-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873930" version="1" comment="containers-common is &lt;1-81.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873931" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873932" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873933" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873934" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873935" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873936" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873937" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873938" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873939" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873940" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873941" version="1" comment="podman is &lt;4.9.4-3.module+el8.10.0+21974+acd2159c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873942" version="1" comment="podman-catatonit is &lt;4.9.4-3.module+el8.10.0+21974+acd2159c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873943" version="1" comment="podman-docker is &lt;4.9.4-3.module+el8.10.0+21974+acd2159c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873944" version="1" comment="podman-gvproxy is &lt;4.9.4-3.module+el8.10.0+21974+acd2159c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873945" version="1" comment="podman-plugins is &lt;4.9.4-3.module+el8.10.0+21974+acd2159c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873946" version="1" comment="podman-remote is &lt;4.9.4-3.module+el8.10.0+21974+acd2159c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873947" version="1" comment="podman-tests is &lt;4.9.4-3.module+el8.10.0+21974+acd2159c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873948" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873949" version="1" comment="python3-podman is &lt;4.9.0-1.module+el8.10.0+21962+8143777b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873950" version="1" comment="runc is &lt;1.1.12-1.module+el8.10.0+21974+acd2159c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873951" version="1" comment="skopeo is &lt;1.14.3-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873952" version="1" comment="skopeo-tests is &lt;1.14.3-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873953" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873954" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873955" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+21962+8143777b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873956" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+21962+8143777b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869889" version="1" comment="ghostscript is &lt;9.27-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869890" version="1" comment="ghostscript-doc is &lt;9.27-13.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869891" version="1" comment="ghostscript-tools-dvipdf is &lt;9.27-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869892" version="1" comment="ghostscript-tools-fonts is &lt;9.27-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869893" version="1" comment="ghostscript-tools-printing is &lt;9.27-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869894" version="1" comment="ghostscript-x11 is &lt;9.27-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869895" version="1" comment="libgs is &lt;9.27-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869896" version="1" comment="libgs-devel is &lt;9.27-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869897" version="1" comment="thunderbird is &lt;115.12.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869898" version="1" comment="python3.11 is &lt;3.11.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869899" version="1" comment="python3.11-debug is &lt;3.11.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869900" version="1" comment="python3.11-devel is &lt;3.11.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869901" version="1" comment="python3.11-idle is &lt;3.11.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869902" version="1" comment="python3.11-libs is &lt;3.11.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869903" version="1" comment="python3.11-rpm-macros is &lt;3.11.9-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869904" version="1" comment="python3.11-test is &lt;3.11.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869905" version="1" comment="python3.11-tkinter is &lt;3.11.9-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869906" version="1" comment="git is &lt;2.43.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869907" version="1" comment="git-all is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869908" version="1" comment="git-core is &lt;2.43.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869909" version="1" comment="git-core-doc is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869910" version="1" comment="git-credential-libsecret is &lt;2.43.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869911" version="1" comment="git-daemon is &lt;2.43.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869912" version="1" comment="git-email is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869913" version="1" comment="git-gui is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869914" version="1" comment="git-instaweb is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869915" version="1" comment="git-subtree is &lt;2.43.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869916" version="1" comment="git-svn is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869917" version="1" comment="gitk is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869918" version="1" comment="gitweb is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869919" version="1" comment="perl-Git is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869920" version="1" comment="perl-Git-SVN is &lt;2.43.5-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874649" version="1" comment="httpd is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874650" version="1" comment="httpd-devel is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874651" version="1" comment="httpd-filesystem is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874652" version="1" comment="httpd-manual is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874653" version="1" comment="httpd-tools is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874654" version="1" comment="mod_ldap is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874655" version="1" comment="mod_proxy_html is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874656" version="1" comment="mod_session is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874657" version="1" comment="mod_ssl is &lt;2.4.37-65.module+el8.10.0+21982+14717793 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872718" version="1" comment="bpftool is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872719" version="1" comment="kernel is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872720" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.8.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872721" version="1" comment="kernel-core is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872722" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872723" version="1" comment="kernel-debug is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872724" version="1" comment="kernel-debug-core is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872726" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872727" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872729" version="1" comment="kernel-doc is &lt;4.18.0-553.8.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872730" version="1" comment="kernel-headers is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872731" version="1" comment="kernel-modules is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872732" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872733" version="1" comment="kernel-tools is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872734" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872736" version="1" comment="perf is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872737" version="1" comment="python3-perf is &lt;4.18.0-553.8.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871854" version="1" comment="python3-pillow is &lt;5.1.1-21.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871855" version="1" comment="python3-pillow-devel is &lt;5.1.1-21.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871856" version="1" comment="python3-pillow-doc is &lt;5.1.1-21.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871857" version="1" comment="python3-pillow-tk is &lt;5.1.1-21.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871858" version="1" comment="python3-jinja2 is &lt;2.10.1-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871859" version="1" comment="389-ds-base is &lt;1.4.3.39-7.module+el8.10.0+21985+3665ccdb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871860" version="1" comment="389-ds-base-devel is &lt;1.4.3.39-7.module+el8.10.0+21985+3665ccdb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871861" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.39-7.module+el8.10.0+21985+3665ccdb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871862" version="1" comment="389-ds-base-libs is &lt;1.4.3.39-7.module+el8.10.0+21985+3665ccdb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871863" version="1" comment="389-ds-base-snmp is &lt;1.4.3.39-7.module+el8.10.0+21985+3665ccdb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871864" version="1" comment="python3-lib389 is &lt;1.4.3.39-7.module+el8.10.0+21985+3665ccdb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873705" version="1" comment="go-toolset is &lt;1.21.11-1.module+el8.10.0+21986+2112108a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873706" version="1" comment="golang is &lt;1.21.11-1.module+el8.10.0+21986+2112108a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873707" version="1" comment="golang-bin is &lt;1.21.11-1.module+el8.10.0+21986+2112108a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873708" version="1" comment="golang-docs is &lt;1.21.11-1.module+el8.10.0+21986+2112108a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873709" version="1" comment="golang-misc is &lt;1.21.11-1.module+el8.10.0+21986+2112108a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873710" version="1" comment="golang-src is &lt;1.21.11-1.module+el8.10.0+21986+2112108a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873711" version="1" comment="golang-tests is &lt;1.21.11-1.module+el8.10.0+21986+2112108a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873957" version="1" comment="iperf3 is &lt;3.5-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873958" version="1" comment="python3.12 is &lt;3.12.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873959" version="1" comment="python3.12-debug is &lt;3.12.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873960" version="1" comment="python3.12-devel is &lt;3.12.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873961" version="1" comment="python3.12-idle is &lt;3.12.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873962" version="1" comment="python3.12-libs is &lt;3.12.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873963" version="1" comment="python3.12-rpm-macros is &lt;3.12.3-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873964" version="1" comment="python3.12-test is &lt;3.12.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873965" version="1" comment="python3.12-tkinter is &lt;3.12.3-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873966" version="1" comment="python3.11-PyMySQL is &lt;1.0.2-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873967" version="1" comment="python3.12-PyMySQL is &lt;1.1.0-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874658" version="1" comment="buildah is &lt;1.33.8-1.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874659" version="1" comment="buildah-tests is &lt;1.33.8-1.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874660" version="1" comment="podman is &lt;4.9.4-4.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874661" version="1" comment="podman-catatonit is &lt;4.9.4-4.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874662" version="1" comment="podman-docker is &lt;4.9.4-4.module+el8.10.0+21995+81e8507c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874663" version="1" comment="podman-gvproxy is &lt;4.9.4-4.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874664" version="1" comment="podman-plugins is &lt;4.9.4-4.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874665" version="1" comment="podman-remote is &lt;4.9.4-4.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874666" version="1" comment="podman-tests is &lt;4.9.4-4.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874667" version="1" comment="skopeo is &lt;1.14.4-1.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874668" version="1" comment="skopeo-tests is &lt;1.14.4-1.module+el8.10.0+21995+81e8507c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873968" version="1" comment="libuv is &lt;1.41.1-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873969" version="1" comment="libuv-devel is &lt;1.41.1-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873970" version="1" comment="c-ares is &lt;1.13.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873971" version="1" comment="c-ares-devel is &lt;1.13.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874170" version="1" comment="libnghttp2 is &lt;1.33.0-6.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874171" version="1" comment="libnghttp2-devel is &lt;1.33.0-6.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874172" version="1" comment="nghttp2 is &lt;1.33.0-6.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873972" version="1" comment="less is &lt;530-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874173" version="1" comment="xmlrpc-c is &lt;1.51.0-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874174" version="1" comment="xmlrpc-c-c++ is &lt;1.51.0-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874175" version="1" comment="xmlrpc-c-client is &lt;1.51.0-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874176" version="1" comment="xmlrpc-c-client++ is &lt;1.51.0-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874177" version="1" comment="xmlrpc-c-devel is &lt;1.51.0-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873973" version="1" comment="python3-idna is &lt;2.5-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873974" version="1" comment="iwl100-firmware is &lt;39.31.5.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873975" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873976" version="1" comment="iwl105-firmware is &lt;18.168.6.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873977" version="1" comment="iwl135-firmware is &lt;18.168.6.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873978" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873979" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873980" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873981" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873982" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873983" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873984" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873985" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873986" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873987" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873988" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873989" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-122.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873990" version="1" comment="libertas-sd8686-firmware is &lt;20240610-122.git90df68d2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873991" version="1" comment="libertas-sd8787-firmware is &lt;20240610-122.git90df68d2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873992" version="1" comment="libertas-usb8388-firmware is &lt;20240610-122.git90df68d2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873993" version="1" comment="libertas-usb8388-olpc-firmware is &lt;20240610-122.git90df68d2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873994" version="1" comment="linux-firmware is &lt;20240610-122.git90df68d2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873995" version="1" comment="openldap is &lt;2.4.46-19.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873996" version="1" comment="openldap-clients is &lt;2.4.46-19.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873997" version="1" comment="openldap-devel is &lt;2.4.46-19.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873998" version="1" comment="openldap-servers is &lt;2.4.46-19.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873999" version="1" comment="cups is &lt;2.2.6-60.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874000" version="1" comment="cups-client is &lt;2.2.6-60.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874001" version="1" comment="cups-devel is &lt;2.2.6-60.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874002" version="1" comment="cups-filesystem is &lt;2.2.6-60.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874003" version="1" comment="cups-ipptool is &lt;2.2.6-60.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874004" version="1" comment="cups-libs is &lt;2.2.6-60.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874005" version="1" comment="cups-lpd is &lt;2.2.6-60.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943403" version="1" comment="fontforge is &lt;20200314-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874006" version="1" comment="libreswan is &lt;4.12-2.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875430" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.32-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875431" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.32-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875432" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.32-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875433" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.32-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875434" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.32-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875435" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.132-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876075" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.132-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875436" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.32-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875437" version="1" comment="dotnet-templates-6.0 is &lt;6.0.132-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873712" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873713" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873714" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873715" version="1" comment="dotnet is &lt;8.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873716" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873717" version="1" comment="dotnet-host is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873718" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873719" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873720" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873721" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873722" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873723" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873724" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873725" version="1" comment="dotnet-templates-8.0 is &lt;8.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873726" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873727" version="1" comment="ruby is &lt;2.5.9-112.module+el8.10.0+22021+135c76a8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873728" version="1" comment="ruby-devel is &lt;2.5.9-112.module+el8.10.0+22021+135c76a8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873729" version="1" comment="ruby-doc is &lt;2.5.9-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873730" version="1" comment="ruby-irb is &lt;2.5.9-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873731" version="1" comment="ruby-libs is &lt;2.5.9-112.module+el8.10.0+22021+135c76a8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873734" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-112.module+el8.10.0+22021+135c76a8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873737" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873738" version="1" comment="rubygem-io-console is &lt;0.4.6-112.module+el8.10.0+22021+135c76a8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873739" version="1" comment="rubygem-json is &lt;2.1.0-112.module+el8.10.0+22021+135c76a8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873740" version="1" comment="rubygem-minitest is &lt;5.10.3-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873741" version="1" comment="rubygem-net-telnet is &lt;0.1.1-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873742" version="1" comment="rubygem-openssl is &lt;2.1.2-112.module+el8.10.0+22021+135c76a8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873743" version="1" comment="rubygem-power_assert is &lt;1.1.1-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873744" version="1" comment="rubygem-psych is &lt;3.0.2-112.module+el8.10.0+22021+135c76a8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873745" version="1" comment="rubygem-rake is &lt;12.3.3-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873746" version="1" comment="rubygem-rdoc is &lt;6.0.1.1-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873747" version="1" comment="rubygem-test-unit is &lt;3.2.7-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873748" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873749" version="1" comment="rubygems is &lt;2.7.6.3-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873750" version="1" comment="rubygems-devel is &lt;2.7.6.3-112.module+el8.10.0+22021+135c76a8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877200" version="1" comment="firefox is &lt;115.13.0-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876076" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876077" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876078" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876079" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876080" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876081" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876082" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876083" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876084" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876085" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876086" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876087" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876088" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876089" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876090" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.422.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876091" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.422.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876092" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876093" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876094" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876095" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876330" version="1" comment="java-11-openjdk is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876331" version="1" comment="java-11-openjdk-demo is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876332" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876333" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876334" version="1" comment="java-11-openjdk-devel is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876335" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876336" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876337" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876338" version="1" comment="java-11-openjdk-headless is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876339" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876340" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876341" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876342" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876343" version="1" comment="java-11-openjdk-jmods is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876344" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876345" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876346" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876347" version="1" comment="java-11-openjdk-src is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876348" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876349" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876350" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876351" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876352" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876096" version="1" comment="java-17-openjdk is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876097" version="1" comment="java-17-openjdk-demo is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876098" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876099" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876100" version="1" comment="java-17-openjdk-devel is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876101" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876102" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876103" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876104" version="1" comment="java-17-openjdk-headless is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876105" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876106" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876107" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876108" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876109" version="1" comment="java-17-openjdk-jmods is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876110" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876111" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876112" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876113" version="1" comment="java-17-openjdk-src is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876114" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876115" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876116" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876117" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876118" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874669" version="1" comment="java-21-openjdk is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874670" version="1" comment="java-21-openjdk-demo is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874671" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874672" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874673" version="1" comment="java-21-openjdk-devel is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874674" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874675" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874676" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874677" version="1" comment="java-21-openjdk-headless is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874678" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874679" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874680" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874681" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874682" version="1" comment="java-21-openjdk-jmods is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874683" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874684" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874685" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874686" version="1" comment="java-21-openjdk-src is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874687" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874688" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874689" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874690" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874691" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874692" version="1" comment="qt5-qtbase is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874693" version="1" comment="qt5-qtbase-common is &lt;5.15.3-8.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874694" version="1" comment="qt5-qtbase-devel is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874695" version="1" comment="qt5-qtbase-examples is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874696" version="1" comment="qt5-qtbase-gui is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874697" version="1" comment="qt5-qtbase-mysql is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874698" version="1" comment="qt5-qtbase-odbc is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874699" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874700" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874701" version="1" comment="qt5-qtbase-static is &lt;5.15.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874702" version="1" comment="libndp is &lt;1.7-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877068" version="1" comment="thunderbird is &lt;115.13.0-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876177" version="1" comment="httpd is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876178" version="1" comment="httpd-devel is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876179" version="1" comment="httpd-filesystem is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876180" version="1" comment="httpd-manual is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876181" version="1" comment="httpd-tools is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876182" version="1" comment="mod_ldap is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876183" version="1" comment="mod_proxy_html is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876184" version="1" comment="mod_session is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876185" version="1" comment="mod_ssl is &lt;2.4.37-65.module+el8.10.0+22069+b47f5c72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877785" version="1" comment="freeradius is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877786" version="1" comment="freeradius-devel is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877787" version="1" comment="freeradius-doc is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877788" version="1" comment="freeradius-krb5 is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877789" version="1" comment="freeradius-ldap is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877790" version="1" comment="freeradius-mysql is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877791" version="1" comment="freeradius-perl is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877792" version="1" comment="freeradius-postgresql is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877793" version="1" comment="freeradius-rest is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877794" version="1" comment="freeradius-sqlite is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877795" version="1" comment="freeradius-unixODBC is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877796" version="1" comment="freeradius-utils is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877797" version="1" comment="python3-freeradius is &lt;3.0.20-15.module+el8.10.0+22065+aa3d48ca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879078" version="1" comment="libtiff is &lt;4.0.9-32.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879079" version="1" comment="libtiff-devel is &lt;4.0.9-32.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879080" version="1" comment="libtiff-tools is &lt;4.0.9-32.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879081" version="1" comment="bpftool is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879082" version="1" comment="kernel is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879083" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.16.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879084" version="1" comment="kernel-core is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879085" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879086" version="1" comment="kernel-debug is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879087" version="1" comment="kernel-debug-core is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879089" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879090" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879092" version="1" comment="kernel-doc is &lt;4.18.0-553.16.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879093" version="1" comment="kernel-headers is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879094" version="1" comment="kernel-modules is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879095" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879096" version="1" comment="kernel-tools is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879097" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879099" version="1" comment="perf is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879100" version="1" comment="python3-perf is &lt;4.18.0-553.16.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879101" version="1" comment="httpd is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879102" version="1" comment="httpd-devel is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879103" version="1" comment="httpd-filesystem is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879104" version="1" comment="httpd-manual is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879105" version="1" comment="httpd-tools is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879106" version="1" comment="mod_ldap is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879107" version="1" comment="mod_proxy_html is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879108" version="1" comment="mod_session is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879109" version="1" comment="mod_ssl is &lt;2.4.37-65.module+el8.10.0+22196+d82931da.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879589" version="1" comment="aardvark-dns is &lt;1.10.0-1.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879590" version="1" comment="buildah is &lt;1.33.8-4.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879591" version="1" comment="buildah-tests is &lt;1.33.8-4.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879592" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+22202+761b9a65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879593" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879594" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+22202+761b9a65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879595" version="1" comment="containernetworking-plugins is &lt;1.4.0-5.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879596" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879597" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879598" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879599" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879600" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879601" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879602" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879603" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879604" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879605" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879606" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879607" version="1" comment="podman is &lt;4.9.4-12.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879608" version="1" comment="podman-catatonit is &lt;4.9.4-12.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879609" version="1" comment="podman-docker is &lt;4.9.4-12.module+el8.10.0+22202+761b9a65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879610" version="1" comment="podman-gvproxy is &lt;4.9.4-12.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879611" version="1" comment="podman-plugins is &lt;4.9.4-12.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879612" version="1" comment="podman-remote is &lt;4.9.4-12.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879613" version="1" comment="podman-tests is &lt;4.9.4-12.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879614" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879615" version="1" comment="python3-podman is &lt;4.9.0-2.module+el8.10.0+22202+761b9a65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879616" version="1" comment="runc is &lt;1.1.12-4.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879617" version="1" comment="skopeo is &lt;1.14.5-3.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879618" version="1" comment="skopeo-tests is &lt;1.14.5-3.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879619" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879620" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879621" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+22202+761b9a65 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879622" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+22202+761b9a65 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881234" version="1" comment="cjose is &lt;0.6.1-4.module+el8.10.0+21813+b5444eb8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881235" version="1" comment="cjose-devel is &lt;0.6.1-4.module+el8.10.0+21813+b5444eb8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881236" version="1" comment="mod_auth_openidc is &lt;2.4.9.4-6.module+el8.10.0+21813+b5444eb8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881327" version="1" comment="grafana is &lt;9.2.10-17.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881328" version="1" comment="grafana-selinux is &lt;9.2.10-17.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881329" version="1" comment="jose is &lt;10-2.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881330" version="1" comment="libjose is &lt;10-2.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881331" version="1" comment="libjose-devel is &lt;10-2.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881237" version="1" comment="edk2-ovmf is &lt;20220126gitbb1bba3d77-13.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881332" version="1" comment="gnome-shell is &lt;3.32.2-56.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881333" version="1" comment="wget is &lt;1.19.5-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881334" version="1" comment="poppler is &lt;20.11.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881335" version="1" comment="poppler-cpp is &lt;20.11.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881336" version="1" comment="poppler-cpp-devel is &lt;20.11.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881337" version="1" comment="poppler-devel is &lt;20.11.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881338" version="1" comment="poppler-glib is &lt;20.11.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881339" version="1" comment="poppler-glib-devel is &lt;20.11.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881340" version="1" comment="poppler-glib-doc is &lt;20.11.0-12.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881341" version="1" comment="poppler-qt5 is &lt;20.11.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881342" version="1" comment="poppler-qt5-devel is &lt;20.11.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881343" version="1" comment="poppler-utils is &lt;20.11.0-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881344" version="1" comment="orc is &lt;0.4.28-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881345" version="1" comment="orc-compiler is &lt;0.4.28-4.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881346" version="1" comment="orc-devel is &lt;0.4.28-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881347" version="1" comment="python3-urllib3 is &lt;1.24.2-8.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881348" version="1" comment="krb5-devel is &lt;1.18.2-29.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881349" version="1" comment="krb5-libs is &lt;1.18.2-29.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881350" version="1" comment="krb5-pkinit is &lt;1.18.2-29.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881351" version="1" comment="krb5-server is &lt;1.18.2-29.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881352" version="1" comment="krb5-server-ldap is &lt;1.18.2-29.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881353" version="1" comment="krb5-workstation is &lt;1.18.2-29.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881354" version="1" comment="libkadm5 is &lt;1.18.2-29.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881355" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881356" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881357" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881358" version="1" comment="dotnet is &lt;8.0.108-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881359" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881360" version="1" comment="dotnet-host is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881361" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881362" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881363" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881364" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.108-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881365" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.108-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881366" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.108-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881367" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.8-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881368" version="1" comment="dotnet-templates-8.0 is &lt;8.0.108-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881369" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.108-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943026" version="1" comment="pcs is &lt;0.10.18-2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943027" version="1" comment="pcs-snmp is &lt;0.10.18-2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880813" version="1" comment="bind9.16 is &lt;9.16.23-0.22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880814" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880815" version="1" comment="bind9.16-devel is &lt;9.16.23-0.22.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880816" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880817" version="1" comment="bind9.16-doc is &lt;9.16.23-0.22.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880818" version="1" comment="bind9.16-libs is &lt;9.16.23-0.22.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880819" version="1" comment="bind9.16-license is &lt;9.16.23-0.22.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880820" version="1" comment="bind9.16-utils is &lt;9.16.23-0.22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880821" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.22.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880857" version="1" comment="firefox is &lt;115.14.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880858" version="1" comment="thunderbird is &lt;115.14.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880210" version="1" comment="bind is &lt;9.11.36-16.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880211" version="1" comment="bind-chroot is &lt;9.11.36-16.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880212" version="1" comment="bind-devel is &lt;9.11.36-16.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880213" version="1" comment="bind-export-devel is &lt;9.11.36-16.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880214" version="1" comment="bind-export-libs is &lt;9.11.36-16.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880215" version="1" comment="bind-libs is &lt;9.11.36-16.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880216" version="1" comment="bind-libs-lite is &lt;9.11.36-16.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880217" version="1" comment="bind-license is &lt;9.11.36-16.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880218" version="1" comment="bind-lite-devel is &lt;9.11.36-16.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880219" version="1" comment="bind-pkcs11 is &lt;9.11.36-16.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880220" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-16.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880221" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-16.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880222" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-16.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880223" version="1" comment="bind-sdb is &lt;9.11.36-16.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880224" version="1" comment="bind-sdb-chroot is &lt;9.11.36-16.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880225" version="1" comment="bind-utils is &lt;9.11.36-16.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880226" version="1" comment="python3-bind is &lt;9.11.36-16.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880227" version="1" comment="platform-python-setuptools is &lt;39.2.0-8.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880228" version="1" comment="python3-setuptools is &lt;39.2.0-8.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880229" version="1" comment="python3-setuptools-wheel is &lt;39.2.0-8.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880230" version="1" comment="python3.12-setuptools is &lt;68.2.2-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880231" version="1" comment="python3.12-setuptools-wheel is &lt;68.2.2-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880232" version="1" comment="python3.11-setuptools is &lt;65.5.1-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880233" version="1" comment="python3.11-setuptools-wheel is &lt;65.5.1-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880859" version="1" comment="curl is &lt;7.61.1-34.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880860" version="1" comment="libcurl is &lt;7.61.1-34.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880861" version="1" comment="libcurl-devel is &lt;7.61.1-34.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880862" version="1" comment="libcurl-minimal is &lt;7.61.1-34.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880863" version="1" comment="tomcat is &lt;9.0.87-1.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880864" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880865" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880866" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880867" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880868" version="1" comment="tomcat-lib is &lt;9.0.87-1.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880869" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880870" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881238" version="1" comment="nodejs is &lt;20.16.0-1.module+el8.10.0+22203+a88c8310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881239" version="1" comment="nodejs-devel is &lt;20.16.0-1.module+el8.10.0+22203+a88c8310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881240" version="1" comment="nodejs-docs is &lt;20.16.0-1.module+el8.10.0+22203+a88c8310 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881241" version="1" comment="nodejs-full-i18n is &lt;20.16.0-1.module+el8.10.0+22203+a88c8310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881242" version="1" comment="npm is &lt;10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881423" version="1" comment="pg_repack is &lt;1.4.8-1.module+el8.10.0+20413+d8116364 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881426" version="1" comment="postgresql is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881427" version="1" comment="postgresql-contrib is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881428" version="1" comment="postgresql-docs is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881429" version="1" comment="postgresql-plperl is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881430" version="1" comment="postgresql-plpython3 is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881431" version="1" comment="postgresql-pltcl is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881432" version="1" comment="postgresql-private-devel is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881433" version="1" comment="postgresql-private-libs is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881434" version="1" comment="postgresql-server is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881435" version="1" comment="postgresql-server-devel is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881436" version="1" comment="postgresql-static is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881437" version="1" comment="postgresql-test is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881438" version="1" comment="postgresql-test-rpm-macros is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881439" version="1" comment="postgresql-upgrade is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881440" version="1" comment="postgresql-upgrade-devel is &lt;16.4-1.module+el8.10.0+22209+060d7a0a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881441" version="1" comment="libvpx is &lt;1.7.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881442" version="1" comment="libvpx-devel is &lt;1.7.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940502" version="1" comment="nodejs is &lt;18.20.4-1.module+el8.10.0+22199+56ea0ead for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940503" version="1" comment="nodejs-devel is &lt;18.20.4-1.module+el8.10.0+22199+56ea0ead for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940504" version="1" comment="nodejs-docs is &lt;18.20.4-1.module+el8.10.0+22199+56ea0ead for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940505" version="1" comment="nodejs-full-i18n is &lt;18.20.4-1.module+el8.10.0+22199+56ea0ead for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940506" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+21159+f5a7145d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940507" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.9.0+19439+7b18b275 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940508" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.9.0+19439+7b18b275 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940509" version="1" comment="npm is &lt;10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942163" version="1" comment="fence-agents-aliyun is &lt;4.2.1-129.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942164" version="1" comment="fence-agents-all is &lt;4.2.1-129.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942165" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942166" version="1" comment="fence-agents-apc is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942167" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942168" version="1" comment="fence-agents-aws is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942169" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942170" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942171" version="1" comment="fence-agents-brocade is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942172" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942173" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942174" version="1" comment="fence-agents-common is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942175" version="1" comment="fence-agents-compute is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942176" version="1" comment="fence-agents-drac5 is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942177" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942178" version="1" comment="fence-agents-emerson is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942179" version="1" comment="fence-agents-eps is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942180" version="1" comment="fence-agents-gce is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942181" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942182" version="1" comment="fence-agents-hpblade is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942183" version="1" comment="fence-agents-ibm-powervs is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942184" version="1" comment="fence-agents-ibm-vpc is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942185" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942186" version="1" comment="fence-agents-ifmib is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942187" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942188" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942189" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942190" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942191" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942192" version="1" comment="fence-agents-ipdu is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942193" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942194" version="1" comment="fence-agents-kdump is &lt;4.2.1-129.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942195" version="1" comment="fence-agents-kubevirt is &lt;4.2.1-129.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942196" version="1" comment="fence-agents-lpar is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942197" version="1" comment="fence-agents-mpath is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942198" version="1" comment="fence-agents-openstack is &lt;4.2.1-129.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942199" version="1" comment="fence-agents-redfish is &lt;4.2.1-129.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942200" version="1" comment="fence-agents-rhevm is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942201" version="1" comment="fence-agents-rsa is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942202" version="1" comment="fence-agents-rsb is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942203" version="1" comment="fence-agents-sbd is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942204" version="1" comment="fence-agents-scsi is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942205" version="1" comment="fence-agents-virsh is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942206" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942207" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942208" version="1" comment="fence-agents-wti is &lt;4.2.1-129.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942209" version="1" comment="resource-agents is &lt;4.9.0-54.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942210" version="1" comment="resource-agents-aliyun is &lt;4.9.0-54.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942211" version="1" comment="resource-agents-gcp is &lt;4.9.0-54.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942212" version="1" comment="resource-agents-paf is &lt;4.9.0-54.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941414" version="1" comment="bubblewrap is &lt;0.4.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941415" version="1" comment="flatpak is &lt;1.12.9-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941416" version="1" comment="flatpak-devel is &lt;1.12.9-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941417" version="1" comment="flatpak-libs is &lt;1.12.9-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941418" version="1" comment="flatpak-selinux is &lt;1.12.9-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941419" version="1" comment="flatpak-session-helper is &lt;1.12.9-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942213" version="1" comment="389-ds-base is &lt;1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942214" version="1" comment="389-ds-base-devel is &lt;1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942215" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942216" version="1" comment="389-ds-base-libs is &lt;1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942217" version="1" comment="389-ds-base-snmp is &lt;1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942218" version="1" comment="python3-lib389 is &lt;1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943404" version="1" comment="pcs is &lt;0.10.18-2.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943405" version="1" comment="pcs-snmp is &lt;0.10.18-2.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944937" version="1" comment="firefox is &lt;128.2.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944785" version="1" comment="thunderbird is &lt;128.2.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943406" version="1" comment="ruby is &lt;3.3.5-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943407" version="1" comment="ruby-bundled-gems is &lt;3.3.5-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943408" version="1" comment="ruby-default-gems is &lt;3.3.5-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943409" version="1" comment="ruby-devel is &lt;3.3.5-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943410" version="1" comment="ruby-doc is &lt;3.3.5-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943411" version="1" comment="ruby-libs is &lt;3.3.5-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943412" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943413" version="1" comment="rubygem-bundler is &lt;2.5.16-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943414" version="1" comment="rubygem-io-console is &lt;0.7.1-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943415" version="1" comment="rubygem-irb is &lt;1.13.1-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943416" version="1" comment="rubygem-json is &lt;2.7.1-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943417" version="1" comment="rubygem-minitest is &lt;5.20.0-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943418" version="1" comment="rubygem-power_assert is &lt;2.0.3-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943419" version="1" comment="rubygem-psych is &lt;5.1.2-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943420" version="1" comment="rubygem-racc is &lt;1.7.3-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943421" version="1" comment="rubygem-rake is &lt;13.1.0-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943422" version="1" comment="rubygem-rbs is &lt;3.4.0-3.module+el8.10.0+22271+6a48b0b9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943423" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943424" version="1" comment="rubygem-rexml is &lt;3.3.6-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943425" version="1" comment="rubygem-rss is &lt;0.3.1-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943426" version="1" comment="rubygem-test-unit is &lt;3.6.1-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943427" version="1" comment="rubygem-typeprof is &lt;0.21.9-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943428" version="1" comment="rubygems is &lt;3.5.16-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943429" version="1" comment="rubygems-devel is &lt;3.5.16-3.module+el8.10.0+22271+6a48b0b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943719" version="1" comment="pcp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943720" version="1" comment="pcp-conf is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943721" version="1" comment="pcp-devel is &lt;5.3.7-22.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943722" version="1" comment="pcp-doc is &lt;5.3.7-22.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943723" version="1" comment="pcp-export-pcp2elasticsearch is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943724" version="1" comment="pcp-export-pcp2graphite is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943725" version="1" comment="pcp-export-pcp2influxdb is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943726" version="1" comment="pcp-export-pcp2json is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943727" version="1" comment="pcp-export-pcp2spark is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943728" version="1" comment="pcp-export-pcp2xml is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943729" version="1" comment="pcp-export-pcp2zabbix is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943730" version="1" comment="pcp-export-zabbix-agent is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943731" version="1" comment="pcp-gui is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943732" version="1" comment="pcp-import-collectl2pcp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943733" version="1" comment="pcp-import-ganglia2pcp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943734" version="1" comment="pcp-import-iostat2pcp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943735" version="1" comment="pcp-import-mrtg2pcp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943736" version="1" comment="pcp-import-sar2pcp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943737" version="1" comment="pcp-libs is &lt;5.3.7-22.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943738" version="1" comment="pcp-libs-devel is &lt;5.3.7-22.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943739" version="1" comment="pcp-pmda-activemq is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943740" version="1" comment="pcp-pmda-apache is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943741" version="1" comment="pcp-pmda-bash is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943742" version="1" comment="pcp-pmda-bcc is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943743" version="1" comment="pcp-pmda-bind2 is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943744" version="1" comment="pcp-pmda-bonding is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943745" version="1" comment="pcp-pmda-bpftrace is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943746" version="1" comment="pcp-pmda-cifs is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943747" version="1" comment="pcp-pmda-cisco is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943748" version="1" comment="pcp-pmda-dbping is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943749" version="1" comment="pcp-pmda-denki is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943750" version="1" comment="pcp-pmda-dm is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943751" version="1" comment="pcp-pmda-docker is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943752" version="1" comment="pcp-pmda-ds389 is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943753" version="1" comment="pcp-pmda-ds389log is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943754" version="1" comment="pcp-pmda-elasticsearch is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943755" version="1" comment="pcp-pmda-gfs2 is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943756" version="1" comment="pcp-pmda-gluster is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943757" version="1" comment="pcp-pmda-gpfs is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943758" version="1" comment="pcp-pmda-gpsd is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943759" version="1" comment="pcp-pmda-hacluster is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943760" version="1" comment="pcp-pmda-haproxy is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943761" version="1" comment="pcp-pmda-infiniband is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943762" version="1" comment="pcp-pmda-json is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943763" version="1" comment="pcp-pmda-libvirt is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943764" version="1" comment="pcp-pmda-lio is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943765" version="1" comment="pcp-pmda-lmsensors is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943766" version="1" comment="pcp-pmda-logger is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943767" version="1" comment="pcp-pmda-lustre is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943768" version="1" comment="pcp-pmda-lustrecomm is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943769" version="1" comment="pcp-pmda-mailq is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943770" version="1" comment="pcp-pmda-memcache is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943771" version="1" comment="pcp-pmda-mic is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943772" version="1" comment="pcp-pmda-mongodb is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943773" version="1" comment="pcp-pmda-mounts is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943774" version="1" comment="pcp-pmda-mssql is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943775" version="1" comment="pcp-pmda-mysql is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943776" version="1" comment="pcp-pmda-named is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943777" version="1" comment="pcp-pmda-netcheck is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943778" version="1" comment="pcp-pmda-netfilter is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943779" version="1" comment="pcp-pmda-news is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943780" version="1" comment="pcp-pmda-nfsclient is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943781" version="1" comment="pcp-pmda-nginx is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943782" version="1" comment="pcp-pmda-nvidia-gpu is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943783" version="1" comment="pcp-pmda-openmetrics is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943784" version="1" comment="pcp-pmda-openvswitch is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943785" version="1" comment="pcp-pmda-oracle is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943786" version="1" comment="pcp-pmda-pdns is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943787" version="1" comment="pcp-pmda-perfevent is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943788" version="1" comment="pcp-pmda-podman is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943789" version="1" comment="pcp-pmda-postfix is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943790" version="1" comment="pcp-pmda-postgresql is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943791" version="1" comment="pcp-pmda-rabbitmq is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943792" version="1" comment="pcp-pmda-redis is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943793" version="1" comment="pcp-pmda-roomtemp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943794" version="1" comment="pcp-pmda-rsyslog is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943795" version="1" comment="pcp-pmda-samba is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943796" version="1" comment="pcp-pmda-sendmail is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943797" version="1" comment="pcp-pmda-shping is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943798" version="1" comment="pcp-pmda-slurm is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943799" version="1" comment="pcp-pmda-smart is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943800" version="1" comment="pcp-pmda-snmp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943801" version="1" comment="pcp-pmda-sockets is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943802" version="1" comment="pcp-pmda-statsd is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943803" version="1" comment="pcp-pmda-summary is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943804" version="1" comment="pcp-pmda-systemd is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943805" version="1" comment="pcp-pmda-trace is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943806" version="1" comment="pcp-pmda-unbound is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943807" version="1" comment="pcp-pmda-weblog is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943808" version="1" comment="pcp-pmda-zimbra is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943809" version="1" comment="pcp-pmda-zswap is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943810" version="1" comment="pcp-selinux is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943811" version="1" comment="pcp-system-tools is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943812" version="1" comment="pcp-zeroconf is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943813" version="1" comment="perl-PCP-LogImport is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943814" version="1" comment="perl-PCP-LogSummary is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943815" version="1" comment="perl-PCP-MMV is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943816" version="1" comment="perl-PCP-PMDA is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943817" version="1" comment="python3-pcp is &lt;5.3.7-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944938" version="1" comment="delve is &lt;1.21.2-4.module+el8.10.0+22329+6cd5c9c6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944939" version="1" comment="go-toolset is &lt;1.21.13-1.module+el8.10.0+22329+6cd5c9c6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944940" version="1" comment="golang is &lt;1.21.13-2.module+el8.10.0+22329+6cd5c9c6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944941" version="1" comment="golang-bin is &lt;1.21.13-2.module+el8.10.0+22329+6cd5c9c6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944942" version="1" comment="golang-docs is &lt;1.21.13-2.module+el8.10.0+22329+6cd5c9c6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944943" version="1" comment="golang-misc is &lt;1.21.13-2.module+el8.10.0+22329+6cd5c9c6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944944" version="1" comment="golang-src is &lt;1.21.13-2.module+el8.10.0+22329+6cd5c9c6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944945" version="1" comment="golang-tests is &lt;1.21.13-2.module+el8.10.0+22329+6cd5c9c6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944430" version="1" comment="python3.12 is &lt;3.12.5-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944431" version="1" comment="python3.12-debug is &lt;3.12.5-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944432" version="1" comment="python3.12-devel is &lt;3.12.5-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944433" version="1" comment="python3.12-idle is &lt;3.12.5-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944434" version="1" comment="python3.12-libs is &lt;3.12.5-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944435" version="1" comment="python3.12-rpm-macros is &lt;3.12.5-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944436" version="1" comment="python3.12-test is &lt;3.12.5-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944437" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944438" version="1" comment="python3.11 is &lt;3.11.9-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944439" version="1" comment="python3.11-debug is &lt;3.11.9-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944440" version="1" comment="python3.11-devel is &lt;3.11.9-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944441" version="1" comment="python3.11-idle is &lt;3.11.9-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944442" version="1" comment="python3.11-libs is &lt;3.11.9-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944443" version="1" comment="python3.11-rpm-macros is &lt;3.11.9-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944444" version="1" comment="python3.11-test is &lt;3.11.9-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944445" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944446" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944447" version="1" comment="gtk3 is &lt;3.22.30-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944448" version="1" comment="gtk3-devel is &lt;3.22.30-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944449" version="1" comment="gtk3-devel-docs is &lt;3.22.30-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944450" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944946" version="1" comment="aardvark-dns is &lt;1.10.0-1.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944947" version="1" comment="buildah is &lt;1.33.8-4.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944948" version="1" comment="buildah-tests is &lt;1.33.8-4.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944949" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+22283+6d6d094a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944950" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944951" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+22283+6d6d094a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944952" version="1" comment="containernetworking-plugins is &lt;1.4.0-5.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944953" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944954" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944955" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944956" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944957" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944958" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944959" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944960" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944961" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944962" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944963" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944964" version="1" comment="podman is &lt;4.9.4-13.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944965" version="1" comment="podman-catatonit is &lt;4.9.4-13.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944966" version="1" comment="podman-docker is &lt;4.9.4-13.module+el8.10.0+22283+6d6d094a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944967" version="1" comment="podman-gvproxy is &lt;4.9.4-13.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944968" version="1" comment="podman-plugins is &lt;4.9.4-13.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944969" version="1" comment="podman-remote is &lt;4.9.4-13.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944970" version="1" comment="podman-tests is &lt;4.9.4-13.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944971" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944972" version="1" comment="python3-podman is &lt;4.9.0-2.module+el8.10.0+22283+6d6d094a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944973" version="1" comment="runc is &lt;1.1.12-4.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944974" version="1" comment="skopeo is &lt;1.14.5-3.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944975" version="1" comment="skopeo-tests is &lt;1.14.5-3.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944976" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944977" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944978" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+22283+6d6d094a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944979" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+22283+6d6d094a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944451" version="1" comment="dovecot is &lt;2.3.16-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944452" version="1" comment="dovecot-devel is &lt;2.3.16-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944453" version="1" comment="dovecot-mysql is &lt;2.3.16-6.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944454" version="1" comment="dovecot-pgsql is &lt;2.3.16-6.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944455" version="1" comment="dovecot-pigeonhole is &lt;2.3.16-6.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944677" version="1" comment="platform-python is &lt;3.6.8-67.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944678" version="1" comment="platform-python-debug is &lt;3.6.8-67.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944679" version="1" comment="platform-python-devel is &lt;3.6.8-67.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944680" version="1" comment="python3-idle is &lt;3.6.8-67.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944681" version="1" comment="python3-libs is &lt;3.6.8-67.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944682" version="1" comment="python3-test is &lt;3.6.8-67.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944683" version="1" comment="python3-tkinter is &lt;3.6.8-67.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944456" version="1" comment="nano is &lt;2.9.8-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944786" version="1" comment="emacs is &lt;26.1-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944787" version="1" comment="emacs-common is &lt;26.1-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944788" version="1" comment="emacs-filesystem is &lt;26.1-12.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944789" version="1" comment="emacs-lucid is &lt;26.1-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944790" version="1" comment="emacs-nox is &lt;26.1-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944791" version="1" comment="emacs-terminal is &lt;26.1-12.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944457" version="1" comment="expat is &lt;2.2.5-15.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944458" version="1" comment="expat-devel is &lt;2.2.5-15.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944980" version="1" comment="bpftool is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944981" version="1" comment="kernel is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944982" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.22.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944983" version="1" comment="kernel-core is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944984" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944985" version="1" comment="kernel-debug is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944986" version="1" comment="kernel-debug-core is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944988" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944989" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944991" version="1" comment="kernel-doc is &lt;4.18.0-553.22.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944992" version="1" comment="kernel-headers is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944993" version="1" comment="kernel-modules is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944994" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944995" version="1" comment="kernel-tools is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944996" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944998" version="1" comment="perf is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944999" version="1" comment="python3-perf is &lt;4.18.0-553.22.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944792" version="1" comment="git-lfs is &lt;3.4.1-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945281" version="1" comment="grafana is &lt;9.2.10-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945282" version="1" comment="grafana-selinux is &lt;9.2.10-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945391" version="1" comment="cups-filters is &lt;1.20.0-35.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945392" version="1" comment="cups-filters-devel is &lt;1.20.0-35.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945393" version="1" comment="cups-filters-libs is &lt;1.20.0-35.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945394" version="1" comment="iwl100-firmware is &lt;39.31.5.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945395" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945396" version="1" comment="iwl105-firmware is &lt;18.168.6.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945397" version="1" comment="iwl135-firmware is &lt;18.168.6.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945398" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945399" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945400" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945401" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945402" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945403" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945404" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945405" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945406" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945407" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945408" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945409" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-124.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945410" version="1" comment="libertas-sd8686-firmware is &lt;20240827-124.git3cff7109.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945411" version="1" comment="libertas-sd8787-firmware is &lt;20240827-124.git3cff7109.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945412" version="1" comment="libertas-usb8388-firmware is &lt;20240827-124.git3cff7109.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945413" version="1" comment="libertas-usb8388-olpc-firmware is &lt;20240827-124.git3cff7109.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945414" version="1" comment="linux-firmware is &lt;20240827-124.git3cff7109.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945472" version="1" comment="golang is &lt;1.21.13-3.module+el8.10.0+22345+acdd8d0e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945473" version="1" comment="golang-bin is &lt;1.21.13-3.module+el8.10.0+22345+acdd8d0e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945474" version="1" comment="golang-docs is &lt;1.21.13-3.module+el8.10.0+22345+acdd8d0e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945475" version="1" comment="golang-misc is &lt;1.21.13-3.module+el8.10.0+22345+acdd8d0e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945476" version="1" comment="golang-src is &lt;1.21.13-3.module+el8.10.0+22345+acdd8d0e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945477" version="1" comment="golang-tests is &lt;1.21.13-3.module+el8.10.0+22345+acdd8d0e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945818" version="1" comment="thunderbird is &lt;128.3.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945819" version="1" comment="firefox is &lt;128.3.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946421" version="1" comment="openssl is &lt;1.1.1k-14.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946422" version="1" comment="openssl-devel is &lt;1.1.1k-14.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946423" version="1" comment="openssl-libs is &lt;1.1.1k-14.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946424" version="1" comment="openssl-perl is &lt;1.1.1k-14.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946425" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.35-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946426" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.35-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946427" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.35-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946428" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.35-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946429" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.35-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946430" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.135-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946431" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.135-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946432" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.35-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946433" version="1" comment="dotnet-templates-6.0 is &lt;6.0.135-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946434" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946435" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946436" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946437" version="1" comment="dotnet is &lt;8.0.110-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946438" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946439" version="1" comment="dotnet-host is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946440" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946441" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946442" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946443" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.110-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946444" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.110-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946445" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.110-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946446" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946447" version="1" comment="dotnet-templates-8.0 is &lt;8.0.110-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946448" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.110-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947294" version="1" comment="firefox is &lt;128.3.1-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947301" version="1" comment="thunderbird is &lt;128.3.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947302" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947303" version="1" comment="buildah is &lt;1.33.8-4.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947304" version="1" comment="buildah-tests is &lt;1.33.8-4.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947305" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+22346+28c02849 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947306" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947307" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+22346+28c02849 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947308" version="1" comment="containernetworking-plugins is &lt;1.4.0-5.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947309" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947310" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947311" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947312" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947313" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947314" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947315" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947316" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947317" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947318" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947319" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947320" version="1" comment="podman is &lt;4.9.4-13.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947321" version="1" comment="podman-catatonit is &lt;4.9.4-13.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947322" version="1" comment="podman-docker is &lt;4.9.4-13.module+el8.10.0+22346+28c02849 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947323" version="1" comment="podman-gvproxy is &lt;4.9.4-13.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947324" version="1" comment="podman-plugins is &lt;4.9.4-13.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947325" version="1" comment="podman-remote is &lt;4.9.4-13.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947326" version="1" comment="podman-tests is &lt;4.9.4-13.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947327" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947328" version="1" comment="python3-podman is &lt;4.9.0-2.module+el8.10.0+22346+28c02849 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947329" version="1" comment="runc is &lt;1.1.12-5.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947330" version="1" comment="skopeo is &lt;1.14.5-3.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947331" version="1" comment="skopeo-tests is &lt;1.14.5-3.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947332" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947333" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947334" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+22346+28c02849 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947335" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+22346+28c02849 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947853" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947854" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947855" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947856" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947857" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947858" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947859" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947860" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947861" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947862" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947863" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947864" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947865" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947866" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947867" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.432.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947868" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.432.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947869" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947870" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947871" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947872" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947743" version="1" comment="java-11-openjdk is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947744" version="1" comment="java-11-openjdk-demo is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947745" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947746" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947747" version="1" comment="java-11-openjdk-devel is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947748" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947749" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947750" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947751" version="1" comment="java-11-openjdk-headless is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947752" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947753" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947754" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947755" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947756" version="1" comment="java-11-openjdk-jmods is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947757" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947758" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947759" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947760" version="1" comment="java-11-openjdk-src is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947761" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947762" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947763" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947764" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947765" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947873" version="1" comment="java-17-openjdk is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947874" version="1" comment="java-17-openjdk-demo is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947875" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947876" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947877" version="1" comment="java-17-openjdk-devel is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947878" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947879" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947880" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947881" version="1" comment="java-17-openjdk-headless is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947882" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947883" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947884" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947885" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947886" version="1" comment="java-17-openjdk-jmods is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947887" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947888" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947889" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947890" version="1" comment="java-17-openjdk-src is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947891" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947892" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947893" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947894" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947895" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948242" version="1" comment="java-21-openjdk is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948243" version="1" comment="java-21-openjdk-demo is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948244" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948245" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948246" version="1" comment="java-21-openjdk-devel is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948247" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948248" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948249" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948250" version="1" comment="java-21-openjdk-headless is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948251" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948252" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948253" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948254" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948255" version="1" comment="java-21-openjdk-jmods is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948256" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948257" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948258" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948259" version="1" comment="java-21-openjdk-src is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948260" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948261" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948262" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948263" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948264" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948416" version="1" comment="grafana is &lt;9.2.10-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948417" version="1" comment="grafana-selinux is &lt;9.2.10-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948418" version="1" comment="NetworkManager-libreswan is &lt;1.2.10-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948419" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.10-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950851" version="1" comment="firefox is &lt;128.4.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951423" version="1" comment="thunderbird is &lt;128.4.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951223" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951224" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951225" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951226" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951227" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951228" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-17.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951229" version="1" comment="xorg-x11-server-common is &lt;1.20.11-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951230" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-25.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951231" version="1" comment="xorg-x11-server-source is &lt;1.20.11-25.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951232" version="1" comment="bpftrace is &lt;0.16.0-6.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951233" version="1" comment="bcc is &lt;0.25.0-9.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951234" version="1" comment="bcc-devel is &lt;0.25.0-9.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951235" version="1" comment="bcc-doc is &lt;0.25.0-9.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951236" version="1" comment="bcc-tools is &lt;0.25.0-9.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951237" version="1" comment="python3-bcc is &lt;0.25.0-9.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951238" version="1" comment="libtiff is &lt;4.0.9-33.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951239" version="1" comment="libtiff-devel is &lt;4.0.9-33.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951240" version="1" comment="libtiff-tools is &lt;4.0.9-33.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951241" version="1" comment="python3-gevent is &lt;1.2.2-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951242" version="1" comment="python3.12 is &lt;3.12.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951243" version="1" comment="python3.12-debug is &lt;3.12.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951244" version="1" comment="python3.12-devel is &lt;3.12.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951245" version="1" comment="python3.12-idle is &lt;3.12.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951246" version="1" comment="python3.12-libs is &lt;3.12.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951247" version="1" comment="python3.12-rpm-macros is &lt;3.12.6-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951248" version="1" comment="python3.12-test is &lt;3.12.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951249" version="1" comment="python3.12-tkinter is &lt;3.12.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951250" version="1" comment="python3.11 is &lt;3.11.10-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951251" version="1" comment="python3.11-debug is &lt;3.11.10-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951252" version="1" comment="python3.11-devel is &lt;3.11.10-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951253" version="1" comment="python3.11-idle is &lt;3.11.10-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951254" version="1" comment="python3.11-libs is &lt;3.11.10-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951255" version="1" comment="python3.11-rpm-macros is &lt;3.11.10-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951256" version="1" comment="python3.11-test is &lt;3.11.10-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951257" version="1" comment="python3.11-tkinter is &lt;3.11.10-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951258" version="1" comment="python3.12-urllib3 is &lt;1.26.19-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951424" version="1" comment="python3.11-urllib3 is &lt;1.26.12-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951259" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951260" version="1" comment="buildah is &lt;1.33.10-1.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951261" version="1" comment="buildah-tests is &lt;1.33.10-1.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951262" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+22397+e3c95ba6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951263" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951264" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+22397+e3c95ba6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951265" version="1" comment="containernetworking-plugins is &lt;1.4.0-5.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951266" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951267" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951268" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951269" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951270" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951271" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951272" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951273" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951274" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951275" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951276" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951277" version="1" comment="podman is &lt;4.9.4-15.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951278" version="1" comment="podman-catatonit is &lt;4.9.4-15.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951279" version="1" comment="podman-docker is &lt;4.9.4-15.module+el8.10.0+22397+e3c95ba6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951280" version="1" comment="podman-gvproxy is &lt;4.9.4-15.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951281" version="1" comment="podman-plugins is &lt;4.9.4-15.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951282" version="1" comment="podman-remote is &lt;4.9.4-15.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951283" version="1" comment="podman-tests is &lt;4.9.4-15.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951284" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951285" version="1" comment="python3-podman is &lt;4.9.0-2.module+el8.10.0+22397+e3c95ba6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951286" version="1" comment="runc is &lt;1.1.12-5.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951287" version="1" comment="skopeo is &lt;1.14.5-3.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951288" version="1" comment="skopeo-tests is &lt;1.14.5-3.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951289" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951290" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951291" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+22397+e3c95ba6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951292" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+22397+e3c95ba6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951293" version="1" comment="grafana-pcp is &lt;5.1.1-9.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951294" version="1" comment="haproxy is &lt;1.8.27-5.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951295" version="1" comment="bpftool is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951296" version="1" comment="kernel is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951297" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.27.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951298" version="1" comment="kernel-core is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951299" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951300" version="1" comment="kernel-debug is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951301" version="1" comment="kernel-debug-core is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951303" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951304" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951306" version="1" comment="kernel-doc is &lt;4.18.0-553.27.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951307" version="1" comment="kernel-headers is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951308" version="1" comment="kernel-modules is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951309" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951310" version="1" comment="kernel-tools is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951311" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951313" version="1" comment="perf is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951314" version="1" comment="python3-perf is &lt;4.18.0-553.27.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951315" version="1" comment="xmlrpc-c is &lt;1.51.0-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951316" version="1" comment="xmlrpc-c-c++ is &lt;1.51.0-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951317" version="1" comment="xmlrpc-c-client is &lt;1.51.0-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951318" version="1" comment="xmlrpc-c-client++ is &lt;1.51.0-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951319" version="1" comment="xmlrpc-c-devel is &lt;1.51.0-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951320" version="1" comment="krb5-devel is &lt;1.18.2-30.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951321" version="1" comment="krb5-libs is &lt;1.18.2-30.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951322" version="1" comment="krb5-pkinit is &lt;1.18.2-30.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951323" version="1" comment="krb5-server is &lt;1.18.2-30.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951324" version="1" comment="krb5-server-ldap is &lt;1.18.2-30.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951325" version="1" comment="krb5-workstation is &lt;1.18.2-30.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951326" version="1" comment="libkadm5 is &lt;1.18.2-30.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951327" version="1" comment="delve is &lt;1.22.1-1.module+el8.10.0+22223+9d99ca85 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951328" version="1" comment="go-toolset is &lt;1.22.7-1.module+el8.10.0+22328+683b6a23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951329" version="1" comment="golang is &lt;1.22.7-1.module+el8.10.0+22325+dc584f75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951330" version="1" comment="golang-bin is &lt;1.22.7-1.module+el8.10.0+22325+dc584f75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951331" version="1" comment="golang-docs is &lt;1.22.7-1.module+el8.10.0+22325+dc584f75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951332" version="1" comment="golang-misc is &lt;1.22.7-1.module+el8.10.0+22325+dc584f75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951333" version="1" comment="golang-src is &lt;1.22.7-1.module+el8.10.0+22325+dc584f75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951334" version="1" comment="golang-tests is &lt;1.22.7-1.module+el8.10.0+22325+dc584f75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951335" version="1" comment="bzip2 is &lt;1.0.6-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951336" version="1" comment="bzip2-devel is &lt;1.0.6-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951337" version="1" comment="bzip2-libs is &lt;1.0.6-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951959" version="1" comment="gstreamer1-plugins-base is &lt;1.16.1-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951960" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.16.1-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952001" version="1" comment="expat is &lt;2.2.5-16.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952002" version="1" comment="expat-devel is &lt;2.2.5-16.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952074" version="1" comment="tigervnc is &lt;1.13.1-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952075" version="1" comment="tigervnc-icons is &lt;1.13.1-14.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952076" version="1" comment="tigervnc-license is &lt;1.13.1-14.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952077" version="1" comment="tigervnc-selinux is &lt;1.13.1-14.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952078" version="1" comment="tigervnc-server is &lt;1.13.1-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952079" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952080" version="1" comment="tigervnc-server-module is &lt;1.13.1-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953520" version="1" comment="libsoup is &lt;2.62.3-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953521" version="1" comment="libsoup-devel is &lt;2.62.3-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952385" version="1" comment="webkit2gtk3 is &lt;2.46.3-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952386" version="1" comment="webkit2gtk3-devel is &lt;2.46.3-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952387" version="1" comment="webkit2gtk3-jsc is &lt;2.46.3-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952388" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.3-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955014" version="1" comment="squid is &lt;4.15-10.module+el8.10.0+22489+b920747d.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952389" version="1" comment="binutils is &lt;2.30-125.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952390" version="1" comment="binutils-devel is &lt;2.30-125.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959053" version="1" comment="python3-requests is &lt;2.20.0-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959302" version="1" comment="bpftool is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959303" version="1" comment="kernel is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959304" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.34.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959305" version="1" comment="kernel-core is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959306" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959307" version="1" comment="kernel-debug is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959308" version="1" comment="kernel-debug-core is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959310" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959311" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959313" version="1" comment="kernel-doc is &lt;4.18.0-553.34.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959314" version="1" comment="kernel-headers is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959315" version="1" comment="kernel-modules is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959316" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959317" version="1" comment="kernel-tools is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959318" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959320" version="1" comment="perf is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959321" version="1" comment="python3-perf is &lt;4.18.0-553.34.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959704" version="1" comment="cups is &lt;2.2.6-62.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959705" version="1" comment="cups-client is &lt;2.2.6-62.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959706" version="1" comment="cups-devel is &lt;2.2.6-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959707" version="1" comment="cups-filesystem is &lt;2.2.6-62.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959708" version="1" comment="cups-ipptool is &lt;2.2.6-62.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959709" version="1" comment="cups-libs is &lt;2.2.6-62.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959710" version="1" comment="cups-lpd is &lt;2.2.6-62.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960004" version="1" comment="firefox is &lt;128.6.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959711" version="1" comment="webkit2gtk3 is &lt;2.46.5-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959712" version="1" comment="webkit2gtk3-devel is &lt;2.46.5-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959713" version="1" comment="webkit2gtk3-jsc is &lt;2.46.5-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959714" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.5-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959715" version="1" comment="iperf3 is &lt;3.5-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959716" version="1" comment="dpdk is &lt;23.11-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959717" version="1" comment="dpdk-devel is &lt;23.11-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959718" version="1" comment="dpdk-doc is &lt;23.11-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959719" version="1" comment="dpdk-tools is &lt;23.11-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960123" version="1" comment="thunderbird is &lt;128.6.0-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960069" version="1" comment="NetworkManager is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960070" version="1" comment="NetworkManager-adsl is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960071" version="1" comment="NetworkManager-bluetooth is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960072" version="1" comment="NetworkManager-cloud-setup is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960073" version="1" comment="NetworkManager-config-connectivity-suse is &lt;1.40.16-18.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960074" version="1" comment="NetworkManager-config-server is &lt;1.40.16-18.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960075" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.40.16-18.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960076" version="1" comment="NetworkManager-initscripts-updown is &lt;1.40.16-18.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960077" version="1" comment="NetworkManager-libnm is &lt;1.40.16-18.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960078" version="1" comment="NetworkManager-libnm-devel is &lt;1.40.16-18.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960079" version="1" comment="NetworkManager-ovs is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960080" version="1" comment="NetworkManager-ppp is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960081" version="1" comment="NetworkManager-team is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960082" version="1" comment="NetworkManager-tui is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960083" version="1" comment="NetworkManager-wifi is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960084" version="1" comment="NetworkManager-wwan is &lt;1.40.16-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960340" version="1" comment="raptor2 is &lt;2.0.15-17.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960341" version="1" comment="raptor2-devel is &lt;2.0.15-17.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960342" version="1" comment="rsync is &lt;3.1.3-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960343" version="1" comment="rsync-daemon is &lt;3.1.3-20.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961327" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.12-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961328" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.12-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961329" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.12-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961330" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.12-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961331" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.12-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961332" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.12-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961333" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.12-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961334" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.112-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960789" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.112-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961335" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.112-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961336" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.12-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961337" version="1" comment="dotnet-templates-8.0 is &lt;8.0.112-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961338" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961339" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961340" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961341" version="1" comment="dotnet is &lt;9.0.102-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961342" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961343" version="1" comment="dotnet-host is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961344" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961345" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961346" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961347" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.102-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960790" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.102-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961348" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.102-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961349" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.102-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961350" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961351" version="1" comment="dotnet-templates-9.0 is &lt;9.0.102-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961352" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.102-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961353" version="1" comment="grafana is &lt;9.2.10-21.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961354" version="1" comment="grafana-selinux is &lt;9.2.10-21.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961355" version="1" comment="java-17-openjdk is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961356" version="1" comment="java-17-openjdk-demo is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961357" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961358" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961359" version="1" comment="java-17-openjdk-devel is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961360" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961361" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961362" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961363" version="1" comment="java-17-openjdk-headless is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961364" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961365" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961366" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961367" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961368" version="1" comment="java-17-openjdk-jmods is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961369" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961370" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961371" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961372" version="1" comment="java-17-openjdk-src is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961373" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961374" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961375" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961376" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961377" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961378" version="1" comment="java-21-openjdk is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961379" version="1" comment="java-21-openjdk-demo is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961380" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961381" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961382" version="1" comment="java-21-openjdk-devel is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961383" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961384" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961385" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961386" version="1" comment="java-21-openjdk-headless is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961387" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961388" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961389" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961390" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961391" version="1" comment="java-21-openjdk-jmods is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961392" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961393" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961394" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961395" version="1" comment="java-21-openjdk-src is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961396" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961397" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961398" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961399" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961400" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961401" version="1" comment="redis is &lt;6.2.17-1.module+el8.10.0+22680+748527fd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961402" version="1" comment="redis-devel is &lt;6.2.17-1.module+el8.10.0+22680+748527fd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961403" version="1" comment="redis-doc is &lt;6.2.17-1.module+el8.10.0+22680+748527fd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962039" version="1" comment="python3-jinja2 is &lt;2.10.1-6.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961529" version="1" comment="bzip2 is &lt;1.0.6-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961530" version="1" comment="bzip2-devel is &lt;1.0.6-28.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961531" version="1" comment="bzip2-libs is &lt;1.0.6-28.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962580" version="1" comment="Judy is &lt;1.0.5-18.module+el8.10.0+21221+7bee72c1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962581" version="1" comment="galera is &lt;26.4.20-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962582" version="1" comment="mariadb is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962583" version="1" comment="mariadb-backup is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962584" version="1" comment="mariadb-common is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962585" version="1" comment="mariadb-devel is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962586" version="1" comment="mariadb-embedded is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962587" version="1" comment="mariadb-embedded-devel is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962588" version="1" comment="mariadb-errmsg is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962589" version="1" comment="mariadb-gssapi-server is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962590" version="1" comment="mariadb-oqgraph-engine is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962591" version="1" comment="mariadb-pam is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962592" version="1" comment="mariadb-server is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962593" version="1" comment="mariadb-server-galera is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962594" version="1" comment="mariadb-server-utils is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962595" version="1" comment="mariadb-test is &lt;10.11.10-1.module+el8.10.0+22586+3d7c2ef3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020747" version="1" comment="Judy is &lt;1.0.5-18.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020748" version="1" comment="galera is &lt;26.4.20-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020749" version="1" comment="mariadb is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020750" version="1" comment="mariadb-backup is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020751" version="1" comment="mariadb-common is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020752" version="1" comment="mariadb-devel is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020753" version="1" comment="mariadb-embedded is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020754" version="1" comment="mariadb-embedded-devel is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020755" version="1" comment="mariadb-errmsg is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020756" version="1" comment="mariadb-gssapi-server is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020757" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020758" version="1" comment="mariadb-pam is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020759" version="1" comment="mariadb-server is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020760" version="1" comment="mariadb-server-galera is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020761" version="1" comment="mariadb-server-utils is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020762" version="1" comment="mariadb-test is &lt;10.5.27-1.module+el8.10.0+22630+cacda3f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961532" version="1" comment="keepalived is &lt;2.1.5-10.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962040" version="1" comment="gimp is &lt;2.8.22-26.module+el8.10.0+22678+3f0023d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962041" version="1" comment="gimp-devel is &lt;2.8.22-26.module+el8.10.0+22678+3f0023d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962042" version="1" comment="gimp-devel-tools is &lt;2.8.22-26.module+el8.10.0+22678+3f0023d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962043" version="1" comment="gimp-libs is &lt;2.8.22-26.module+el8.10.0+22678+3f0023d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962044" version="1" comment="pygobject2 is &lt;2.28.7-5.module+el8.10.0+22676+becd68d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962045" version="1" comment="pygobject2-codegen is &lt;2.28.7-5.module+el8.10.0+22676+becd68d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962046" version="1" comment="pygobject2-devel is &lt;2.28.7-5.module+el8.10.0+22676+becd68d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962047" version="1" comment="pygobject2-doc is &lt;2.28.7-5.module+el8.10.0+22676+becd68d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962048" version="1" comment="pygtk2 is &lt;2.24.0-25.module+el8.9.0+21228+8e80d31d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962049" version="1" comment="pygtk2-codegen is &lt;2.24.0-25.module+el8.9.0+21228+8e80d31d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962050" version="1" comment="pygtk2-devel is &lt;2.24.0-25.module+el8.9.0+21228+8e80d31d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962051" version="1" comment="pygtk2-doc is &lt;2.24.0-25.module+el8.9.0+21228+8e80d31d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962052" version="1" comment="python2-cairo is &lt;1.16.3-7.module+el8.10.0+22676+becd68d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962053" version="1" comment="python2-cairo-devel is &lt;1.16.3-7.module+el8.10.0+22676+becd68d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962054" version="1" comment="python3-unbound is &lt;1.16.2-5.8.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962055" version="1" comment="unbound is &lt;1.16.2-5.8.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962056" version="1" comment="unbound-devel is &lt;1.16.2-5.8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962057" version="1" comment="unbound-libs is &lt;1.16.2-5.8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962058" version="1" comment="libsoup is &lt;2.62.3-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962059" version="1" comment="libsoup-devel is &lt;2.62.3-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962060" version="1" comment="git-lfs is &lt;3.4.1-4.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997434" version="1" comment="python3.11 is &lt;3.11.13-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997435" version="1" comment="python3.11-debug is &lt;3.11.13-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997436" version="1" comment="python3.11-devel is &lt;3.11.13-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997437" version="1" comment="python3.11-idle is &lt;3.11.13-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997438" version="1" comment="python3.11-libs is &lt;3.11.13-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997439" version="1" comment="python3.11-rpm-macros is &lt;3.11.13-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997440" version="1" comment="python3.11-test is &lt;3.11.13-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997441" version="1" comment="python3.11-tkinter is &lt;3.11.13-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998036" version="1" comment="pam is &lt;1.3.1-37.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998037" version="1" comment="pam-devel is &lt;1.3.1-37.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998038" version="1" comment="python3.12 is &lt;3.12.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998039" version="1" comment="python3.12-debug is &lt;3.12.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998040" version="1" comment="python3.12-devel is &lt;3.12.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998041" version="1" comment="python3.12-idle is &lt;3.12.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998042" version="1" comment="python3.12-libs is &lt;3.12.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998043" version="1" comment="python3.12-rpm-macros is &lt;3.12.11-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998044" version="1" comment="python3.12-test is &lt;3.12.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998045" version="1" comment="python3.12-tkinter is &lt;3.12.11-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998046" version="1" comment="firefox is &lt;128.12.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998047" version="1" comment="sudo is &lt;1.9.5p2-1.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998048" version="1" comment="platform-python is &lt;3.6.8-70.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998049" version="1" comment="platform-python-debug is &lt;3.6.8-70.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998050" version="1" comment="platform-python-devel is &lt;3.6.8-70.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998051" version="1" comment="python3-idle is &lt;3.6.8-70.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998052" version="1" comment="python3-libs is &lt;3.6.8-70.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998053" version="1" comment="python3-test is &lt;3.6.8-70.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998054" version="1" comment="python3-tkinter is &lt;3.6.8-70.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998144" version="1" comment="ruby is &lt;3.3.8-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998145" version="1" comment="ruby-bundled-gems is &lt;3.3.8-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998146" version="1" comment="ruby-default-gems is &lt;3.3.8-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998147" version="1" comment="ruby-devel is &lt;3.3.8-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998148" version="1" comment="ruby-doc is &lt;3.3.8-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998149" version="1" comment="ruby-libs is &lt;3.3.8-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998150" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998151" version="1" comment="rubygem-bundler is &lt;2.5.22-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998152" version="1" comment="rubygem-io-console is &lt;0.7.1-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998153" version="1" comment="rubygem-irb is &lt;1.13.1-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998154" version="1" comment="rubygem-json is &lt;2.7.2-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998155" version="1" comment="rubygem-minitest is &lt;5.20.0-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998156" version="1" comment="rubygem-power_assert is &lt;2.0.3-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998157" version="1" comment="rubygem-psych is &lt;5.1.2-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998158" version="1" comment="rubygem-racc is &lt;1.7.3-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998159" version="1" comment="rubygem-rake is &lt;13.1.0-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998160" version="1" comment="rubygem-rbs is &lt;3.4.0-4.module+el8.10.0+23024+a87ba659 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998161" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998162" version="1" comment="rubygem-rexml is &lt;3.3.9-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998163" version="1" comment="rubygem-rss is &lt;0.3.1-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998164" version="1" comment="rubygem-test-unit is &lt;3.6.1-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998165" version="1" comment="rubygem-typeprof is &lt;0.21.9-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998166" version="1" comment="rubygems is &lt;3.5.22-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998167" version="1" comment="rubygems-devel is &lt;3.5.22-4.module+el8.10.0+23024+a87ba659 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999181" version="1" comment="thunderbird is &lt;128.12.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999355" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999356" version="1" comment="buildah is &lt;1.33.12-2.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999357" version="1" comment="buildah-tests is &lt;1.33.12-2.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999358" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+23320+f7205097 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999359" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999360" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+23320+f7205097 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999361" version="1" comment="containernetworking-plugins is &lt;1.4.0-6.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999362" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999363" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999364" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999365" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999366" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999367" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999368" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999369" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999370" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999371" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999372" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999373" version="1" comment="podman is &lt;4.9.4-22.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999374" version="1" comment="podman-catatonit is &lt;4.9.4-22.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999375" version="1" comment="podman-docker is &lt;4.9.4-22.module+el8.10.0+23320+f7205097 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999376" version="1" comment="podman-gvproxy is &lt;4.9.4-22.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999377" version="1" comment="podman-plugins is &lt;4.9.4-22.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999378" version="1" comment="podman-remote is &lt;4.9.4-22.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999379" version="1" comment="podman-tests is &lt;4.9.4-22.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999380" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999381" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+23320+f7205097 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999382" version="1" comment="runc is &lt;1.1.12-6.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999383" version="1" comment="skopeo is &lt;1.14.5-4.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999384" version="1" comment="skopeo-tests is &lt;1.14.5-4.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999385" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999386" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999387" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+23320+f7205097 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999388" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+23320+f7205097 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999389" version="1" comment="jq is &lt;1.6-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999390" version="1" comment="jq-devel is &lt;1.6-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999391" version="1" comment="bpftool is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999392" version="1" comment="kernel is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999393" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.60.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999394" version="1" comment="kernel-core is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999395" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999396" version="1" comment="kernel-debug is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999397" version="1" comment="kernel-debug-core is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999399" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999400" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999402" version="1" comment="kernel-doc is &lt;4.18.0-553.60.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999403" version="1" comment="kernel-headers is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999404" version="1" comment="kernel-modules is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999405" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999406" version="1" comment="kernel-tools is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999407" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999409" version="1" comment="perf is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999410" version="1" comment="python3-perf is &lt;4.18.0-553.60.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974974" version="1" comment="delve is &lt;1.24.1-1.module+el8.10.0+22945+b2c96a17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999411" version="1" comment="go-toolset is &lt;1.24.4-1.module+el8.10.0+23323+67916f33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999412" version="1" comment="golang is &lt;1.24.4-1.module+el8.10.0+23323+67916f33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999413" version="1" comment="golang-bin is &lt;1.24.4-1.module+el8.10.0+23323+67916f33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999414" version="1" comment="golang-docs is &lt;1.24.4-1.module+el8.10.0+23323+67916f33 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999415" version="1" comment="golang-misc is &lt;1.24.4-1.module+el8.10.0+23323+67916f33 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999416" version="1" comment="golang-src is &lt;1.24.4-1.module+el8.10.0+23323+67916f33 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999417" version="1" comment="golang-tests is &lt;1.24.4-1.module+el8.10.0+23323+67916f33 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962650" version="1" comment="bpftool is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962651" version="1" comment="kernel is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962652" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.37.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962653" version="1" comment="kernel-core is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962654" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962655" version="1" comment="kernel-debug is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962656" version="1" comment="kernel-debug-core is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962658" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962659" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962661" version="1" comment="kernel-doc is &lt;4.18.0-553.37.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962662" version="1" comment="kernel-headers is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962663" version="1" comment="kernel-modules is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962664" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962665" version="1" comment="kernel-tools is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962666" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962668" version="1" comment="perf is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962669" version="1" comment="python3-perf is &lt;4.18.0-553.37.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999580" version="1" comment="libxml2 is &lt;2.9.7-21.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999581" version="1" comment="libxml2-devel is &lt;2.9.7-21.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999582" version="1" comment="python3-libxml2 is &lt;2.9.7-21.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999583" version="1" comment="gnome-remote-desktop is &lt;0.1.8-4.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008294" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008295" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008296" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008297" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008298" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008299" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008300" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008301" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008302" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008303" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008304" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008305" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008306" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008307" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008308" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.462.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008309" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.462.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008310" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008311" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008312" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008313" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011414" version="1" comment="java-11-openjdk is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011166" version="1" comment="java-11-openjdk-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011415" version="1" comment="java-11-openjdk-demo is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011168" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011169" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011170" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011416" version="1" comment="java-11-openjdk-devel is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011172" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011173" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011174" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011175" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011417" version="1" comment="java-11-openjdk-headless is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011177" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011178" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011179" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011418" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011181" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011419" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011183" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011420" version="1" comment="java-11-openjdk-jmods is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011185" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011186" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011187" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011188" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011421" version="1" comment="java-11-openjdk-src is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011190" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011191" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011192" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011422" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011194" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011195" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011196" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007998" version="1" comment="java-17-openjdk is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007999" version="1" comment="java-17-openjdk-demo is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008000" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008001" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008002" version="1" comment="java-17-openjdk-devel is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008003" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008004" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008005" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008006" version="1" comment="java-17-openjdk-headless is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008007" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008008" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008009" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008010" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008011" version="1" comment="java-17-openjdk-jmods is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008012" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008013" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008014" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008015" version="1" comment="java-17-openjdk-src is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008016" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008017" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008018" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008019" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008020" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022816" version="1" comment="java-21-openjdk is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022817" version="1" comment="java-21-openjdk-demo is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022818" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022819" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022820" version="1" comment="java-21-openjdk-devel is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022821" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022822" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022823" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022824" version="1" comment="java-21-openjdk-headless is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022825" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022826" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022827" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022828" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022829" version="1" comment="java-21-openjdk-jmods is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022830" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022831" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022832" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022833" version="1" comment="java-21-openjdk-src is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022834" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022835" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022836" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022837" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022838" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006277" version="1" comment="microcode_ctl is &lt;20250512-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006278" version="1" comment="emacs is &lt;26.1-15.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006279" version="1" comment="emacs-common is &lt;26.1-15.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006280" version="1" comment="emacs-filesystem is &lt;26.1-15.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006281" version="1" comment="emacs-lucid is &lt;26.1-15.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006282" version="1" comment="emacs-nox is &lt;26.1-15.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006283" version="1" comment="emacs-terminal is &lt;26.1-15.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010150" version="1" comment="lz4 is &lt;1.8.3-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010151" version="1" comment="lz4-devel is &lt;1.8.3-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010152" version="1" comment="lz4-libs is &lt;1.8.3-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008021" version="1" comment="platform-python-setuptools is &lt;39.2.0-9.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008022" version="1" comment="python3-setuptools is &lt;39.2.0-9.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008023" version="1" comment="python3-setuptools-wheel is &lt;39.2.0-9.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006284" version="1" comment="socat is &lt;1.7.4.1-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006285" version="1" comment="python3.11-setuptools is &lt;65.5.1-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006286" version="1" comment="python3.11-setuptools-wheel is &lt;65.5.1-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006287" version="1" comment="python3.12-setuptools is &lt;68.2.2-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006288" version="1" comment="python3.12-setuptools-wheel is &lt;68.2.2-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020516" version="1" comment="pcs is &lt;0.10.18-2.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020517" version="1" comment="pcs-snmp is &lt;0.10.18-2.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007791" version="1" comment="bpftool is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007792" version="1" comment="kernel is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007793" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.62.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007794" version="1" comment="kernel-core is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007795" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007796" version="1" comment="kernel-debug is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007797" version="1" comment="kernel-debug-core is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007799" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007800" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007802" version="1" comment="kernel-doc is &lt;4.18.0-553.62.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007803" version="1" comment="kernel-headers is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007804" version="1" comment="kernel-modules is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007805" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007806" version="1" comment="kernel-tools is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007807" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007809" version="1" comment="perf is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007810" version="1" comment="python3-perf is &lt;4.18.0-553.62.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008024" version="1" comment="cloud-init is &lt;23.4-7.el8_10.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008025" version="1" comment="glib2 is &lt;2.56.4-166.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008026" version="1" comment="glib2-devel is &lt;2.56.4-166.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008027" version="1" comment="glib2-doc is &lt;2.56.4-166.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008028" version="1" comment="glib2-fam is &lt;2.56.4-166.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008029" version="1" comment="glib2-static is &lt;2.56.4-166.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008030" version="1" comment="glib2-tests is &lt;2.56.4-166.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008031" version="1" comment="tomcat is &lt;9.0.87-1.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008032" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008033" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008034" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008035" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008036" version="1" comment="tomcat-lib is &lt;9.0.87-1.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008037" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008038" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008972" version="1" comment="bpftool is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008973" version="1" comment="kernel is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008974" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.63.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008975" version="1" comment="kernel-core is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008976" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008977" version="1" comment="kernel-debug is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008978" version="1" comment="kernel-debug-core is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008980" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008981" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008983" version="1" comment="kernel-doc is &lt;4.18.0-553.63.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008984" version="1" comment="kernel-headers is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008985" version="1" comment="kernel-modules is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008986" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008987" version="1" comment="kernel-tools is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008988" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008990" version="1" comment="perf is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008991" version="1" comment="python3-perf is &lt;4.18.0-553.63.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009454" version="1" comment="git is &lt;2.43.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009455" version="1" comment="git-all is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009456" version="1" comment="git-core is &lt;2.43.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009457" version="1" comment="git-core-doc is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009458" version="1" comment="git-credential-libsecret is &lt;2.43.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009459" version="1" comment="git-daemon is &lt;2.43.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009460" version="1" comment="git-email is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009461" version="1" comment="git-gui is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009462" version="1" comment="git-instaweb is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009463" version="1" comment="git-subtree is &lt;2.43.7-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009464" version="1" comment="git-svn is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009465" version="1" comment="gitk is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009466" version="1" comment="gitweb is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009467" version="1" comment="perl-Git is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009468" version="1" comment="perl-Git-SVN is &lt;2.43.7-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010153" version="1" comment="firefox is &lt;128.13.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011197" version="1" comment="nodejs is &lt;22.16.0-2.module+el8.10.0+23338+c5a38893 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011198" version="1" comment="nodejs-devel is &lt;22.16.0-2.module+el8.10.0+23338+c5a38893 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011199" version="1" comment="nodejs-docs is &lt;22.16.0-2.module+el8.10.0+23338+c5a38893 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011200" version="1" comment="nodejs-full-i18n is &lt;22.16.0-2.module+el8.10.0+23338+c5a38893 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011201" version="1" comment="nodejs-libs is &lt;22.16.0-2.module+el8.10.0+23338+c5a38893 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986162" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+23140+4056b950 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986163" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.10.0+23140+4056b950 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986164" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.10.0+23140+4056b950 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011202" version="1" comment="npm is &lt;10.9.2-1.22.16.0.2.module+el8.10.0+23338+c5a38893 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011203" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.16.0.2.module+el8.10.0+23338+c5a38893 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010509" version="1" comment="perl is &lt;5.26.3-423.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010510" version="1" comment="perl-Attribute-Handlers is &lt;0.99-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010511" version="1" comment="perl-Devel-Peek is &lt;1.26-423.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010512" version="1" comment="perl-Devel-SelfStubber is &lt;1.06-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010513" version="1" comment="perl-Errno is &lt;1.28-423.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010514" version="1" comment="perl-ExtUtils-Embed is &lt;1.34-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010515" version="1" comment="perl-ExtUtils-Miniperl is &lt;1.06-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010516" version="1" comment="perl-IO is &lt;1.38-423.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010517" version="1" comment="perl-IO-Zlib is &lt;1.10-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010518" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010519" version="1" comment="perl-Math-Complex is &lt;1.59-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010520" version="1" comment="perl-Memoize is &lt;1.03-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010521" version="1" comment="perl-Module-Loaded is &lt;0.08-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010522" version="1" comment="perl-Net-Ping is &lt;2.55-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010523" version="1" comment="perl-Pod-Html is &lt;1.22.02-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010524" version="1" comment="perl-SelfLoader is &lt;1.23-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010525" version="1" comment="perl-Test is &lt;1.30-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010526" version="1" comment="perl-Time-Piece is &lt;1.31-423.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010527" version="1" comment="perl-devel is &lt;5.26.3-423.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010528" version="1" comment="perl-interpreter is &lt;5.26.3-423.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010529" version="1" comment="perl-libnetcfg is &lt;5.26.3-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010530" version="1" comment="perl-libs is &lt;5.26.3-423.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010531" version="1" comment="perl-macros is &lt;5.26.3-423.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010532" version="1" comment="perl-open is &lt;1.11-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010533" version="1" comment="perl-tests is &lt;5.26.3-423.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010534" version="1" comment="perl-utils is &lt;5.26.3-423.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011204" version="1" comment="bpftool is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011205" version="1" comment="kernel is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011206" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.64.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011207" version="1" comment="kernel-core is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011208" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011209" version="1" comment="kernel-debug is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011210" version="1" comment="kernel-debug-core is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011212" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011213" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011215" version="1" comment="kernel-doc is &lt;4.18.0-553.64.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011216" version="1" comment="kernel-headers is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011217" version="1" comment="kernel-modules is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011218" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011219" version="1" comment="kernel-tools is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011220" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011222" version="1" comment="perf is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011223" version="1" comment="python3-perf is &lt;4.18.0-553.64.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010535" version="1" comment="python3-unbound is &lt;1.16.2-5.9.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010536" version="1" comment="unbound is &lt;1.16.2-5.9.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010537" version="1" comment="unbound-devel is &lt;1.16.2-5.9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010538" version="1" comment="unbound-libs is &lt;1.16.2-5.9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011224" version="1" comment="redis is &lt;6.2.19-1.module+el8.10.0+23330+19e91c41 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011225" version="1" comment="redis-devel is &lt;6.2.19-1.module+el8.10.0+23330+19e91c41 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011226" version="1" comment="redis-doc is &lt;6.2.19-1.module+el8.10.0+23330+19e91c41 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011227" version="1" comment="lemon is &lt;3.26.0-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011228" version="1" comment="sqlite is &lt;3.26.0-20.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011229" version="1" comment="sqlite-devel is &lt;3.26.0-20.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011230" version="1" comment="sqlite-doc is &lt;3.26.0-20.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011231" version="1" comment="sqlite-libs is &lt;3.26.0-20.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964264" version="1" comment="python3-tbb is &lt;2018.2-10.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964265" version="1" comment="tbb is &lt;2018.2-10.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964266" version="1" comment="tbb-devel is &lt;2018.2-10.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964267" version="1" comment="tbb-doc is &lt;2018.2-10.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011643" version="1" comment="libxml2 is &lt;2.9.7-21.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011644" version="1" comment="libxml2-devel is &lt;2.9.7-21.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011645" version="1" comment="python3-libxml2 is &lt;2.9.7-21.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963664" version="1" comment="bpftool is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963665" version="1" comment="kernel is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963666" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.40.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963667" version="1" comment="kernel-core is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963668" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963669" version="1" comment="kernel-debug is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963670" version="1" comment="kernel-debug-core is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963672" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963673" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963675" version="1" comment="kernel-doc is &lt;4.18.0-553.40.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963676" version="1" comment="kernel-headers is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963677" version="1" comment="kernel-modules is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963678" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963679" version="1" comment="kernel-tools is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963680" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963682" version="1" comment="perf is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963683" version="1" comment="python3-perf is &lt;4.18.0-553.40.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013084" version="1" comment="bpftool is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013085" version="1" comment="kernel is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013086" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.66.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013087" version="1" comment="kernel-core is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013088" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013089" version="1" comment="kernel-debug is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013090" version="1" comment="kernel-debug-core is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013092" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013093" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013095" version="1" comment="kernel-doc is &lt;4.18.0-553.66.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013096" version="1" comment="kernel-headers is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013097" version="1" comment="kernel-modules is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013098" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013099" version="1" comment="kernel-tools is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013100" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013102" version="1" comment="perf is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013103" version="1" comment="python3-perf is &lt;4.18.0-553.66.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963684" version="1" comment="firefox is &lt;128.7.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963685" version="1" comment="thunderbird is &lt;128.7.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012785" version="1" comment="compat-libpthread-nonshared is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012786" version="1" comment="glibc is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012787" version="1" comment="glibc-all-langpacks is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012788" version="1" comment="glibc-benchtests is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012789" version="1" comment="glibc-common is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012790" version="1" comment="glibc-devel is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012791" version="1" comment="glibc-doc is &lt;2.28-251.el8_10.25 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012792" version="1" comment="glibc-gconv-extra is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012793" version="1" comment="glibc-headers is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012794" version="1" comment="glibc-langpack-aa is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012795" version="1" comment="glibc-langpack-af is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012796" version="1" comment="glibc-langpack-agr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012797" version="1" comment="glibc-langpack-ak is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012798" version="1" comment="glibc-langpack-am is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012799" version="1" comment="glibc-langpack-an is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012800" version="1" comment="glibc-langpack-anp is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012801" version="1" comment="glibc-langpack-ar is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012802" version="1" comment="glibc-langpack-as is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012803" version="1" comment="glibc-langpack-ast is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012804" version="1" comment="glibc-langpack-ayc is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012805" version="1" comment="glibc-langpack-az is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012806" version="1" comment="glibc-langpack-be is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012807" version="1" comment="glibc-langpack-bem is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012808" version="1" comment="glibc-langpack-ber is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012809" version="1" comment="glibc-langpack-bg is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012810" version="1" comment="glibc-langpack-bhb is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012811" version="1" comment="glibc-langpack-bho is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012812" version="1" comment="glibc-langpack-bi is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012813" version="1" comment="glibc-langpack-bn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012814" version="1" comment="glibc-langpack-bo is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012815" version="1" comment="glibc-langpack-br is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012816" version="1" comment="glibc-langpack-brx is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012817" version="1" comment="glibc-langpack-bs is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012818" version="1" comment="glibc-langpack-byn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012819" version="1" comment="glibc-langpack-ca is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012820" version="1" comment="glibc-langpack-ce is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012821" version="1" comment="glibc-langpack-chr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012822" version="1" comment="glibc-langpack-cmn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012823" version="1" comment="glibc-langpack-crh is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012824" version="1" comment="glibc-langpack-cs is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012825" version="1" comment="glibc-langpack-csb is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012826" version="1" comment="glibc-langpack-cv is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012827" version="1" comment="glibc-langpack-cy is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012828" version="1" comment="glibc-langpack-da is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012829" version="1" comment="glibc-langpack-de is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012830" version="1" comment="glibc-langpack-doi is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012831" version="1" comment="glibc-langpack-dsb is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012832" version="1" comment="glibc-langpack-dv is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012833" version="1" comment="glibc-langpack-dz is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012834" version="1" comment="glibc-langpack-el is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012835" version="1" comment="glibc-langpack-en is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012836" version="1" comment="glibc-langpack-eo is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012837" version="1" comment="glibc-langpack-es is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012838" version="1" comment="glibc-langpack-et is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012839" version="1" comment="glibc-langpack-eu is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012840" version="1" comment="glibc-langpack-fa is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012841" version="1" comment="glibc-langpack-ff is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012842" version="1" comment="glibc-langpack-fi is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012843" version="1" comment="glibc-langpack-fil is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012844" version="1" comment="glibc-langpack-fo is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012845" version="1" comment="glibc-langpack-fr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012846" version="1" comment="glibc-langpack-fur is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012847" version="1" comment="glibc-langpack-fy is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012848" version="1" comment="glibc-langpack-ga is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012849" version="1" comment="glibc-langpack-gd is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012850" version="1" comment="glibc-langpack-gez is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012851" version="1" comment="glibc-langpack-gl is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012852" version="1" comment="glibc-langpack-gu is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012853" version="1" comment="glibc-langpack-gv is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012854" version="1" comment="glibc-langpack-ha is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012855" version="1" comment="glibc-langpack-hak is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012856" version="1" comment="glibc-langpack-he is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012857" version="1" comment="glibc-langpack-hi is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012858" version="1" comment="glibc-langpack-hif is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012859" version="1" comment="glibc-langpack-hne is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012860" version="1" comment="glibc-langpack-hr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012861" version="1" comment="glibc-langpack-hsb is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012862" version="1" comment="glibc-langpack-ht is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012863" version="1" comment="glibc-langpack-hu is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012864" version="1" comment="glibc-langpack-hy is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012865" version="1" comment="glibc-langpack-ia is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012866" version="1" comment="glibc-langpack-id is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012867" version="1" comment="glibc-langpack-ig is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012868" version="1" comment="glibc-langpack-ik is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012869" version="1" comment="glibc-langpack-is is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012870" version="1" comment="glibc-langpack-it is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012871" version="1" comment="glibc-langpack-iu is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012872" version="1" comment="glibc-langpack-ja is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012873" version="1" comment="glibc-langpack-ka is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012874" version="1" comment="glibc-langpack-kab is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012875" version="1" comment="glibc-langpack-kk is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012876" version="1" comment="glibc-langpack-kl is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012877" version="1" comment="glibc-langpack-km is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012878" version="1" comment="glibc-langpack-kn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012879" version="1" comment="glibc-langpack-ko is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012880" version="1" comment="glibc-langpack-kok is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012881" version="1" comment="glibc-langpack-ks is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012882" version="1" comment="glibc-langpack-ku is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012883" version="1" comment="glibc-langpack-kw is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012884" version="1" comment="glibc-langpack-ky is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012885" version="1" comment="glibc-langpack-lb is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012886" version="1" comment="glibc-langpack-lg is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012887" version="1" comment="glibc-langpack-li is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012888" version="1" comment="glibc-langpack-lij is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012889" version="1" comment="glibc-langpack-ln is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012890" version="1" comment="glibc-langpack-lo is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012891" version="1" comment="glibc-langpack-lt is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012892" version="1" comment="glibc-langpack-lv is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012893" version="1" comment="glibc-langpack-lzh is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012894" version="1" comment="glibc-langpack-mag is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012895" version="1" comment="glibc-langpack-mai is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012896" version="1" comment="glibc-langpack-mfe is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012897" version="1" comment="glibc-langpack-mg is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012898" version="1" comment="glibc-langpack-mhr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012899" version="1" comment="glibc-langpack-mi is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012900" version="1" comment="glibc-langpack-miq is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012901" version="1" comment="glibc-langpack-mjw is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012902" version="1" comment="glibc-langpack-mk is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012903" version="1" comment="glibc-langpack-ml is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012904" version="1" comment="glibc-langpack-mn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012905" version="1" comment="glibc-langpack-mni is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012906" version="1" comment="glibc-langpack-mr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012907" version="1" comment="glibc-langpack-ms is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012908" version="1" comment="glibc-langpack-mt is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012909" version="1" comment="glibc-langpack-my is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012910" version="1" comment="glibc-langpack-nan is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012911" version="1" comment="glibc-langpack-nb is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012912" version="1" comment="glibc-langpack-nds is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012913" version="1" comment="glibc-langpack-ne is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012914" version="1" comment="glibc-langpack-nhn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012915" version="1" comment="glibc-langpack-niu is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012916" version="1" comment="glibc-langpack-nl is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012917" version="1" comment="glibc-langpack-nn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012918" version="1" comment="glibc-langpack-nr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012919" version="1" comment="glibc-langpack-nso is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012920" version="1" comment="glibc-langpack-oc is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012921" version="1" comment="glibc-langpack-om is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012922" version="1" comment="glibc-langpack-or is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012923" version="1" comment="glibc-langpack-os is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012924" version="1" comment="glibc-langpack-pa is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012925" version="1" comment="glibc-langpack-pap is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012926" version="1" comment="glibc-langpack-pl is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012927" version="1" comment="glibc-langpack-ps is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012928" version="1" comment="glibc-langpack-pt is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012929" version="1" comment="glibc-langpack-quz is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012930" version="1" comment="glibc-langpack-raj is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012931" version="1" comment="glibc-langpack-ro is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012932" version="1" comment="glibc-langpack-ru is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012933" version="1" comment="glibc-langpack-rw is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012934" version="1" comment="glibc-langpack-sa is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012935" version="1" comment="glibc-langpack-sah is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012936" version="1" comment="glibc-langpack-sat is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012937" version="1" comment="glibc-langpack-sc is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012938" version="1" comment="glibc-langpack-sd is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012939" version="1" comment="glibc-langpack-se is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012940" version="1" comment="glibc-langpack-sgs is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012941" version="1" comment="glibc-langpack-shn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012942" version="1" comment="glibc-langpack-shs is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012943" version="1" comment="glibc-langpack-si is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012944" version="1" comment="glibc-langpack-sid is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012945" version="1" comment="glibc-langpack-sk is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012946" version="1" comment="glibc-langpack-sl is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012947" version="1" comment="glibc-langpack-sm is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012948" version="1" comment="glibc-langpack-so is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012949" version="1" comment="glibc-langpack-sq is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012950" version="1" comment="glibc-langpack-sr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012951" version="1" comment="glibc-langpack-ss is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012952" version="1" comment="glibc-langpack-st is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012953" version="1" comment="glibc-langpack-sv is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012954" version="1" comment="glibc-langpack-sw is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012955" version="1" comment="glibc-langpack-szl is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012956" version="1" comment="glibc-langpack-ta is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012957" version="1" comment="glibc-langpack-tcy is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012958" version="1" comment="glibc-langpack-te is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012959" version="1" comment="glibc-langpack-tg is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012960" version="1" comment="glibc-langpack-th is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012961" version="1" comment="glibc-langpack-the is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012962" version="1" comment="glibc-langpack-ti is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012963" version="1" comment="glibc-langpack-tig is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012964" version="1" comment="glibc-langpack-tk is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012965" version="1" comment="glibc-langpack-tl is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012966" version="1" comment="glibc-langpack-tn is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012967" version="1" comment="glibc-langpack-to is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012968" version="1" comment="glibc-langpack-tpi is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012969" version="1" comment="glibc-langpack-tr is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012970" version="1" comment="glibc-langpack-ts is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012971" version="1" comment="glibc-langpack-tt is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012972" version="1" comment="glibc-langpack-ug is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012973" version="1" comment="glibc-langpack-uk is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012974" version="1" comment="glibc-langpack-unm is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012975" version="1" comment="glibc-langpack-ur is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012976" version="1" comment="glibc-langpack-uz is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012977" version="1" comment="glibc-langpack-ve is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012978" version="1" comment="glibc-langpack-vi is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012979" version="1" comment="glibc-langpack-wa is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012980" version="1" comment="glibc-langpack-wae is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012981" version="1" comment="glibc-langpack-wal is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012982" version="1" comment="glibc-langpack-wo is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012983" version="1" comment="glibc-langpack-xh is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012984" version="1" comment="glibc-langpack-yi is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012985" version="1" comment="glibc-langpack-yo is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012986" version="1" comment="glibc-langpack-yue is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012987" version="1" comment="glibc-langpack-yuw is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012988" version="1" comment="glibc-langpack-zh is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012989" version="1" comment="glibc-langpack-zu is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012990" version="1" comment="glibc-locale-source is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012991" version="1" comment="glibc-minimal-langpack is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012992" version="1" comment="glibc-nss-devel is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012993" version="1" comment="glibc-static is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012994" version="1" comment="glibc-utils is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012995" version="1" comment="libnsl is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012996" version="1" comment="nscd is &lt;2.28-251.el8_10.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012997" version="1" comment="nss_db is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012998" version="1" comment="nss_hesiod is &lt;2.28-251.el8_10.25 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963686" version="1" comment="cpp is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963687" version="1" comment="gcc is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963688" version="1" comment="gcc-c++ is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963689" version="1" comment="gcc-gdb-plugin is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963690" version="1" comment="gcc-gfortran is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963691" version="1" comment="gcc-offload-nvptx is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963692" version="1" comment="gcc-plugin-annobin is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963693" version="1" comment="gcc-plugin-devel is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963694" version="1" comment="libasan is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963695" version="1" comment="libatomic is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963696" version="1" comment="libatomic-static is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963697" version="1" comment="libgcc is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963698" version="1" comment="libgfortran is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963699" version="1" comment="libgfortran-static is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963700" version="1" comment="libgomp is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963701" version="1" comment="libgomp-offload-nvptx is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963702" version="1" comment="libitm is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963703" version="1" comment="libitm-devel is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963704" version="1" comment="liblsan is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963705" version="1" comment="libquadmath is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963706" version="1" comment="libquadmath-devel is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963707" version="1" comment="libquadmath-static is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963708" version="1" comment="libstdc++ is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963709" version="1" comment="libstdc++-devel is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963710" version="1" comment="libstdc++-docs is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963711" version="1" comment="libstdc++-static is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963712" version="1" comment="libtsan is &lt;8.5.0-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963713" version="1" comment="libubsan is &lt;8.5.0-23.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963714" version="1" comment="gcc-toolset-13-gcc is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963715" version="1" comment="gcc-toolset-13-gcc-c++ is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963716" version="1" comment="gcc-toolset-13-gcc-gfortran is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963717" version="1" comment="gcc-toolset-13-gcc-plugin-annobin is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963718" version="1" comment="gcc-toolset-13-gcc-plugin-devel is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963719" version="1" comment="gcc-toolset-13-libasan-devel is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963720" version="1" comment="gcc-toolset-13-libatomic-devel is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963721" version="1" comment="gcc-toolset-13-libgccjit is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963722" version="1" comment="gcc-toolset-13-libgccjit-devel is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963723" version="1" comment="gcc-toolset-13-libitm-devel is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963724" version="1" comment="gcc-toolset-13-liblsan-devel is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963725" version="1" comment="gcc-toolset-13-libquadmath-devel is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963726" version="1" comment="gcc-toolset-13-libstdc++-devel is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963727" version="1" comment="gcc-toolset-13-libstdc++-docs is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963728" version="1" comment="gcc-toolset-13-libtsan-devel is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963729" version="1" comment="gcc-toolset-13-libubsan-devel is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963730" version="1" comment="gcc-toolset-13-offload-nvptx is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963731" version="1" comment="libasan8 is &lt;13.3.1-2.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963732" version="1" comment="libtsan2 is &lt;13.3.1-2.2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964268" version="1" comment="doxygen is &lt;1.8.14-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964269" version="1" comment="doxygen-doxywizard is &lt;1.8.14-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964270" version="1" comment="doxygen-latex is &lt;1.8.14-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013104" version="1" comment="libxml2 is &lt;2.9.7-21.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013105" version="1" comment="libxml2-devel is &lt;2.9.7-21.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013106" version="1" comment="python3-libxml2 is &lt;2.9.7-21.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013107" version="1" comment="python3-requests is &lt;2.20.0-6.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013108" version="1" comment="gdk-pixbuf2 is &lt;2.36.12-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013109" version="1" comment="gdk-pixbuf2-devel is &lt;2.36.12-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013110" version="1" comment="gdk-pixbuf2-modules is &lt;2.36.12-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013111" version="1" comment="gdk-pixbuf2-xlib is &lt;2.36.12-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013112" version="1" comment="gdk-pixbuf2-xlib-devel is &lt;2.36.12-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964271" version="1" comment="gcc-toolset-14-gcc is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964272" version="1" comment="gcc-toolset-14-gcc-c++ is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964273" version="1" comment="gcc-toolset-14-gcc-gfortran is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964274" version="1" comment="gcc-toolset-14-gcc-plugin-annobin is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964275" version="1" comment="gcc-toolset-14-gcc-plugin-devel is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964276" version="1" comment="gcc-toolset-14-libasan-devel is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964277" version="1" comment="gcc-toolset-14-libatomic-devel is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964278" version="1" comment="gcc-toolset-14-libgccjit is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964279" version="1" comment="gcc-toolset-14-libgccjit-devel is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964280" version="1" comment="gcc-toolset-14-libitm-devel is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964281" version="1" comment="gcc-toolset-14-liblsan-devel is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964282" version="1" comment="gcc-toolset-14-libquadmath-devel is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964283" version="1" comment="gcc-toolset-14-libstdc++-devel is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964284" version="1" comment="gcc-toolset-14-libstdc++-docs is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964285" version="1" comment="gcc-toolset-14-libtsan-devel is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964286" version="1" comment="gcc-toolset-14-libubsan-devel is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964287" version="1" comment="gcc-toolset-14-offload-nvptx is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964288" version="1" comment="libasan8 is &lt;14.2.1-7.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964289" version="1" comment="libtsan2 is &lt;14.2.1-7.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965827" version="1" comment="nodejs is &lt;20.18.2-1.module+el8.10.0+22767+a3309b10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965828" version="1" comment="nodejs-devel is &lt;20.18.2-1.module+el8.10.0+22767+a3309b10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965829" version="1" comment="nodejs-docs is &lt;20.18.2-1.module+el8.10.0+22767+a3309b10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965830" version="1" comment="nodejs-full-i18n is &lt;20.18.2-1.module+el8.10.0+22767+a3309b10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965831" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+22767+a3309b10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965832" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.10.0+22767+a3309b10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965833" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.10.0+22767+a3309b10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965834" version="1" comment="npm is &lt;10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013361" version="1" comment="bpftool is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013362" version="1" comment="kernel is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013363" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.69.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013364" version="1" comment="kernel-core is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013365" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013366" version="1" comment="kernel-debug is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013367" version="1" comment="kernel-debug-core is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013369" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013370" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013372" version="1" comment="kernel-doc is &lt;4.18.0-553.69.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013373" version="1" comment="kernel-headers is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013374" version="1" comment="kernel-modules is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013375" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013376" version="1" comment="kernel-tools is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013377" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013379" version="1" comment="perf is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013380" version="1" comment="python3-perf is &lt;4.18.0-553.69.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013381" version="1" comment="thunderbird is &lt;128.13.0-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965835" version="1" comment="buildah is &lt;1.33.12-1.module+el8.10.0+22744+7794713b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965836" version="1" comment="buildah-tests is &lt;1.33.12-1.module+el8.10.0+22744+7794713b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965837" version="1" comment="podman is &lt;4.9.4-19.module+el8.10.0+22744+7794713b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965838" version="1" comment="podman-catatonit is &lt;4.9.4-19.module+el8.10.0+22744+7794713b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965839" version="1" comment="podman-docker is &lt;4.9.4-19.module+el8.10.0+22744+7794713b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965840" version="1" comment="podman-gvproxy is &lt;4.9.4-19.module+el8.10.0+22744+7794713b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965841" version="1" comment="podman-plugins is &lt;4.9.4-19.module+el8.10.0+22744+7794713b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965842" version="1" comment="podman-remote is &lt;4.9.4-19.module+el8.10.0+22744+7794713b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965843" version="1" comment="podman-tests is &lt;4.9.4-19.module+el8.10.0+22744+7794713b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965844" version="1" comment="runc is &lt;1.1.12-6.module+el8.10.0+22722+0028f543 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013934" version="1" comment="webkit2gtk3 is &lt;2.48.5-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013935" version="1" comment="webkit2gtk3-devel is &lt;2.48.5-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013936" version="1" comment="webkit2gtk3-jsc is &lt;2.48.5-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013937" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.5-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015495" version="1" comment="go-toolset is &lt;1.24.6-1.module+el8.10.0+23407+428597c7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015496" version="1" comment="golang is &lt;1.24.6-1.module+el8.10.0+23407+428597c7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015497" version="1" comment="golang-bin is &lt;1.24.6-1.module+el8.10.0+23407+428597c7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015498" version="1" comment="golang-docs is &lt;1.24.6-1.module+el8.10.0+23407+428597c7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015499" version="1" comment="golang-misc is &lt;1.24.6-1.module+el8.10.0+23407+428597c7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015500" version="1" comment="golang-src is &lt;1.24.6-1.module+el8.10.0+23407+428597c7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015501" version="1" comment="golang-tests is &lt;1.24.6-1.module+el8.10.0+23407+428597c7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015502" version="1" comment="bpftool is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015503" version="1" comment="kernel is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015504" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.70.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015505" version="1" comment="kernel-core is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015506" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015507" version="1" comment="kernel-debug is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015508" version="1" comment="kernel-debug-core is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015510" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015511" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015513" version="1" comment="kernel-doc is &lt;4.18.0-553.70.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015514" version="1" comment="kernel-headers is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015515" version="1" comment="kernel-modules is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015516" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015517" version="1" comment="kernel-tools is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015518" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015520" version="1" comment="perf is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015521" version="1" comment="python3-perf is &lt;4.18.0-553.70.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022027" version="1" comment="apache-commons-collections is &lt;3.2.2-10.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022028" version="1" comment="apache-commons-lang is &lt;2.6-21.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022029" version="1" comment="apache-commons-net is &lt;3.6-3.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022030" version="1" comment="bea-stax-api is &lt;1.2.0-16.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022031" version="1" comment="fasterxml-oss-parent is &lt;69-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022032" version="1" comment="glassfish-fastinfoset is &lt;1.2.13-9.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022033" version="1" comment="glassfish-jaxb-api is &lt;2.2.12-8.module+el8.10.0+21035+a01f6469 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022034" version="1" comment="glassfish-jaxb-core is &lt;2.2.11-12.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022035" version="1" comment="glassfish-jaxb-runtime is &lt;2.2.11-12.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022036" version="1" comment="glassfish-jaxb-txw2 is &lt;2.2.11-12.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022037" version="1" comment="jackson-annotations is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022038" version="1" comment="jackson-bom is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022039" version="1" comment="jackson-core is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022040" version="1" comment="jackson-databind is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022041" version="1" comment="jackson-jaxrs-json-provider is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022042" version="1" comment="jackson-jaxrs-providers is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022043" version="1" comment="jackson-module-jaxb-annotations is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022044" version="1" comment="jackson-modules-base is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022045" version="1" comment="jackson-parent is &lt;2.19.1-1.module+el8.10.0+23380+f6e7434b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022046" version="1" comment="jakarta-commons-httpclient is &lt;3.1-28.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022047" version="1" comment="javassist is &lt;3.18.1-8.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022048" version="1" comment="javassist-javadoc is &lt;3.18.1-8.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022049" version="1" comment="pki-servlet-engine is &lt;9.0.62-1.module+el8.10.0+21257+2b5308b5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022050" version="1" comment="relaxngDatatype is &lt;2011.1-7.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022051" version="1" comment="slf4j is &lt;1.7.25-4.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022052" version="1" comment="slf4j-jdk14 is &lt;1.7.25-4.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022053" version="1" comment="stax-ex is &lt;1.7.7-8.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022054" version="1" comment="velocity is &lt;1.7-24.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022055" version="1" comment="xalan-j2 is &lt;2.7.1-38.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022056" version="1" comment="xerces-j2 is &lt;2.11.0-34.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022057" version="1" comment="xml-commons-apis is &lt;1.4.01-25.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022058" version="1" comment="xml-commons-resolver is &lt;1.2-26.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022059" version="1" comment="xmlstreambuffer is &lt;1.5.4-8.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022060" version="1" comment="xsom is &lt;0-19.20110809svn.module+el8.10.0+20993+d0f024b0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015522" version="1" comment="bsdtar is &lt;3.3.3-6.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015523" version="1" comment="libarchive is &lt;3.3.3-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015524" version="1" comment="libarchive-devel is &lt;3.3.3-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015525" version="1" comment="tomcat is &lt;9.0.87-1.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015526" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015527" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015528" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015529" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015530" version="1" comment="tomcat-lib is &lt;9.0.87-1.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015531" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015532" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015632" version="1" comment="bpftool is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015633" version="1" comment="kernel is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015634" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.71.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015635" version="1" comment="kernel-core is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015636" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015637" version="1" comment="kernel-debug is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015638" version="1" comment="kernel-debug-core is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015640" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015641" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015643" version="1" comment="kernel-doc is &lt;4.18.0-553.71.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015644" version="1" comment="kernel-headers is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015645" version="1" comment="kernel-modules is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015646" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015647" version="1" comment="kernel-tools is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015648" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015650" version="1" comment="perf is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015651" version="1" comment="python3-perf is &lt;4.18.0-553.71.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015652" version="1" comment="firefox is &lt;128.14.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019775" version="1" comment="python3.12 is &lt;3.12.11-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019776" version="1" comment="python3.12-debug is &lt;3.12.11-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019777" version="1" comment="python3.12-devel is &lt;3.12.11-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019778" version="1" comment="python3.12-idle is &lt;3.12.11-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019779" version="1" comment="python3.12-libs is &lt;3.12.11-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019780" version="1" comment="python3.12-rpm-macros is &lt;3.12.11-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019781" version="1" comment="python3.12-test is &lt;3.12.11-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019782" version="1" comment="python3.12-tkinter is &lt;3.12.11-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015533" version="1" comment="python3-cryptography is &lt;3.2.1-8.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017420" version="1" comment="pam is &lt;1.3.1-38.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017421" version="1" comment="pam-devel is &lt;1.3.1-38.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016089" version="1" comment="platform-python is &lt;3.6.8-71.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016090" version="1" comment="platform-python-debug is &lt;3.6.8-71.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016091" version="1" comment="platform-python-devel is &lt;3.6.8-71.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016092" version="1" comment="python3-idle is &lt;3.6.8-71.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016093" version="1" comment="python3-libs is &lt;3.6.8-71.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016094" version="1" comment="python3-test is &lt;3.6.8-71.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016095" version="1" comment="python3-tkinter is &lt;3.6.8-71.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015653" version="1" comment="aide is &lt;0.16-15.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016096" version="1" comment="thunderbird is &lt;128.14.0-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016233" version="1" comment="fence-agents-aliyun is &lt;4.2.1-129.el8_10.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016234" version="1" comment="fence-agents-all is &lt;4.2.1-129.el8_10.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016235" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016236" version="1" comment="fence-agents-apc is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016237" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016238" version="1" comment="fence-agents-aws is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016239" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-129.el8_10.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016240" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016241" version="1" comment="fence-agents-brocade is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016242" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016243" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016244" version="1" comment="fence-agents-common is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016245" version="1" comment="fence-agents-compute is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016246" version="1" comment="fence-agents-drac5 is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016247" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016248" version="1" comment="fence-agents-emerson is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016249" version="1" comment="fence-agents-eps is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016250" version="1" comment="fence-agents-gce is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016251" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016252" version="1" comment="fence-agents-hpblade is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016253" version="1" comment="fence-agents-ibm-powervs is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016254" version="1" comment="fence-agents-ibm-vpc is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016255" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016256" version="1" comment="fence-agents-ifmib is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016257" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016258" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016259" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016260" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016261" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016262" version="1" comment="fence-agents-ipdu is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016263" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016264" version="1" comment="fence-agents-kdump is &lt;4.2.1-129.el8_10.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016265" version="1" comment="fence-agents-kubevirt is &lt;4.2.1-129.el8_10.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016266" version="1" comment="fence-agents-lpar is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016267" version="1" comment="fence-agents-mpath is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016268" version="1" comment="fence-agents-openstack is &lt;4.2.1-129.el8_10.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016269" version="1" comment="fence-agents-redfish is &lt;4.2.1-129.el8_10.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016270" version="1" comment="fence-agents-rhevm is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016271" version="1" comment="fence-agents-rsa is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016272" version="1" comment="fence-agents-rsb is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016273" version="1" comment="fence-agents-sbd is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016274" version="1" comment="fence-agents-scsi is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016275" version="1" comment="fence-agents-virsh is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016276" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016277" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016278" version="1" comment="fence-agents-wti is &lt;4.2.1-129.el8_10.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016279" version="1" comment="python3.11 is &lt;3.11.13-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016280" version="1" comment="python3.11-debug is &lt;3.11.13-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016281" version="1" comment="python3.11-devel is &lt;3.11.13-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016282" version="1" comment="python3.11-idle is &lt;3.11.13-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016283" version="1" comment="python3.11-libs is &lt;3.11.13-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016284" version="1" comment="python3.11-rpm-macros is &lt;3.11.13-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016285" version="1" comment="python3.11-test is &lt;3.11.13-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016286" version="1" comment="python3.11-tkinter is &lt;3.11.13-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016287" version="1" comment="postgresql is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016288" version="1" comment="postgresql-contrib is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016289" version="1" comment="postgresql-docs is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016290" version="1" comment="postgresql-plperl is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016291" version="1" comment="postgresql-plpython3 is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016292" version="1" comment="postgresql-pltcl is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016293" version="1" comment="postgresql-private-devel is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016294" version="1" comment="postgresql-private-libs is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016295" version="1" comment="postgresql-server is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016296" version="1" comment="postgresql-server-devel is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016297" version="1" comment="postgresql-static is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016298" version="1" comment="postgresql-test is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016299" version="1" comment="postgresql-test-rpm-macros is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016300" version="1" comment="postgresql-upgrade is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016301" version="1" comment="postgresql-upgrade-devel is &lt;16.10-1.module+el8.10.0+23424+e26efc6c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016302" version="1" comment="python39 is &lt;3.9.20-2.module+el8.10.0+23441+1124c1da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016303" version="1" comment="python39-Cython is &lt;0.29.21-5.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016304" version="1" comment="python39-attrs is &lt;20.3.0-2.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016305" version="1" comment="python39-debug is &lt;3.9.20-2.module+el8.10.0+23441+1124c1da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016306" version="1" comment="python39-devel is &lt;3.9.20-2.module+el8.10.0+23441+1124c1da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016307" version="1" comment="python39-idle is &lt;3.9.20-2.module+el8.10.0+23441+1124c1da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016308" version="1" comment="python39-iniconfig is &lt;1.1.1-2.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016309" version="1" comment="python39-libs is &lt;3.9.20-2.module+el8.10.0+23441+1124c1da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016310" version="1" comment="python39-mod_wsgi is &lt;4.7.1-7.module+el8.10.0+23075+0aa18782.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016311" version="1" comment="python39-more-itertools is &lt;8.5.0-2.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016312" version="1" comment="python39-packaging is &lt;20.4-4.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016313" version="1" comment="python39-pluggy is &lt;0.13.1-3.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016314" version="1" comment="python39-py is &lt;1.10.0-1.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016315" version="1" comment="python39-pybind11 is &lt;2.7.1-1.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016316" version="1" comment="python39-pybind11-devel is &lt;2.7.1-1.module+el8.9.0+19644+d68f775d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016317" version="1" comment="python39-pyparsing is &lt;2.4.7-5.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016318" version="1" comment="python39-pytest is &lt;6.0.2-2.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016319" version="1" comment="python39-rpm-macros is &lt;3.9.20-2.module+el8.10.0+23441+1124c1da for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016320" version="1" comment="python39-setuptools is &lt;50.3.2-7.module+el8.10.0+23406+03055bfb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016321" version="1" comment="python39-setuptools-wheel is &lt;50.3.2-7.module+el8.10.0+23406+03055bfb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016322" version="1" comment="python39-test is &lt;3.9.20-2.module+el8.10.0+23441+1124c1da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016323" version="1" comment="python39-tkinter is &lt;3.9.20-2.module+el8.10.0+23441+1124c1da for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016324" version="1" comment="python39-wcwidth is &lt;0.2.5-3.module+el8.9.0+19644+d68f775d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017209" version="1" comment="resource-agents is &lt;4.9.0-54.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017210" version="1" comment="resource-agents-aliyun is &lt;4.9.0-54.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017211" version="1" comment="resource-agents-gcp is &lt;4.9.0-54.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017212" version="1" comment="resource-agents-paf is &lt;4.9.0-54.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016973" version="1" comment="bpftool is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016974" version="1" comment="kernel is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016975" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.72.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016976" version="1" comment="kernel-core is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016977" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016978" version="1" comment="kernel-debug is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016979" version="1" comment="kernel-debug-core is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016981" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016982" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016984" version="1" comment="kernel-doc is &lt;4.18.0-553.72.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016985" version="1" comment="kernel-headers is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016986" version="1" comment="kernel-modules is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016987" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016988" version="1" comment="kernel-tools is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016989" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016991" version="1" comment="perf is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016992" version="1" comment="python3-perf is &lt;4.18.0-553.72.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016900" version="1" comment="libudisks2 is &lt;2.9.0-16.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016901" version="1" comment="libudisks2-devel is &lt;2.9.0-16.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016902" version="1" comment="udisks2 is &lt;2.9.0-16.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016903" version="1" comment="udisks2-iscsi is &lt;2.9.0-16.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016904" version="1" comment="udisks2-lsm is &lt;2.9.0-16.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016905" version="1" comment="udisks2-lvm2 is &lt;2.9.0-16.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020518" version="1" comment="pg_repack is &lt;1.4.6-3.module+el8.9.0+20664+9c30cf7f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020519" version="1" comment="pgaudit is &lt;1.5.0-1.module+el8.9.0+20664+9c30cf7f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020520" version="1" comment="postgres-decoderbufs is &lt;0.10.0-2.module+el8.9.0+20664+9c30cf7f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020521" version="1" comment="postgresql is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020522" version="1" comment="postgresql-contrib is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020523" version="1" comment="postgresql-docs is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020524" version="1" comment="postgresql-plperl is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020525" version="1" comment="postgresql-plpython3 is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020526" version="1" comment="postgresql-pltcl is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020527" version="1" comment="postgresql-server is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020528" version="1" comment="postgresql-server-devel is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020529" version="1" comment="postgresql-static is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020530" version="1" comment="postgresql-test is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020531" version="1" comment="postgresql-test-rpm-macros is &lt;13.22-1.module+el8.10.0+23422+b659575f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020532" version="1" comment="postgresql-upgrade is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020533" version="1" comment="postgresql-upgrade-devel is &lt;13.22-1.module+el8.10.0+23422+b659575f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020763" version="1" comment="postgresql is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020764" version="1" comment="postgresql-contrib is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020765" version="1" comment="postgresql-docs is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020766" version="1" comment="postgresql-plperl is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020767" version="1" comment="postgresql-plpython3 is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020768" version="1" comment="postgresql-pltcl is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020769" version="1" comment="postgresql-private-devel is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020770" version="1" comment="postgresql-private-libs is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020771" version="1" comment="postgresql-server is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020772" version="1" comment="postgresql-server-devel is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020773" version="1" comment="postgresql-static is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020774" version="1" comment="postgresql-test is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020775" version="1" comment="postgresql-test-rpm-macros is &lt;15.14-1.module+el8.10.0+23423+5a199198 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020776" version="1" comment="postgresql-upgrade is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020777" version="1" comment="postgresql-upgrade-devel is &lt;15.14-1.module+el8.10.0+23423+5a199198 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016993" version="1" comment="httpd is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016994" version="1" comment="httpd-devel is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016995" version="1" comment="httpd-filesystem is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016996" version="1" comment="httpd-manual is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016997" version="1" comment="httpd-tools is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016998" version="1" comment="mod_http2 is &lt;1.15.7-10.module+el8.10.0+23369+11a81384.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016999" version="1" comment="mod_ldap is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017000" version="1" comment="mod_proxy_html is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017001" version="1" comment="mod_session is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017002" version="1" comment="mod_ssl is &lt;2.4.37-65.module+el8.10.0+23369+11a81384.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965015" version="1" comment="libxml2 is &lt;2.9.7-18.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965016" version="1" comment="libxml2-devel is &lt;2.9.7-18.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965017" version="1" comment="python3-libxml2 is &lt;2.9.7-18.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017680" version="1" comment="bpftool is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017681" version="1" comment="kernel is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017682" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.74.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017683" version="1" comment="kernel-core is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017684" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017685" version="1" comment="kernel-debug is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017686" version="1" comment="kernel-debug-core is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017688" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017689" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017691" version="1" comment="kernel-doc is &lt;4.18.0-553.74.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017692" version="1" comment="kernel-headers is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017693" version="1" comment="kernel-modules is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017694" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017695" version="1" comment="kernel-tools is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017696" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017698" version="1" comment="perf is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017699" version="1" comment="python3-perf is &lt;4.18.0-553.74.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018032" version="1" comment="php is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018033" version="1" comment="php-bcmath is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018034" version="1" comment="php-cli is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018035" version="1" comment="php-common is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018036" version="1" comment="php-dba is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018037" version="1" comment="php-dbg is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018038" version="1" comment="php-devel is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018039" version="1" comment="php-embedded is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018040" version="1" comment="php-enchant is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018041" version="1" comment="php-ffi is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018042" version="1" comment="php-fpm is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018043" version="1" comment="php-gd is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018044" version="1" comment="php-gmp is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018045" version="1" comment="php-intl is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018046" version="1" comment="php-ldap is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018047" version="1" comment="php-mbstring is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018048" version="1" comment="php-mysqlnd is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018049" version="1" comment="php-odbc is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018050" version="1" comment="php-opcache is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018051" version="1" comment="php-pdo is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018052" version="1" comment="php-pgsql is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018053" version="1" comment="php-process is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018054" version="1" comment="php-snmp is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018055" version="1" comment="php-soap is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018056" version="1" comment="php-xml is &lt;8.2.28-1.module+el8.10.0+23472+dcd7a400 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017868" version="1" comment="cups is &lt;2.2.6-63.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017869" version="1" comment="cups-client is &lt;2.2.6-63.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017870" version="1" comment="cups-devel is &lt;2.2.6-63.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017871" version="1" comment="cups-filesystem is &lt;2.2.6-63.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017872" version="1" comment="cups-ipptool is &lt;2.2.6-63.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017873" version="1" comment="cups-libs is &lt;2.2.6-63.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017874" version="1" comment="cups-lpd is &lt;2.2.6-63.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018186" version="1" comment="bpftool is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018187" version="1" comment="kernel is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018188" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.75.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018189" version="1" comment="kernel-core is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018190" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018191" version="1" comment="kernel-debug is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018192" version="1" comment="kernel-debug-core is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018194" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018195" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018197" version="1" comment="kernel-doc is &lt;4.18.0-553.75.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018198" version="1" comment="kernel-headers is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018199" version="1" comment="kernel-modules is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018200" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018201" version="1" comment="kernel-tools is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018202" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018204" version="1" comment="perf is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018205" version="1" comment="python3-perf is &lt;4.18.0-553.75.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965845" version="1" comment="nodejs is &lt;18.20.6-1.module+el8.10.0+22776+24cd6c55 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965846" version="1" comment="nodejs-devel is &lt;18.20.6-1.module+el8.10.0+22776+24cd6c55 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965847" version="1" comment="nodejs-docs is &lt;18.20.6-1.module+el8.10.0+22776+24cd6c55 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965848" version="1" comment="nodejs-full-i18n is &lt;18.20.6-1.module+el8.10.0+22776+24cd6c55 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965849" version="1" comment="npm is &lt;10.8.2-1.18.20.6.1.module+el8.10.0+22776+24cd6c55 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018206" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018207" version="1" comment="buildah is &lt;1.33.12-2.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018208" version="1" comment="buildah-tests is &lt;1.33.12-2.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018209" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+23498+f7d19d48 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018210" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018211" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+23498+f7d19d48 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018212" version="1" comment="containernetworking-plugins is &lt;1.4.0-6.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018213" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018214" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018215" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018216" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018217" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018218" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018219" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018220" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018221" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018222" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018223" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018224" version="1" comment="podman is &lt;4.9.4-23.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018225" version="1" comment="podman-catatonit is &lt;4.9.4-23.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018226" version="1" comment="podman-docker is &lt;4.9.4-23.module+el8.10.0+23498+f7d19d48 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018227" version="1" comment="podman-gvproxy is &lt;4.9.4-23.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018228" version="1" comment="podman-plugins is &lt;4.9.4-23.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018229" version="1" comment="podman-remote is &lt;4.9.4-23.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018230" version="1" comment="podman-tests is &lt;4.9.4-23.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018231" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018232" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+23498+f7d19d48 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018233" version="1" comment="runc is &lt;1.1.12-6.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018234" version="1" comment="skopeo is &lt;1.14.5-4.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018235" version="1" comment="skopeo-tests is &lt;1.14.5-4.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018236" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018237" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018238" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+23498+f7d19d48 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018239" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+23498+f7d19d48 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965850" version="1" comment="nodejs is &lt;22.13.1-1.module+el8.10.0+22759+46b58560 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965851" version="1" comment="nodejs-devel is &lt;22.13.1-1.module+el8.10.0+22759+46b58560 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965852" version="1" comment="nodejs-docs is &lt;22.13.1-1.module+el8.10.0+22759+46b58560 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965853" version="1" comment="nodejs-full-i18n is &lt;22.13.1-1.module+el8.10.0+22759+46b58560 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965854" version="1" comment="nodejs-libs is &lt;22.13.1-1.module+el8.10.0+22759+46b58560 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965855" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+22759+46b58560 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965856" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.10.0+22759+46b58560 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965857" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.10.0+22759+46b58560 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965858" version="1" comment="npm is &lt;10.9.2-1.22.13.1.1.module+el8.10.0+22759+46b58560 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965859" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018763" version="1" comment="firefox is &lt;140.3.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019468" version="1" comment="bpftool is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019469" version="1" comment="kernel is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019470" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.76.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019471" version="1" comment="kernel-core is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019472" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019473" version="1" comment="kernel-debug is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019474" version="1" comment="kernel-debug-core is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019476" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019477" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019479" version="1" comment="kernel-doc is &lt;4.18.0-553.76.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019480" version="1" comment="kernel-headers is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019481" version="1" comment="kernel-modules is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019482" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019483" version="1" comment="kernel-tools is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019484" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019486" version="1" comment="perf is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019487" version="1" comment="python3-perf is &lt;4.18.0-553.76.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019412" version="1" comment="thunderbird is &lt;140.3.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966641" version="1" comment="mecab is &lt;0.996-2.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966642" version="1" comment="mecab-devel is &lt;0.996-2.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966643" version="1" comment="mecab-ipadic is &lt;2.7.0.20070801-17.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966644" version="1" comment="mecab-ipadic-EUCJP is &lt;2.7.0.20070801-17.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966645" version="1" comment="mysql is &lt;8.0.41-1.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966646" version="1" comment="mysql-common is &lt;8.0.41-1.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966647" version="1" comment="mysql-devel is &lt;8.0.41-1.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966648" version="1" comment="mysql-errmsg is &lt;8.0.41-1.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966649" version="1" comment="mysql-libs is &lt;8.0.41-1.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966650" version="1" comment="mysql-server is &lt;8.0.41-1.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966651" version="1" comment="mysql-test is &lt;8.0.41-1.module+el8.10.0+22857+7f331edd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966058" version="1" comment="bind is &lt;9.11.36-16.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966059" version="1" comment="bind-chroot is &lt;9.11.36-16.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966060" version="1" comment="bind-devel is &lt;9.11.36-16.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966061" version="1" comment="bind-export-devel is &lt;9.11.36-16.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966062" version="1" comment="bind-export-libs is &lt;9.11.36-16.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966063" version="1" comment="bind-libs is &lt;9.11.36-16.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966064" version="1" comment="bind-libs-lite is &lt;9.11.36-16.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966065" version="1" comment="bind-license is &lt;9.11.36-16.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966066" version="1" comment="bind-lite-devel is &lt;9.11.36-16.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966067" version="1" comment="bind-pkcs11 is &lt;9.11.36-16.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966068" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-16.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966069" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-16.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966070" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-16.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966071" version="1" comment="bind-sdb is &lt;9.11.36-16.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966072" version="1" comment="bind-sdb-chroot is &lt;9.11.36-16.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966073" version="1" comment="bind-utils is &lt;9.11.36-16.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966074" version="1" comment="python3-bind is &lt;9.11.36-16.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966075" version="1" comment="bind9.16 is &lt;9.16.23-0.22.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966076" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.22.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966077" version="1" comment="bind9.16-devel is &lt;9.16.23-0.22.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966078" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.22.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966079" version="1" comment="bind9.16-doc is &lt;9.16.23-0.22.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966080" version="1" comment="bind9.16-libs is &lt;9.16.23-0.22.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966081" version="1" comment="bind9.16-license is &lt;9.16.23-0.22.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966082" version="1" comment="bind9.16-utils is &lt;9.16.23-0.22.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966083" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.22.el8_10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019783" version="1" comment="openssh is &lt;8.0p1-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019784" version="1" comment="openssh-askpass is &lt;8.0p1-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019785" version="1" comment="openssh-cavs is &lt;8.0p1-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019786" version="1" comment="openssh-clients is &lt;8.0p1-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019787" version="1" comment="openssh-keycat is &lt;8.0p1-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019788" version="1" comment="openssh-ldap is &lt;8.0p1-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019789" version="1" comment="openssh-server is &lt;8.0p1-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019790" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019791" version="1" comment="mysql is &lt;8.0.43-1.module+el8.10.0+23526+fabc920a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019792" version="1" comment="mysql-common is &lt;8.0.43-1.module+el8.10.0+23526+fabc920a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019793" version="1" comment="mysql-devel is &lt;8.0.43-1.module+el8.10.0+23526+fabc920a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019794" version="1" comment="mysql-errmsg is &lt;8.0.43-1.module+el8.10.0+23526+fabc920a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019795" version="1" comment="mysql-libs is &lt;8.0.43-1.module+el8.10.0+23526+fabc920a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019796" version="1" comment="mysql-server is &lt;8.0.43-1.module+el8.10.0+23526+fabc920a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019797" version="1" comment="mysql-test is &lt;8.0.43-1.module+el8.10.0+23526+fabc920a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020030" version="1" comment="bpftool is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020031" version="1" comment="kernel is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020032" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.77.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020033" version="1" comment="kernel-core is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020034" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020035" version="1" comment="kernel-debug is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020036" version="1" comment="kernel-debug-core is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020038" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020039" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020041" version="1" comment="kernel-doc is &lt;4.18.0-553.77.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020042" version="1" comment="kernel-headers is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020043" version="1" comment="kernel-modules is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020044" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020045" version="1" comment="kernel-tools is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020046" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020048" version="1" comment="perf is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020049" version="1" comment="python3-perf is &lt;4.18.0-553.77.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020778" version="1" comment="perl-JSON-XS is &lt;3.04-4.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965292" version="1" comment="libpq is &lt;13.20-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965293" version="1" comment="libpq-devel is &lt;13.20-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020534" version="1" comment="bpftool is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020535" version="1" comment="kernel is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020536" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.78.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020537" version="1" comment="kernel-core is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020538" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020539" version="1" comment="kernel-debug is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020540" version="1" comment="kernel-debug-core is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020542" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020543" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020545" version="1" comment="kernel-doc is &lt;4.18.0-553.78.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020546" version="1" comment="kernel-headers is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020547" version="1" comment="kernel-modules is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020548" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020549" version="1" comment="kernel-tools is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020550" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020552" version="1" comment="perf is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020553" version="1" comment="python3-perf is &lt;4.18.0-553.78.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966392" version="1" comment="postgresql is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966393" version="1" comment="postgresql-contrib is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966394" version="1" comment="postgresql-docs is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966395" version="1" comment="postgresql-plperl is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966396" version="1" comment="postgresql-plpython3 is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966397" version="1" comment="postgresql-pltcl is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966398" version="1" comment="postgresql-private-devel is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966399" version="1" comment="postgresql-private-libs is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966400" version="1" comment="postgresql-server is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966401" version="1" comment="postgresql-server-devel is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966402" version="1" comment="postgresql-static is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966403" version="1" comment="postgresql-test is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966404" version="1" comment="postgresql-test-rpm-macros is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966405" version="1" comment="postgresql-upgrade is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966406" version="1" comment="postgresql-upgrade-devel is &lt;16.8-1.module+el8.10.0+22867+e4e13b1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020379" version="1" comment="gnutls is &lt;3.6.16-8.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020380" version="1" comment="gnutls-c++ is &lt;3.6.16-8.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020381" version="1" comment="gnutls-dane is &lt;3.6.16-8.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020382" version="1" comment="gnutls-devel is &lt;3.6.16-8.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020383" version="1" comment="gnutls-utils is &lt;3.6.16-8.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020384" version="1" comment="open-vm-tools is &lt;12.3.5-2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020385" version="1" comment="open-vm-tools-desktop is &lt;12.3.5-2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020386" version="1" comment="open-vm-tools-salt-minion is &lt;12.3.5-2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020387" version="1" comment="open-vm-tools-sdmp is &lt;12.3.5-2.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020554" version="1" comment="compat-libtiff3 is &lt;3.9.4-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020555" version="1" comment="vim-X11 is &lt;8.0.1763-21.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020556" version="1" comment="vim-common is &lt;8.0.1763-21.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020557" version="1" comment="vim-enhanced is &lt;8.0.1763-21.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020558" version="1" comment="vim-filesystem is &lt;8.0.1763-21.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020559" version="1" comment="vim-minimal is &lt;8.0.1763-21.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020858" version="1" comment="bpftool is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020859" version="1" comment="kernel is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020860" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.79.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020861" version="1" comment="kernel-core is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020862" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020863" version="1" comment="kernel-debug is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020864" version="1" comment="kernel-debug-core is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020866" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020867" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020869" version="1" comment="kernel-doc is &lt;4.18.0-553.79.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020870" version="1" comment="kernel-headers is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020871" version="1" comment="kernel-modules is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020872" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020873" version="1" comment="kernel-tools is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020874" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020876" version="1" comment="perf is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020877" version="1" comment="python3-perf is &lt;4.18.0-553.79.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020878" version="1" comment="webkit2gtk3 is &lt;2.50.0-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020879" version="1" comment="webkit2gtk3-devel is &lt;2.50.0-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020880" version="1" comment="webkit2gtk3-jsc is &lt;2.50.0-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020881" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.0-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021771" version="1" comment="webkit2gtk3 is &lt;2.50.1-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021772" version="1" comment="webkit2gtk3-devel is &lt;2.50.1-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021773" version="1" comment="webkit2gtk3-jsc is &lt;2.50.1-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021774" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.1-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021775" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.21-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021776" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.21-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021777" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.21-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021778" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.21-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021779" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.21-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021780" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.21-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021781" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.21-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021782" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.121-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021783" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.121-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021784" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.121-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021785" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.21-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021786" version="1" comment="dotnet-templates-8.0 is &lt;8.0.121-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021787" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021788" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021789" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021790" version="1" comment="dotnet is &lt;9.0.111-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021791" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021792" version="1" comment="dotnet-host is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021793" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021794" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021795" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021796" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.111-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021797" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.111-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021798" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.111-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021799" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.111-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021800" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.10-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021801" version="1" comment="dotnet-templates-9.0 is &lt;9.0.111-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021802" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.111-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022617" version="1" comment="firefox is &lt;140.4.0-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022337" version="1" comment="libssh is &lt;0.9.6-15.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022338" version="1" comment="libssh-config is &lt;0.9.6-15.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022339" version="1" comment="libssh-devel is &lt;0.9.6-15.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023042" version="1" comment="bpftool is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023043" version="1" comment="kernel is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023044" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.80.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023045" version="1" comment="kernel-core is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023046" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023047" version="1" comment="kernel-debug is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023048" version="1" comment="kernel-debug-core is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023050" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023051" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023053" version="1" comment="kernel-doc is &lt;4.18.0-553.80.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023054" version="1" comment="kernel-headers is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023055" version="1" comment="kernel-modules is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023056" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023057" version="1" comment="kernel-tools is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023058" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023060" version="1" comment="perf is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023061" version="1" comment="python3-perf is &lt;4.18.0-553.80.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023351" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023352" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023353" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023354" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023355" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023356" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023357" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023358" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023359" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023360" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023361" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023362" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023363" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023364" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023365" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.472.b08-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023366" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.472.b08-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023367" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023368" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023369" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023370" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025669" version="1" comment="java-11-openjdk is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025494" version="1" comment="java-11-openjdk-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025670" version="1" comment="java-11-openjdk-demo is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025496" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025497" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025498" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025671" version="1" comment="java-11-openjdk-devel is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025500" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025501" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025502" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025503" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025672" version="1" comment="java-11-openjdk-headless is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025505" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025506" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025507" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025673" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025509" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025674" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025511" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025675" version="1" comment="java-11-openjdk-jmods is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025513" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025514" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025515" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025516" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025676" version="1" comment="java-11-openjdk-src is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025518" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025519" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025520" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025677" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025522" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025523" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025524" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023371" version="1" comment="java-17-openjdk is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023372" version="1" comment="java-17-openjdk-demo is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023373" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023374" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023375" version="1" comment="java-17-openjdk-devel is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023376" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023377" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023378" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023379" version="1" comment="java-17-openjdk-headless is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023380" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023381" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023382" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023383" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023384" version="1" comment="java-17-openjdk-jmods is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023385" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023386" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023387" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023388" version="1" comment="java-17-openjdk-src is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023389" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023390" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023391" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023392" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023393" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023394" version="1" comment="java-21-openjdk is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023395" version="1" comment="java-21-openjdk-demo is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023396" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023397" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023398" version="1" comment="java-21-openjdk-devel is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023399" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023400" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023401" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023402" version="1" comment="java-21-openjdk-headless is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023403" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023404" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023405" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023406" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023407" version="1" comment="java-21-openjdk-jmods is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023408" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023409" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023410" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023411" version="1" comment="java-21-openjdk-src is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023412" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023413" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023414" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023415" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023416" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024237" version="1" comment="thunderbird is &lt;140.4.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024238" version="1" comment="bpftool is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024239" version="1" comment="kernel is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024240" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.81.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024241" version="1" comment="kernel-core is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024242" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024243" version="1" comment="kernel-debug is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024244" version="1" comment="kernel-debug-core is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024246" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024247" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024249" version="1" comment="kernel-doc is &lt;4.18.0-553.81.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024250" version="1" comment="kernel-headers is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024251" version="1" comment="kernel-modules is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024252" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024253" version="1" comment="kernel-tools is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024254" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024256" version="1" comment="perf is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024257" version="1" comment="python3-perf is &lt;4.18.0-553.81.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023928" version="1" comment="squid is &lt;4.15-10.module+el8.10.0+23592+d564ec65.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967148" version="1" comment="emacs is &lt;26.1-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967149" version="1" comment="emacs-common is &lt;26.1-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967150" version="1" comment="emacs-filesystem is &lt;26.1-13.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967151" version="1" comment="emacs-lucid is &lt;26.1-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967152" version="1" comment="emacs-nox is &lt;26.1-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967153" version="1" comment="emacs-terminal is &lt;26.1-13.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024449" version="1" comment="redis is &lt;6.2.20-1.module+el8.10.0+23551+d4cd15d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024450" version="1" comment="redis-devel is &lt;6.2.20-1.module+el8.10.0+23551+d4cd15d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024451" version="1" comment="redis-doc is &lt;6.2.20-1.module+el8.10.0+23551+d4cd15d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024452" version="1" comment="libtiff is &lt;4.0.9-35.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024453" version="1" comment="libtiff-devel is &lt;4.0.9-35.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024454" version="1" comment="libtiff-tools is &lt;4.0.9-35.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024677" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-19.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024678" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024679" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024680" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024681" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024682" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024683" version="1" comment="xorg-x11-server-common is &lt;1.20.11-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024684" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-27.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024685" version="1" comment="xorg-x11-server-source is &lt;1.20.11-27.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024686" version="1" comment="bpftool is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024687" version="1" comment="kernel is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024688" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.82.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024689" version="1" comment="kernel-core is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024690" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024691" version="1" comment="kernel-debug is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024692" version="1" comment="kernel-debug-core is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024694" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024695" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024697" version="1" comment="kernel-doc is &lt;4.18.0-553.82.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024698" version="1" comment="kernel-headers is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024699" version="1" comment="kernel-modules is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024700" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024701" version="1" comment="kernel-tools is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024702" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024704" version="1" comment="perf is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024705" version="1" comment="python3-perf is &lt;4.18.0-553.82.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025539" version="1" comment="galera is &lt;26.4.22-1.module+el8.10.0+23546+c942e1d0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025540" version="1" comment="mariadb is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025541" version="1" comment="mariadb-backup is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025542" version="1" comment="mariadb-common is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025543" version="1" comment="mariadb-devel is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025544" version="1" comment="mariadb-embedded is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025545" version="1" comment="mariadb-embedded-devel is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025546" version="1" comment="mariadb-errmsg is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025547" version="1" comment="mariadb-gssapi-server is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025548" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025549" version="1" comment="mariadb-pam is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025550" version="1" comment="mariadb-server is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025551" version="1" comment="mariadb-server-galera is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025552" version="1" comment="mariadb-server-utils is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025553" version="1" comment="mariadb-test is &lt;10.5.29-2.module+el8.10.0+23547+977c7465 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024706" version="1" comment="libipa_hbac is &lt;2.9.4-5.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024707" version="1" comment="libsss_autofs is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024708" version="1" comment="libsss_certmap is &lt;2.9.4-5.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024709" version="1" comment="libsss_idmap is &lt;2.9.4-5.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024710" version="1" comment="libsss_nss_idmap is &lt;2.9.4-5.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024711" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.4-5.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024712" version="1" comment="libsss_simpleifp is &lt;2.9.4-5.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024713" version="1" comment="libsss_sudo is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024714" version="1" comment="python3-libipa_hbac is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024715" version="1" comment="python3-libsss_nss_idmap is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024716" version="1" comment="python3-sss is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024717" version="1" comment="python3-sss-murmur is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024718" version="1" comment="python3-sssdconfig is &lt;2.9.4-5.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024719" version="1" comment="sssd is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024720" version="1" comment="sssd-ad is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024721" version="1" comment="sssd-client is &lt;2.9.4-5.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024722" version="1" comment="sssd-common is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024723" version="1" comment="sssd-common-pac is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024724" version="1" comment="sssd-dbus is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024725" version="1" comment="sssd-idp is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024726" version="1" comment="sssd-ipa is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024727" version="1" comment="sssd-kcm is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024728" version="1" comment="sssd-krb5 is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024729" version="1" comment="sssd-krb5-common is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024730" version="1" comment="sssd-ldap is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024731" version="1" comment="sssd-nfs-idmap is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024732" version="1" comment="sssd-polkit-rules is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024733" version="1" comment="sssd-proxy is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024734" version="1" comment="sssd-tools is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024735" version="1" comment="sssd-winbind-idmap is &lt;2.9.4-5.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025554" version="1" comment="libsoup is &lt;2.62.3-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025555" version="1" comment="libsoup-devel is &lt;2.62.3-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024736" version="1" comment="pcs is &lt;0.10.18-2.el8_10.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024737" version="1" comment="pcs-snmp is &lt;0.10.18-2.el8_10.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024738" version="1" comment="bind9.16 is &lt;9.16.23-0.22.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024739" version="1" comment="bind9.16-chroot is &lt;9.16.23-0.22.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024740" version="1" comment="bind9.16-devel is &lt;9.16.23-0.22.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024741" version="1" comment="bind9.16-dnssec-utils is &lt;9.16.23-0.22.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024742" version="1" comment="bind9.16-doc is &lt;9.16.23-0.22.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024743" version="1" comment="bind9.16-libs is &lt;9.16.23-0.22.el8_10.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024744" version="1" comment="bind9.16-license is &lt;9.16.23-0.22.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024745" version="1" comment="bind9.16-utils is &lt;9.16.23-0.22.el8_10.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024746" version="1" comment="python3-bind9.16 is &lt;9.16.23-0.22.el8_10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024747" version="1" comment="bind is &lt;9.11.36-16.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024748" version="1" comment="bind-chroot is &lt;9.11.36-16.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024749" version="1" comment="bind-devel is &lt;9.11.36-16.el8_10.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024750" version="1" comment="bind-export-devel is &lt;9.11.36-16.el8_10.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024751" version="1" comment="bind-export-libs is &lt;9.11.36-16.el8_10.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024752" version="1" comment="bind-libs is &lt;9.11.36-16.el8_10.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024753" version="1" comment="bind-libs-lite is &lt;9.11.36-16.el8_10.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024754" version="1" comment="bind-license is &lt;9.11.36-16.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024755" version="1" comment="bind-lite-devel is &lt;9.11.36-16.el8_10.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024756" version="1" comment="bind-pkcs11 is &lt;9.11.36-16.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024757" version="1" comment="bind-pkcs11-devel is &lt;9.11.36-16.el8_10.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024758" version="1" comment="bind-pkcs11-libs is &lt;9.11.36-16.el8_10.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024759" version="1" comment="bind-pkcs11-utils is &lt;9.11.36-16.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024760" version="1" comment="bind-sdb is &lt;9.11.36-16.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024761" version="1" comment="bind-sdb-chroot is &lt;9.11.36-16.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024762" version="1" comment="bind-utils is &lt;9.11.36-16.el8_10.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024763" version="1" comment="python3-bind is &lt;9.11.36-16.el8_10.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025114" version="1" comment="tigervnc is &lt;1.15.0-8.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025115" version="1" comment="tigervnc-icons is &lt;1.15.0-8.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025116" version="1" comment="tigervnc-license is &lt;1.15.0-8.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025117" version="1" comment="tigervnc-selinux is &lt;1.15.0-8.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025118" version="1" comment="tigervnc-server is &lt;1.15.0-8.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025119" version="1" comment="tigervnc-server-minimal is &lt;1.15.0-8.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025120" version="1" comment="tigervnc-server-module is &lt;1.15.0-8.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025556" version="1" comment="bpftool is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025557" version="1" comment="kernel is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025558" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.83.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025559" version="1" comment="kernel-core is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025560" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025561" version="1" comment="kernel-debug is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025562" version="1" comment="kernel-debug-core is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025564" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025565" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025567" version="1" comment="kernel-doc is &lt;4.18.0-553.83.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025568" version="1" comment="kernel-headers is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025569" version="1" comment="kernel-modules is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025570" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025571" version="1" comment="kernel-tools is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025572" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025574" version="1" comment="perf is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025575" version="1" comment="python3-perf is &lt;4.18.0-553.83.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025576" version="1" comment="libtiff is &lt;4.0.9-36.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025577" version="1" comment="libtiff-devel is &lt;4.0.9-36.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025578" version="1" comment="libtiff-tools is &lt;4.0.9-36.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967212" version="1" comment="webkit2gtk3 is &lt;2.46.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967213" version="1" comment="webkit2gtk3-devel is &lt;2.46.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967214" version="1" comment="webkit2gtk3-jsc is &lt;2.46.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967215" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.6-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025905" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025906" version="1" comment="buildah is &lt;1.33.12-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025907" version="1" comment="buildah-tests is &lt;1.33.12-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025908" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+23647+cfd78660 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025909" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025910" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+23647+cfd78660 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025911" version="1" comment="containernetworking-plugins is &lt;1.4.0-6.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025912" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025913" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025914" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025915" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025916" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025917" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025918" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025919" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025920" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025921" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025922" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025923" version="1" comment="podman is &lt;4.9.4-23.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025924" version="1" comment="podman-catatonit is &lt;4.9.4-23.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025925" version="1" comment="podman-docker is &lt;4.9.4-23.module+el8.10.0+23647+cfd78660 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025926" version="1" comment="podman-gvproxy is &lt;4.9.4-23.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025927" version="1" comment="podman-plugins is &lt;4.9.4-23.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025928" version="1" comment="podman-remote is &lt;4.9.4-23.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025929" version="1" comment="podman-tests is &lt;4.9.4-23.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025930" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025931" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+23647+cfd78660 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025932" version="1" comment="runc is &lt;1.2.5-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025933" version="1" comment="skopeo is &lt;1.14.5-4.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025934" version="1" comment="skopeo-tests is &lt;1.14.5-4.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025935" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025936" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025937" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+23647+cfd78660 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025938" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+23647+cfd78660 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029794" version="1" comment="bpftool is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029795" version="1" comment="kernel is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029796" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.84.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029797" version="1" comment="kernel-core is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029798" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029799" version="1" comment="kernel-debug is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029800" version="1" comment="kernel-debug-core is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029802" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029803" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029805" version="1" comment="kernel-doc is &lt;4.18.0-553.84.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029806" version="1" comment="kernel-headers is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029807" version="1" comment="kernel-modules is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029808" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029809" version="1" comment="kernel-tools is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029810" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029812" version="1" comment="perf is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029813" version="1" comment="python3-perf is &lt;4.18.0-553.84.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029814" version="1" comment="lasso is &lt;2.6.0-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029815" version="1" comment="lasso-devel is &lt;2.6.0-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029816" version="1" comment="python3-lasso is &lt;2.6.0-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030165" version="1" comment="expat is &lt;2.5.0-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030166" version="1" comment="expat-devel is &lt;2.5.0-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030692" version="1" comment="thunderbird is &lt;140.5.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031213" version="1" comment="bpftool is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031214" version="1" comment="kernel is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031215" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.85.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031216" version="1" comment="kernel-core is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031217" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031218" version="1" comment="kernel-debug is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031219" version="1" comment="kernel-debug-core is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031221" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031222" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031224" version="1" comment="kernel-doc is &lt;4.18.0-553.85.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031225" version="1" comment="kernel-headers is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031226" version="1" comment="kernel-modules is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031227" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031228" version="1" comment="kernel-tools is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031229" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031231" version="1" comment="perf is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031232" version="1" comment="python3-perf is &lt;4.18.0-553.85.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033808" version="1" comment="mingw32-expat is &lt;2.5.0-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033809" version="1" comment="mingw64-expat is &lt;2.5.0-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031233" version="1" comment="libssh is &lt;0.9.6-16.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031234" version="1" comment="libssh-config is &lt;0.9.6-16.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031235" version="1" comment="libssh-devel is &lt;0.9.6-16.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031236" version="1" comment="cups is &lt;2.2.6-64.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031237" version="1" comment="cups-client is &lt;2.2.6-64.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031238" version="1" comment="cups-devel is &lt;2.2.6-64.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031239" version="1" comment="cups-filesystem is &lt;2.2.6-64.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031240" version="1" comment="cups-ipptool is &lt;2.2.6-64.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031241" version="1" comment="cups-libs is &lt;2.2.6-64.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031242" version="1" comment="cups-lpd is &lt;2.2.6-64.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032241" version="1" comment="firefox is &lt;140.5.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032242" version="1" comment="bpftool is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032243" version="1" comment="kernel is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032244" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.87.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032245" version="1" comment="kernel-core is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032246" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032247" version="1" comment="kernel-debug is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032248" version="1" comment="kernel-debug-core is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032250" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032251" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032253" version="1" comment="kernel-doc is &lt;4.18.0-553.87.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032254" version="1" comment="kernel-headers is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032255" version="1" comment="kernel-modules is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032256" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032257" version="1" comment="kernel-tools is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032258" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032260" version="1" comment="perf is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032261" version="1" comment="python3-perf is &lt;4.18.0-553.87.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032397" version="1" comment="gimp is &lt;2.8.22-26.module+el8.10.0+23719+f0b80de8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032398" version="1" comment="gimp-devel is &lt;2.8.22-26.module+el8.10.0+23719+f0b80de8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032399" version="1" comment="gimp-devel-tools is &lt;2.8.22-26.module+el8.10.0+23719+f0b80de8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032400" version="1" comment="gimp-libs is &lt;2.8.22-26.module+el8.10.0+23719+f0b80de8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032452" version="1" comment="delve is &lt;1.25.2-1.module+el8.10.0+23746+9db33b5e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032453" version="1" comment="go-toolset is &lt;1.25.3-2.module+el8.10.0+23746+9db33b5e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032454" version="1" comment="golang is &lt;1.25.3-2.module+el8.10.0+23746+9db33b5e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032455" version="1" comment="golang-bin is &lt;1.25.3-2.module+el8.10.0+23746+9db33b5e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032456" version="1" comment="golang-docs is &lt;1.25.3-2.module+el8.10.0+23746+9db33b5e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032457" version="1" comment="golang-misc is &lt;1.25.3-2.module+el8.10.0+23746+9db33b5e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032458" version="1" comment="golang-race is &lt;1.25.3-2.module+el8.10.0+23746+9db33b5e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032459" version="1" comment="golang-src is &lt;1.25.3-2.module+el8.10.0+23746+9db33b5e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032460" version="1" comment="golang-tests is &lt;1.25.3-2.module+el8.10.0+23746+9db33b5e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032540" version="1" comment="abrt is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032541" version="1" comment="abrt-addon-ccpp is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032542" version="1" comment="abrt-addon-coredump-helper is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032543" version="1" comment="abrt-addon-kerneloops is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032544" version="1" comment="abrt-addon-pstoreoops is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032545" version="1" comment="abrt-addon-vmcore is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032546" version="1" comment="abrt-addon-xorg is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032547" version="1" comment="abrt-cli is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032548" version="1" comment="abrt-cli-ng is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032549" version="1" comment="abrt-console-notification is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032550" version="1" comment="abrt-dbus is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032551" version="1" comment="abrt-desktop is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032552" version="1" comment="abrt-gui is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032553" version="1" comment="abrt-gui-libs is &lt;2.10.9-25.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032554" version="1" comment="abrt-libs is &lt;2.10.9-25.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032555" version="1" comment="abrt-plugin-machine-id is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032556" version="1" comment="abrt-plugin-sosreport is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032557" version="1" comment="abrt-tui is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032558" version="1" comment="python3-abrt is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032559" version="1" comment="python3-abrt-addon is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032560" version="1" comment="python3-abrt-container-addon is &lt;2.10.9-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032561" version="1" comment="python3-abrt-doc is &lt;2.10.9-25.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032580" version="1" comment="webkit2gtk3 is &lt;2.50.3-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032581" version="1" comment="webkit2gtk3-devel is &lt;2.50.3-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032582" version="1" comment="webkit2gtk3-jsc is &lt;2.50.3-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032583" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.3-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032642" version="1" comment="bpftool is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032643" version="1" comment="kernel is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032644" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.89.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032645" version="1" comment="kernel-core is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032646" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032647" version="1" comment="kernel-debug is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032648" version="1" comment="kernel-debug-core is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032650" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032651" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032653" version="1" comment="kernel-doc is &lt;4.18.0-553.89.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032654" version="1" comment="kernel-headers is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032655" version="1" comment="kernel-modules is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032656" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032657" version="1" comment="kernel-tools is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032658" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032660" version="1" comment="perf is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032661" version="1" comment="python3-perf is &lt;4.18.0-553.89.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032939" version="1" comment="tomcat is &lt;9.0.87-1.el8_10.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032940" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el8_10.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032941" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el8_10.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032942" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el8_10.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032943" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el8_10.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032944" version="1" comment="tomcat-lib is &lt;9.0.87-1.el8_10.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032945" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el8_10.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032946" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el8_10.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032947" version="1" comment="ruby is &lt;3.3.10-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032948" version="1" comment="ruby-bundled-gems is &lt;3.3.10-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032949" version="1" comment="ruby-default-gems is &lt;3.3.10-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032950" version="1" comment="ruby-devel is &lt;3.3.10-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032951" version="1" comment="ruby-doc is &lt;3.3.10-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032952" version="1" comment="ruby-libs is &lt;3.3.10-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032953" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032954" version="1" comment="rubygem-bundler is &lt;2.5.22-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032955" version="1" comment="rubygem-io-console is &lt;0.7.1-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032956" version="1" comment="rubygem-irb is &lt;1.13.1-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032957" version="1" comment="rubygem-json is &lt;2.7.2-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032958" version="1" comment="rubygem-minitest is &lt;5.20.0-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032959" version="1" comment="rubygem-power_assert is &lt;2.0.3-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032960" version="1" comment="rubygem-psych is &lt;5.1.2-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032961" version="1" comment="rubygem-racc is &lt;1.7.3-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032962" version="1" comment="rubygem-rake is &lt;13.1.0-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032963" version="1" comment="rubygem-rbs is &lt;3.4.0-5.module+el8.10.0+23696+c42b0f57 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032964" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032965" version="1" comment="rubygem-rexml is &lt;3.4.4-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032966" version="1" comment="rubygem-rss is &lt;0.3.1-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032967" version="1" comment="rubygem-test-unit is &lt;3.6.1-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032968" version="1" comment="rubygem-typeprof is &lt;0.21.9-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032969" version="1" comment="rubygems is &lt;3.5.22-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032970" version="1" comment="rubygems-devel is &lt;3.5.22-5.module+el8.10.0+23696+c42b0f57 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032971" version="1" comment="libluksmeta is &lt;9-4.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032972" version="1" comment="libluksmeta-devel is &lt;9-4.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032973" version="1" comment="luksmeta is &lt;9-4.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033208" version="1" comment="firefox is &lt;140.6.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037827" version="1" comment="mysql is &lt;8.0.44-1.module+el8.10.0+23701+71f6a1f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037828" version="1" comment="mysql-common is &lt;8.0.44-1.module+el8.10.0+23701+71f6a1f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037829" version="1" comment="mysql-devel is &lt;8.0.44-1.module+el8.10.0+23701+71f6a1f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037830" version="1" comment="mysql-errmsg is &lt;8.0.44-1.module+el8.10.0+23701+71f6a1f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037831" version="1" comment="mysql-libs is &lt;8.0.44-1.module+el8.10.0+23701+71f6a1f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037832" version="1" comment="mysql-server is &lt;8.0.44-1.module+el8.10.0+23701+71f6a1f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037833" version="1" comment="mysql-test is &lt;8.0.44-1.module+el8.10.0+23701+71f6a1f1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033209" version="1" comment="mecab is &lt;0.996-2.module+el8.10.0+23550+bd321b9a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033210" version="1" comment="mecab-devel is &lt;0.996-2.module+el8.10.0+23550+bd321b9a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033211" version="1" comment="mecab-ipadic is &lt;2.7.0.20070801-17.module+el8.10.0+23550+bd321b9a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033212" version="1" comment="mecab-ipadic-EUCJP is &lt;2.7.0.20070801-17.module+el8.10.0+23550+bd321b9a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033213" version="1" comment="mysql is &lt;8.4.7-1.module+el8.10.0+23690+f5ccb7d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033214" version="1" comment="mysql-common is &lt;8.4.7-1.module+el8.10.0+23690+f5ccb7d2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033215" version="1" comment="mysql-devel is &lt;8.4.7-1.module+el8.10.0+23690+f5ccb7d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033216" version="1" comment="mysql-errmsg is &lt;8.4.7-1.module+el8.10.0+23690+f5ccb7d2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033217" version="1" comment="mysql-libs is &lt;8.4.7-1.module+el8.10.0+23690+f5ccb7d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033218" version="1" comment="mysql-server is &lt;8.4.7-1.module+el8.10.0+23690+f5ccb7d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033219" version="1" comment="mysql-test is &lt;8.4.7-1.module+el8.10.0+23690+f5ccb7d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033220" version="1" comment="mysql-test-data is &lt;8.4.7-1.module+el8.10.0+23690+f5ccb7d2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034743" version="1" comment="binutils is &lt;2.30-128.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034744" version="1" comment="binutils-devel is &lt;2.30-128.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034745" version="1" comment="curl is &lt;7.61.1-34.el8_10.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034746" version="1" comment="libcurl is &lt;7.61.1-34.el8_10.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034747" version="1" comment="libcurl-devel is &lt;7.61.1-34.el8_10.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034748" version="1" comment="libcurl-minimal is &lt;7.61.1-34.el8_10.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034203" version="1" comment="openssh is &lt;8.0p1-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034204" version="1" comment="openssh-askpass is &lt;8.0p1-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034205" version="1" comment="openssh-cavs is &lt;8.0p1-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034206" version="1" comment="openssh-clients is &lt;8.0p1-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034207" version="1" comment="openssh-keycat is &lt;8.0p1-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034208" version="1" comment="openssh-ldap is &lt;8.0p1-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034209" version="1" comment="openssh-server is &lt;8.0p1-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034210" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034211" version="1" comment="python39 is &lt;3.9.25-2.module+el8.10.0+23718+1842ae33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034212" version="1" comment="python39-debug is &lt;3.9.25-2.module+el8.10.0+23718+1842ae33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034213" version="1" comment="python39-devel is &lt;3.9.25-2.module+el8.10.0+23718+1842ae33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034214" version="1" comment="python39-idle is &lt;3.9.25-2.module+el8.10.0+23718+1842ae33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034215" version="1" comment="python39-libs is &lt;3.9.25-2.module+el8.10.0+23718+1842ae33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034216" version="1" comment="python39-rpm-macros is &lt;3.9.25-2.module+el8.10.0+23718+1842ae33 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034217" version="1" comment="python39-test is &lt;3.9.25-2.module+el8.10.0+23718+1842ae33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034218" version="1" comment="python39-tkinter is &lt;3.9.25-2.module+el8.10.0+23718+1842ae33 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034935" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034936" version="1" comment="buildah is &lt;1.33.13-1.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034937" version="1" comment="buildah-tests is &lt;1.33.13-1.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034938" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+23820+ae6deecc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034939" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034940" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+23820+ae6deecc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034941" version="1" comment="containernetworking-plugins is &lt;1.4.0-6.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034942" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034943" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034944" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034945" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034946" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034947" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034948" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034949" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034950" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034951" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034952" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034953" version="1" comment="podman is &lt;4.9.4-25.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034954" version="1" comment="podman-catatonit is &lt;4.9.4-25.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034955" version="1" comment="podman-docker is &lt;4.9.4-25.module+el8.10.0+23820+ae6deecc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034956" version="1" comment="podman-gvproxy is &lt;4.9.4-25.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034957" version="1" comment="podman-plugins is &lt;4.9.4-25.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034958" version="1" comment="podman-remote is &lt;4.9.4-25.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034959" version="1" comment="podman-tests is &lt;4.9.4-25.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034960" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034961" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+23820+ae6deecc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034962" version="1" comment="runc is &lt;1.2.9-2.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034963" version="1" comment="skopeo is &lt;1.14.5-5.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034964" version="1" comment="skopeo-tests is &lt;1.14.5-5.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034965" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034966" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034967" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+23820+ae6deecc for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034968" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+23820+ae6deecc for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034575" version="1" comment="webkit2gtk3 is &lt;2.50.4-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034576" version="1" comment="webkit2gtk3-devel is &lt;2.50.4-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034577" version="1" comment="webkit2gtk3-jsc is &lt;2.50.4-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034578" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.4-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034749" version="1" comment="httpd is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034750" version="1" comment="httpd-devel is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034751" version="1" comment="httpd-filesystem is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034752" version="1" comment="httpd-manual is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034753" version="1" comment="httpd-tools is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034754" version="1" comment="mod_ldap is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034755" version="1" comment="mod_md is &lt;2.0.8-8.module+el8.10.0+23815+1b5e1c66.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034756" version="1" comment="mod_proxy_html is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034757" version="1" comment="mod_session is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034758" version="1" comment="mod_ssl is &lt;2.4.37-65.module+el8.10.0+23815+1b5e1c66.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034969" version="1" comment="git-lfs is &lt;3.4.1-6.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035160" version="1" comment="grafana is &lt;9.2.10-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035161" version="1" comment="grafana-selinux is &lt;9.2.10-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967472" version="1" comment="firefox is &lt;128.8.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967513" version="1" comment="bpftool is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967514" version="1" comment="kernel is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967515" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.44.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967516" version="1" comment="kernel-core is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967517" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967518" version="1" comment="kernel-debug is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967519" version="1" comment="kernel-debug-core is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967521" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967522" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967524" version="1" comment="kernel-doc is &lt;4.18.0-553.44.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967525" version="1" comment="kernel-headers is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967526" version="1" comment="kernel-modules is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967527" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967528" version="1" comment="kernel-tools is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967529" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967531" version="1" comment="perf is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967532" version="1" comment="python3-perf is &lt;4.18.0-553.44.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967857" version="1" comment="tigervnc is &lt;1.13.1-15.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967858" version="1" comment="tigervnc-icons is &lt;1.13.1-15.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967859" version="1" comment="tigervnc-license is &lt;1.13.1-15.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967860" version="1" comment="tigervnc-selinux is &lt;1.13.1-15.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967861" version="1" comment="tigervnc-server is &lt;1.13.1-15.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967862" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-15.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967863" version="1" comment="tigervnc-server-module is &lt;1.13.1-15.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967864" version="1" comment="rsync is &lt;3.1.3-21.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967865" version="1" comment="rsync-daemon is &lt;3.1.3-21.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968306" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968307" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968308" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968309" version="1" comment="dotnet is &lt;9.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968310" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968311" version="1" comment="dotnet-host is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968312" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968313" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968314" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968315" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968316" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968317" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968318" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968319" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.3-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968320" version="1" comment="dotnet-templates-9.0 is &lt;9.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968321" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968322" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968323" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968324" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968325" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968326" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968327" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968328" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968329" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.114-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968330" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.114-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968331" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.114-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968332" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968333" version="1" comment="dotnet-templates-8.0 is &lt;8.0.114-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968334" version="1" comment="libxml2 is &lt;2.9.7-19.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968335" version="1" comment="libxml2-devel is &lt;2.9.7-19.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968336" version="1" comment="python3-libxml2 is &lt;2.9.7-19.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968337" version="1" comment="krb5-devel is &lt;1.18.2-31.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968338" version="1" comment="krb5-libs is &lt;1.18.2-31.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968339" version="1" comment="krb5-pkinit is &lt;1.18.2-31.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968340" version="1" comment="krb5-server is &lt;1.18.2-31.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968341" version="1" comment="krb5-server-ldap is &lt;1.18.2-31.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968342" version="1" comment="krb5-workstation is &lt;1.18.2-31.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968343" version="1" comment="libkadm5 is &lt;1.18.2-31.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968344" version="1" comment="webkit2gtk3 is &lt;2.46.6-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968345" version="1" comment="webkit2gtk3-devel is &lt;2.46.6-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968346" version="1" comment="webkit2gtk3-jsc is &lt;2.46.6-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968347" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.6-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968348" version="1" comment="thunderbird is &lt;128.8.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969542" version="1" comment="bpftool is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969543" version="1" comment="kernel is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969544" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.45.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969545" version="1" comment="kernel-core is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969546" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969547" version="1" comment="kernel-debug is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969548" version="1" comment="kernel-debug-core is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969550" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969551" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969553" version="1" comment="kernel-doc is &lt;4.18.0-553.45.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969554" version="1" comment="kernel-headers is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969555" version="1" comment="kernel-modules is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969556" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969557" version="1" comment="kernel-tools is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969558" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969560" version="1" comment="perf is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969561" version="1" comment="python3-perf is &lt;4.18.0-553.45.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970352" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970353" version="1" comment="buildah is &lt;1.33.12-1.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970354" version="1" comment="buildah-tests is &lt;1.33.12-1.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970355" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+22931+799fd806 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970356" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970357" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+22931+799fd806 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970358" version="1" comment="containernetworking-plugins is &lt;1.4.0-5.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970359" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970360" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970361" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970362" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970363" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970364" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970365" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970366" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970367" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970368" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970369" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970370" version="1" comment="podman is &lt;4.9.4-20.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970371" version="1" comment="podman-catatonit is &lt;4.9.4-20.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970372" version="1" comment="podman-docker is &lt;4.9.4-20.module+el8.10.0+22931+799fd806 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970373" version="1" comment="podman-gvproxy is &lt;4.9.4-20.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970374" version="1" comment="podman-plugins is &lt;4.9.4-20.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970375" version="1" comment="podman-remote is &lt;4.9.4-20.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970376" version="1" comment="podman-tests is &lt;4.9.4-20.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970377" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970378" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+22931+799fd806 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970379" version="1" comment="runc is &lt;1.1.12-6.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970380" version="1" comment="skopeo is &lt;1.14.5-3.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970381" version="1" comment="skopeo-tests is &lt;1.14.5-3.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970382" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970383" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970384" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+22931+799fd806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970385" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+22931+799fd806 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970386" version="1" comment="bpftool is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970387" version="1" comment="kernel is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970388" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.46.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970389" version="1" comment="kernel-core is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970390" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970391" version="1" comment="kernel-debug is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970392" version="1" comment="kernel-debug-core is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970394" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970395" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970397" version="1" comment="kernel-doc is &lt;4.18.0-553.46.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970398" version="1" comment="kernel-headers is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970399" version="1" comment="kernel-modules is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970400" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970401" version="1" comment="kernel-tools is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970402" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970404" version="1" comment="perf is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970405" version="1" comment="python3-perf is &lt;4.18.0-553.46.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970621" version="1" comment="grub2-common is &lt;2.02-162.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970622" version="1" comment="grub2-efi-ia32 is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970623" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970624" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-162.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970625" version="1" comment="grub2-efi-x64 is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970626" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970627" version="1" comment="grub2-efi-x64-modules is &lt;2.02-162.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970628" version="1" comment="grub2-pc is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970629" version="1" comment="grub2-pc-modules is &lt;2.02-162.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970630" version="1" comment="grub2-tools is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970631" version="1" comment="grub2-tools-efi is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970632" version="1" comment="grub2-tools-extra is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970633" version="1" comment="grub2-tools-minimal is &lt;2.02-162.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974169" version="1" comment="python3-jinja2 is &lt;2.10.1-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974170" version="1" comment="freetype is &lt;2.9.1-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974171" version="1" comment="freetype-devel is &lt;2.9.1-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974394" version="1" comment="firefox is &lt;128.9.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974495" version="1" comment="libxslt is &lt;1.1.32-6.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974496" version="1" comment="libxslt-devel is &lt;1.1.32-6.1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974598" version="1" comment="tomcat is &lt;9.0.87-1.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974599" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974600" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974601" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974602" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974603" version="1" comment="tomcat-lib is &lt;9.0.87-1.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974604" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974605" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el8_10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974975" version="1" comment="go-toolset is &lt;1.23.6-1.module+el8.10.0+22945+b2c96a17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974976" version="1" comment="golang is &lt;1.23.6-1.module+el8.10.0+22945+b2c96a17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974977" version="1" comment="golang-bin is &lt;1.23.6-1.module+el8.10.0+22945+b2c96a17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974978" version="1" comment="golang-docs is &lt;1.23.6-1.module+el8.10.0+22945+b2c96a17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974979" version="1" comment="golang-misc is &lt;1.23.6-1.module+el8.10.0+22945+b2c96a17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974980" version="1" comment="golang-src is &lt;1.23.6-1.module+el8.10.0+22945+b2c96a17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974981" version="1" comment="golang-tests is &lt;1.23.6-1.module+el8.10.0+22945+b2c96a17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975072" version="1" comment="compat-libpthread-nonshared is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975073" version="1" comment="glibc is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975074" version="1" comment="glibc-all-langpacks is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975075" version="1" comment="glibc-benchtests is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975076" version="1" comment="glibc-common is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975077" version="1" comment="glibc-devel is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975078" version="1" comment="glibc-doc is &lt;2.28-251.el8_10.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975079" version="1" comment="glibc-gconv-extra is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975080" version="1" comment="glibc-headers is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975081" version="1" comment="glibc-langpack-aa is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975082" version="1" comment="glibc-langpack-af is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975083" version="1" comment="glibc-langpack-agr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975084" version="1" comment="glibc-langpack-ak is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975085" version="1" comment="glibc-langpack-am is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975086" version="1" comment="glibc-langpack-an is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975087" version="1" comment="glibc-langpack-anp is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975088" version="1" comment="glibc-langpack-ar is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975089" version="1" comment="glibc-langpack-as is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975090" version="1" comment="glibc-langpack-ast is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975091" version="1" comment="glibc-langpack-ayc is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975092" version="1" comment="glibc-langpack-az is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975093" version="1" comment="glibc-langpack-be is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975094" version="1" comment="glibc-langpack-bem is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975095" version="1" comment="glibc-langpack-ber is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975096" version="1" comment="glibc-langpack-bg is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975097" version="1" comment="glibc-langpack-bhb is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975098" version="1" comment="glibc-langpack-bho is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975099" version="1" comment="glibc-langpack-bi is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975100" version="1" comment="glibc-langpack-bn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975101" version="1" comment="glibc-langpack-bo is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975102" version="1" comment="glibc-langpack-br is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975103" version="1" comment="glibc-langpack-brx is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975104" version="1" comment="glibc-langpack-bs is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975105" version="1" comment="glibc-langpack-byn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975106" version="1" comment="glibc-langpack-ca is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975107" version="1" comment="glibc-langpack-ce is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975108" version="1" comment="glibc-langpack-chr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975109" version="1" comment="glibc-langpack-cmn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975110" version="1" comment="glibc-langpack-crh is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975111" version="1" comment="glibc-langpack-cs is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975112" version="1" comment="glibc-langpack-csb is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975113" version="1" comment="glibc-langpack-cv is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975114" version="1" comment="glibc-langpack-cy is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975115" version="1" comment="glibc-langpack-da is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975116" version="1" comment="glibc-langpack-de is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975117" version="1" comment="glibc-langpack-doi is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975118" version="1" comment="glibc-langpack-dsb is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975119" version="1" comment="glibc-langpack-dv is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975120" version="1" comment="glibc-langpack-dz is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975121" version="1" comment="glibc-langpack-el is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975122" version="1" comment="glibc-langpack-en is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975123" version="1" comment="glibc-langpack-eo is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975124" version="1" comment="glibc-langpack-es is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975125" version="1" comment="glibc-langpack-et is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975126" version="1" comment="glibc-langpack-eu is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975127" version="1" comment="glibc-langpack-fa is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975128" version="1" comment="glibc-langpack-ff is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975129" version="1" comment="glibc-langpack-fi is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975130" version="1" comment="glibc-langpack-fil is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975131" version="1" comment="glibc-langpack-fo is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975132" version="1" comment="glibc-langpack-fr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975133" version="1" comment="glibc-langpack-fur is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975134" version="1" comment="glibc-langpack-fy is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975135" version="1" comment="glibc-langpack-ga is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975136" version="1" comment="glibc-langpack-gd is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975137" version="1" comment="glibc-langpack-gez is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975138" version="1" comment="glibc-langpack-gl is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975139" version="1" comment="glibc-langpack-gu is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975140" version="1" comment="glibc-langpack-gv is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975141" version="1" comment="glibc-langpack-ha is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975142" version="1" comment="glibc-langpack-hak is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975143" version="1" comment="glibc-langpack-he is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975144" version="1" comment="glibc-langpack-hi is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975145" version="1" comment="glibc-langpack-hif is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975146" version="1" comment="glibc-langpack-hne is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975147" version="1" comment="glibc-langpack-hr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975148" version="1" comment="glibc-langpack-hsb is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975149" version="1" comment="glibc-langpack-ht is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975150" version="1" comment="glibc-langpack-hu is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975151" version="1" comment="glibc-langpack-hy is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975152" version="1" comment="glibc-langpack-ia is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975153" version="1" comment="glibc-langpack-id is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975154" version="1" comment="glibc-langpack-ig is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975155" version="1" comment="glibc-langpack-ik is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975156" version="1" comment="glibc-langpack-is is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975157" version="1" comment="glibc-langpack-it is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975158" version="1" comment="glibc-langpack-iu is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975159" version="1" comment="glibc-langpack-ja is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975160" version="1" comment="glibc-langpack-ka is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975161" version="1" comment="glibc-langpack-kab is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975162" version="1" comment="glibc-langpack-kk is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975163" version="1" comment="glibc-langpack-kl is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975164" version="1" comment="glibc-langpack-km is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975165" version="1" comment="glibc-langpack-kn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975166" version="1" comment="glibc-langpack-ko is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975167" version="1" comment="glibc-langpack-kok is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975168" version="1" comment="glibc-langpack-ks is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975169" version="1" comment="glibc-langpack-ku is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975170" version="1" comment="glibc-langpack-kw is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975171" version="1" comment="glibc-langpack-ky is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975172" version="1" comment="glibc-langpack-lb is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975173" version="1" comment="glibc-langpack-lg is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975174" version="1" comment="glibc-langpack-li is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975175" version="1" comment="glibc-langpack-lij is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975176" version="1" comment="glibc-langpack-ln is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975177" version="1" comment="glibc-langpack-lo is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975178" version="1" comment="glibc-langpack-lt is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975179" version="1" comment="glibc-langpack-lv is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975180" version="1" comment="glibc-langpack-lzh is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975181" version="1" comment="glibc-langpack-mag is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975182" version="1" comment="glibc-langpack-mai is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975183" version="1" comment="glibc-langpack-mfe is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975184" version="1" comment="glibc-langpack-mg is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975185" version="1" comment="glibc-langpack-mhr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975186" version="1" comment="glibc-langpack-mi is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975187" version="1" comment="glibc-langpack-miq is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975188" version="1" comment="glibc-langpack-mjw is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975189" version="1" comment="glibc-langpack-mk is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975190" version="1" comment="glibc-langpack-ml is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975191" version="1" comment="glibc-langpack-mn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975192" version="1" comment="glibc-langpack-mni is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975193" version="1" comment="glibc-langpack-mr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975194" version="1" comment="glibc-langpack-ms is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975195" version="1" comment="glibc-langpack-mt is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975196" version="1" comment="glibc-langpack-my is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975197" version="1" comment="glibc-langpack-nan is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975198" version="1" comment="glibc-langpack-nb is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975199" version="1" comment="glibc-langpack-nds is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975200" version="1" comment="glibc-langpack-ne is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975201" version="1" comment="glibc-langpack-nhn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975202" version="1" comment="glibc-langpack-niu is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975203" version="1" comment="glibc-langpack-nl is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975204" version="1" comment="glibc-langpack-nn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975205" version="1" comment="glibc-langpack-nr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975206" version="1" comment="glibc-langpack-nso is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975207" version="1" comment="glibc-langpack-oc is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975208" version="1" comment="glibc-langpack-om is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975209" version="1" comment="glibc-langpack-or is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975210" version="1" comment="glibc-langpack-os is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975211" version="1" comment="glibc-langpack-pa is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975212" version="1" comment="glibc-langpack-pap is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975213" version="1" comment="glibc-langpack-pl is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975214" version="1" comment="glibc-langpack-ps is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975215" version="1" comment="glibc-langpack-pt is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975216" version="1" comment="glibc-langpack-quz is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975217" version="1" comment="glibc-langpack-raj is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975218" version="1" comment="glibc-langpack-ro is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975219" version="1" comment="glibc-langpack-ru is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975220" version="1" comment="glibc-langpack-rw is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975221" version="1" comment="glibc-langpack-sa is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975222" version="1" comment="glibc-langpack-sah is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975223" version="1" comment="glibc-langpack-sat is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975224" version="1" comment="glibc-langpack-sc is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975225" version="1" comment="glibc-langpack-sd is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975226" version="1" comment="glibc-langpack-se is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975227" version="1" comment="glibc-langpack-sgs is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975228" version="1" comment="glibc-langpack-shn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975229" version="1" comment="glibc-langpack-shs is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975230" version="1" comment="glibc-langpack-si is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975231" version="1" comment="glibc-langpack-sid is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975232" version="1" comment="glibc-langpack-sk is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975233" version="1" comment="glibc-langpack-sl is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975234" version="1" comment="glibc-langpack-sm is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975235" version="1" comment="glibc-langpack-so is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975236" version="1" comment="glibc-langpack-sq is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975237" version="1" comment="glibc-langpack-sr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975238" version="1" comment="glibc-langpack-ss is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975239" version="1" comment="glibc-langpack-st is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975240" version="1" comment="glibc-langpack-sv is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975241" version="1" comment="glibc-langpack-sw is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975242" version="1" comment="glibc-langpack-szl is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975243" version="1" comment="glibc-langpack-ta is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975244" version="1" comment="glibc-langpack-tcy is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975245" version="1" comment="glibc-langpack-te is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975246" version="1" comment="glibc-langpack-tg is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975247" version="1" comment="glibc-langpack-th is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975248" version="1" comment="glibc-langpack-the is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975249" version="1" comment="glibc-langpack-ti is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975250" version="1" comment="glibc-langpack-tig is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975251" version="1" comment="glibc-langpack-tk is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975252" version="1" comment="glibc-langpack-tl is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975253" version="1" comment="glibc-langpack-tn is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975254" version="1" comment="glibc-langpack-to is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975255" version="1" comment="glibc-langpack-tpi is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975256" version="1" comment="glibc-langpack-tr is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975257" version="1" comment="glibc-langpack-ts is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975258" version="1" comment="glibc-langpack-tt is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975259" version="1" comment="glibc-langpack-ug is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975260" version="1" comment="glibc-langpack-uk is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975261" version="1" comment="glibc-langpack-unm is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975262" version="1" comment="glibc-langpack-ur is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975263" version="1" comment="glibc-langpack-uz is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975264" version="1" comment="glibc-langpack-ve is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975265" version="1" comment="glibc-langpack-vi is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975266" version="1" comment="glibc-langpack-wa is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975267" version="1" comment="glibc-langpack-wae is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975268" version="1" comment="glibc-langpack-wal is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975269" version="1" comment="glibc-langpack-wo is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975270" version="1" comment="glibc-langpack-xh is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975271" version="1" comment="glibc-langpack-yi is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975272" version="1" comment="glibc-langpack-yo is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975273" version="1" comment="glibc-langpack-yue is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975274" version="1" comment="glibc-langpack-yuw is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975275" version="1" comment="glibc-langpack-zh is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975276" version="1" comment="glibc-langpack-zu is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975277" version="1" comment="glibc-locale-source is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975278" version="1" comment="glibc-minimal-langpack is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975279" version="1" comment="glibc-nss-devel is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975280" version="1" comment="glibc-static is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975281" version="1" comment="glibc-utils is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975282" version="1" comment="libnsl is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975283" version="1" comment="nscd is &lt;2.28-251.el8_10.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975284" version="1" comment="nss_db is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975285" version="1" comment="nss_hesiod is &lt;2.28-251.el8_10.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976014" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976015" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976016" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976017" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976018" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976019" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976020" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976021" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976022" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976023" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976024" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976025" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976026" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976027" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976028" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.452.b09-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976029" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.452.b09-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976030" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976031" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976032" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976033" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999610" version="1" comment="java-11-openjdk is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999549" version="1" comment="java-11-openjdk-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999611" version="1" comment="java-11-openjdk-demo is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999551" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999552" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999553" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999612" version="1" comment="java-11-openjdk-devel is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999555" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999556" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999557" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999558" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999613" version="1" comment="java-11-openjdk-headless is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999560" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999561" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999562" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999614" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999564" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999615" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999566" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999616" version="1" comment="java-11-openjdk-jmods is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999568" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999569" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999570" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999571" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999617" version="1" comment="java-11-openjdk-src is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999573" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999574" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999575" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999618" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999577" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999578" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999579" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976149" version="1" comment="java-17-openjdk is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976150" version="1" comment="java-17-openjdk-demo is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976151" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976152" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976153" version="1" comment="java-17-openjdk-devel is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976154" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976155" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976156" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976157" version="1" comment="java-17-openjdk-headless is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976158" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976159" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976160" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976161" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976162" version="1" comment="java-17-openjdk-jmods is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976163" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976164" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976165" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976166" version="1" comment="java-17-openjdk-src is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976167" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976168" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976169" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976170" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976171" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976253" version="1" comment="java-21-openjdk is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976254" version="1" comment="java-21-openjdk-demo is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976255" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976256" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976257" version="1" comment="java-21-openjdk-devel is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976258" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976259" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976260" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976261" version="1" comment="java-21-openjdk-headless is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976262" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976263" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976264" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976265" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976266" version="1" comment="java-21-openjdk-jmods is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976267" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976268" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976269" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976270" version="1" comment="java-21-openjdk-src is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976271" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976272" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976273" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976274" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976275" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975553" version="1" comment="bpftool is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975554" version="1" comment="kernel is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975555" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.50.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975556" version="1" comment="kernel-core is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975557" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975558" version="1" comment="kernel-debug is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975559" version="1" comment="kernel-debug-core is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975561" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975562" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975564" version="1" comment="kernel-doc is &lt;4.18.0-553.50.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975565" version="1" comment="kernel-headers is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975566" version="1" comment="kernel-modules is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975567" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975568" version="1" comment="kernel-tools is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975569" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975571" version="1" comment="perf is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975572" version="1" comment="python3-perf is &lt;4.18.0-553.50.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975727" version="1" comment="expat is &lt;2.2.5-17.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975728" version="1" comment="expat-devel is &lt;2.2.5-17.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975984" version="1" comment="webkit2gtk3 is &lt;2.48.1-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975985" version="1" comment="webkit2gtk3-devel is &lt;2.48.1-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975986" version="1" comment="webkit2gtk3-jsc is &lt;2.48.1-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975987" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.1-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975988" version="1" comment="mod_auth_openidc is &lt;2.4.9.4-7.module+el8.10.0+23023+ba6d7066 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976047" version="1" comment="bluez is &lt;5.63-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976048" version="1" comment="bluez-cups is &lt;5.63-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976049" version="1" comment="bluez-hid2hci is &lt;5.63-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976050" version="1" comment="bluez-libs is &lt;5.63-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976051" version="1" comment="bluez-libs-devel is &lt;5.63-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976052" version="1" comment="bluez-obexd is &lt;5.63-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976172" version="1" comment="xmlrpc-c is &lt;1.51.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976173" version="1" comment="xmlrpc-c-c++ is &lt;1.51.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976174" version="1" comment="xmlrpc-c-client is &lt;1.51.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976175" version="1" comment="xmlrpc-c-client++ is &lt;1.51.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976176" version="1" comment="xmlrpc-c-devel is &lt;1.51.0-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976177" version="1" comment="libtasn1 is &lt;4.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976178" version="1" comment="libtasn1-devel is &lt;4.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976179" version="1" comment="libtasn1-tools is &lt;4.13-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976180" version="1" comment="gnutls is &lt;3.6.16-8.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976181" version="1" comment="gnutls-c++ is &lt;3.6.16-8.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976182" version="1" comment="gnutls-dane is &lt;3.6.16-8.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976183" version="1" comment="gnutls-devel is &lt;3.6.16-8.el8_10.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976184" version="1" comment="gnutls-utils is &lt;3.6.16-8.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976185" version="1" comment="ruby is &lt;3.1.7-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976186" version="1" comment="ruby-bundled-gems is &lt;3.1.7-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976187" version="1" comment="ruby-default-gems is &lt;3.1.7-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976188" version="1" comment="ruby-devel is &lt;3.1.7-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976189" version="1" comment="ruby-doc is &lt;3.1.7-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976190" version="1" comment="ruby-libs is &lt;3.1.7-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976191" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976192" version="1" comment="rubygem-bundler is &lt;2.3.27-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976193" version="1" comment="rubygem-io-console is &lt;0.5.11-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976194" version="1" comment="rubygem-irb is &lt;1.4.1-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976195" version="1" comment="rubygem-json is &lt;2.6.1-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976196" version="1" comment="rubygem-minitest is &lt;5.15.0-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976197" version="1" comment="rubygem-power_assert is &lt;2.0.1-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976198" version="1" comment="rubygem-psych is &lt;4.0.4-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976199" version="1" comment="rubygem-rake is &lt;13.0.6-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976200" version="1" comment="rubygem-rbs is &lt;2.7.0-145.module+el8.10.0+23011+f9d508f8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976201" version="1" comment="rubygem-rdoc is &lt;6.4.1.1-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976202" version="1" comment="rubygem-rexml is &lt;3.3.9-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976203" version="1" comment="rubygem-rss is &lt;0.3.1-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976204" version="1" comment="rubygem-test-unit is &lt;3.5.3-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976205" version="1" comment="rubygem-typeprof is &lt;0.21.3-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976206" version="1" comment="rubygems is &lt;3.3.27-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976207" version="1" comment="rubygems-devel is &lt;3.3.27-145.module+el8.10.0+23011+f9d508f8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976399" version="1" comment="thunderbird is &lt;128.9.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976890" version="1" comment="ghostscript is &lt;9.27-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976891" version="1" comment="ghostscript-doc is &lt;9.27-16.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976892" version="1" comment="ghostscript-tools-dvipdf is &lt;9.27-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976893" version="1" comment="ghostscript-tools-fonts is &lt;9.27-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976894" version="1" comment="ghostscript-tools-printing is &lt;9.27-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976895" version="1" comment="ghostscript-x11 is &lt;9.27-16.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976896" version="1" comment="libgs is &lt;9.27-16.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976897" version="1" comment="libgs-devel is &lt;9.27-16.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977532" version="1" comment="firefox is &lt;128.10.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977533" version="1" comment="nodejs is &lt;22.15.0-1.module+el8.10.0+23068+28ff2340 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977534" version="1" comment="nodejs-devel is &lt;22.15.0-1.module+el8.10.0+23068+28ff2340 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977535" version="1" comment="nodejs-docs is &lt;22.15.0-1.module+el8.10.0+23068+28ff2340 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977536" version="1" comment="nodejs-full-i18n is &lt;22.15.0-1.module+el8.10.0+23068+28ff2340 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977537" version="1" comment="nodejs-libs is &lt;22.15.0-1.module+el8.10.0+23068+28ff2340 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977538" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+23068+28ff2340 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977539" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.10.0+23068+28ff2340 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977540" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.10.0+23068+28ff2340 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977541" version="1" comment="npm is &lt;10.9.2-1.22.15.0.1.module+el8.10.0+23068+28ff2340 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977542" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.15.0.1.module+el8.10.0+23068+28ff2340 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977543" version="1" comment="nodejs is &lt;20.19.1-1.module+el8.10.0+23054+5431297f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977544" version="1" comment="nodejs-devel is &lt;20.19.1-1.module+el8.10.0+23054+5431297f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977545" version="1" comment="nodejs-docs is &lt;20.19.1-1.module+el8.10.0+23054+5431297f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977546" version="1" comment="nodejs-full-i18n is &lt;20.19.1-1.module+el8.10.0+23054+5431297f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977547" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+22904+d0fedeff for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977548" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.10.0+22904+d0fedeff for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977549" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.10.0+22904+d0fedeff for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977550" version="1" comment="npm is &lt;10.8.2-1.20.19.1.1.module+el8.10.0+23054+5431297f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977551" version="1" comment="libsoup is &lt;2.62.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977552" version="1" comment="libsoup-devel is &lt;2.62.3-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977553" version="1" comment="mod_auth_openidc is &lt;2.4.9.4-8.module+el8.10.0+23056+decb09b1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981836" version="1" comment="thunderbird is &lt;128.9.2-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981837" version="1" comment="libtiff is &lt;4.0.9-34.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981838" version="1" comment="libtiff-devel is &lt;4.0.9-34.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981839" version="1" comment="libtiff-tools is &lt;4.0.9-34.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981935" version="1" comment="thunderbird is &lt;128.10.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982182" version="1" comment="bpftool is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982183" version="1" comment="kernel is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982184" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.52.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982185" version="1" comment="kernel-core is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982186" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982187" version="1" comment="kernel-debug is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982188" version="1" comment="kernel-debug-core is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982190" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982191" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982193" version="1" comment="kernel-doc is &lt;4.18.0-553.52.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982194" version="1" comment="kernel-headers is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982195" version="1" comment="kernel-modules is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982196" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982197" version="1" comment="kernel-tools is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982198" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982200" version="1" comment="perf is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982201" version="1" comment="python3-perf is &lt;4.18.0-553.52.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982202" version="1" comment="ruby is &lt;2.5.9-114.module+el8.10.0+23088+750dc6ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982203" version="1" comment="ruby-devel is &lt;2.5.9-114.module+el8.10.0+23088+750dc6ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982204" version="1" comment="ruby-doc is &lt;2.5.9-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982205" version="1" comment="ruby-irb is &lt;2.5.9-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982206" version="1" comment="ruby-libs is &lt;2.5.9-114.module+el8.10.0+23088+750dc6ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982207" version="1" comment="rubygem-bigdecimal is &lt;1.3.4-114.module+el8.10.0+23088+750dc6ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982208" version="1" comment="rubygem-bundler is &lt;1.16.1-5.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982209" version="1" comment="rubygem-bundler-doc is &lt;1.16.1-5.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982210" version="1" comment="rubygem-did_you_mean is &lt;1.2.0-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982211" version="1" comment="rubygem-io-console is &lt;0.4.6-114.module+el8.10.0+23088+750dc6ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982212" version="1" comment="rubygem-json is &lt;2.1.0-114.module+el8.10.0+23088+750dc6ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982213" version="1" comment="rubygem-minitest is &lt;5.10.3-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982214" version="1" comment="rubygem-net-telnet is &lt;0.1.1-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982215" version="1" comment="rubygem-openssl is &lt;2.1.2-114.module+el8.10.0+23088+750dc6ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982216" version="1" comment="rubygem-power_assert is &lt;1.1.1-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982217" version="1" comment="rubygem-psych is &lt;3.0.2-114.module+el8.10.0+23088+750dc6ca for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982218" version="1" comment="rubygem-rake is &lt;12.3.3-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982219" version="1" comment="rubygem-rdoc is &lt;6.0.1.1-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982220" version="1" comment="rubygem-test-unit is &lt;3.2.7-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982221" version="1" comment="rubygem-xmlrpc is &lt;0.3.0-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982222" version="1" comment="rubygems is &lt;2.7.6.3-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982223" version="1" comment="rubygems-devel is &lt;2.7.6.3-114.module+el8.10.0+23088+750dc6ca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982224" version="1" comment="libjpeg-turbo is &lt;1.5.3-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982225" version="1" comment="libjpeg-turbo-devel is &lt;1.5.3-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982226" version="1" comment="libjpeg-turbo-utils is &lt;1.5.3-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982227" version="1" comment="turbojpeg is &lt;1.5.3-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982228" version="1" comment="turbojpeg-devel is &lt;1.5.3-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982229" version="1" comment="yelp is &lt;3.28.1-3.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982230" version="1" comment="yelp-devel is &lt;3.28.1-3.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982231" version="1" comment="yelp-libs is &lt;3.28.1-3.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982232" version="1" comment="yelp-xsl is &lt;3.28.0-2.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982233" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982234" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982235" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982236" version="1" comment="dotnet is &lt;9.0.106-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982237" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982238" version="1" comment="dotnet-host is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982239" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982240" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982241" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982242" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.106-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982243" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.106-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982244" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.106-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982245" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.106-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982246" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.5-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982247" version="1" comment="dotnet-templates-9.0 is &lt;9.0.106-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982248" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.106-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982249" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.16-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982250" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.16-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982251" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.16-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982252" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.16-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982253" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.16-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982254" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.16-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982255" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.16-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982256" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.116-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982257" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.116-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982258" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.116-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982259" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.16-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982260" version="1" comment="dotnet-templates-8.0 is &lt;8.0.116-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982261" version="1" comment="redis is &lt;6.2.18-1.module+el8.10.0+23050+05ea4e95 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982262" version="1" comment="redis-devel is &lt;6.2.18-1.module+el8.10.0+23050+05ea4e95 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982263" version="1" comment="redis-doc is &lt;6.2.18-1.module+el8.10.0+23050+05ea4e95 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982453" version="1" comment="grafana is &lt;9.2.10-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982454" version="1" comment="grafana-selinux is &lt;9.2.10-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982455" version="1" comment="compat-openssl10 is &lt;1.0.2o-4.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983370" version="1" comment="webkit2gtk3 is &lt;2.48.2-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983371" version="1" comment="webkit2gtk3-devel is &lt;2.48.2-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983372" version="1" comment="webkit2gtk3-jsc is &lt;2.48.2-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983373" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.2-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982631" version="1" comment="bpftool is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982632" version="1" comment="kernel is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982633" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.53.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982634" version="1" comment="kernel-core is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982635" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982636" version="1" comment="kernel-debug is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982637" version="1" comment="kernel-debug-core is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982639" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982640" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982642" version="1" comment="kernel-doc is &lt;4.18.0-553.53.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982643" version="1" comment="kernel-headers is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982644" version="1" comment="kernel-modules is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982645" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982646" version="1" comment="kernel-tools is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982647" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982649" version="1" comment="perf is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982650" version="1" comment="python3-perf is &lt;4.18.0-553.53.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982952" version="1" comment="firefox is &lt;128.10.1-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983374" version="1" comment="libsoup is &lt;2.62.3-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983375" version="1" comment="libsoup-devel is &lt;2.62.3-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983834" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.16.1-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983835" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.16.1-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983836" version="1" comment="bpftool is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983837" version="1" comment="kernel is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983838" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.54.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983839" version="1" comment="kernel-core is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983840" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983841" version="1" comment="kernel-debug is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983842" version="1" comment="kernel-debug-core is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983844" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983845" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983847" version="1" comment="kernel-doc is &lt;4.18.0-553.54.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983848" version="1" comment="kernel-headers is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983849" version="1" comment="kernel-modules is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983850" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983851" version="1" comment="kernel-tools is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983852" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983854" version="1" comment="perf is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983855" version="1" comment="python3-perf is &lt;4.18.0-553.54.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985322" version="1" comment="firefox is &lt;128.11.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985777" version="1" comment="varnish is &lt;6.0.13-1.module+el8.10.0+23111+831cc069.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985778" version="1" comment="varnish-devel is &lt;6.0.13-1.module+el8.10.0+23111+831cc069.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985779" version="1" comment="varnish-docs is &lt;6.0.13-1.module+el8.10.0+23111+831cc069.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985780" version="1" comment="varnish-modules is &lt;0.15.0-6.module+el8.10.0+21682+bcdd3a30 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985781" version="1" comment="rsync is &lt;3.1.3-23.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985782" version="1" comment="rsync-daemon is &lt;3.1.3-23.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985783" version="1" comment="krb5-devel is &lt;1.18.2-32.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985784" version="1" comment="krb5-libs is &lt;1.18.2-32.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985785" version="1" comment="krb5-pkinit is &lt;1.18.2-32.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985786" version="1" comment="krb5-server is &lt;1.18.2-32.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985787" version="1" comment="krb5-server-ldap is &lt;1.18.2-32.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985788" version="1" comment="krb5-workstation is &lt;1.18.2-32.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985789" version="1" comment="libkadm5 is &lt;1.18.2-32.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985790" version="1" comment="git is &lt;2.43.5-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985791" version="1" comment="git-all is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985792" version="1" comment="git-core is &lt;2.43.5-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985793" version="1" comment="git-core-doc is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985794" version="1" comment="git-credential-libsecret is &lt;2.43.5-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985795" version="1" comment="git-daemon is &lt;2.43.5-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985796" version="1" comment="git-email is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985797" version="1" comment="git-gui is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985798" version="1" comment="git-instaweb is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985799" version="1" comment="git-subtree is &lt;2.43.5-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985800" version="1" comment="git-svn is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985801" version="1" comment="gitk is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985802" version="1" comment="gitweb is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985803" version="1" comment="perl-Git is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985804" version="1" comment="perl-Git-SVN is &lt;2.43.5-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985805" version="1" comment="python-pymongo-doc is &lt;3.7.0-2.module+el8.10.0+23071+07f1d18e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985806" version="1" comment="python3-bson is &lt;3.7.0-2.module+el8.10.0+23071+07f1d18e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985807" version="1" comment="python3-pymongo is &lt;3.7.0-2.module+el8.10.0+23071+07f1d18e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985808" version="1" comment="python3-pymongo-gridfs is &lt;3.7.0-2.module+el8.10.0+23071+07f1d18e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985934" version="1" comment="ghostscript is &lt;9.27-17.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985935" version="1" comment="ghostscript-doc is &lt;9.27-17.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985936" version="1" comment="ghostscript-tools-dvipdf is &lt;9.27-17.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985937" version="1" comment="ghostscript-tools-fonts is &lt;9.27-17.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985938" version="1" comment="ghostscript-tools-printing is &lt;9.27-17.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985939" version="1" comment="ghostscript-x11 is &lt;9.27-17.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985940" version="1" comment="libgs is &lt;9.27-17.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985941" version="1" comment="libgs-devel is &lt;9.27-17.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985942" version="1" comment="pandoc is &lt;2.0.6-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985943" version="1" comment="pandoc-common is &lt;2.0.6-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985944" version="1" comment="perl-CPAN is &lt;2.18-402.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985945" version="1" comment="go-toolset is &lt;1.23.9-1.module+el8.10.0+23162+9223a61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985946" version="1" comment="golang is &lt;1.23.9-1.module+el8.10.0+23162+9223a61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985947" version="1" comment="golang-bin is &lt;1.23.9-1.module+el8.10.0+23162+9223a61a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985948" version="1" comment="golang-docs is &lt;1.23.9-1.module+el8.10.0+23162+9223a61a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985949" version="1" comment="golang-misc is &lt;1.23.9-1.module+el8.10.0+23162+9223a61a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985950" version="1" comment="golang-src is &lt;1.23.9-1.module+el8.10.0+23162+9223a61a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985951" version="1" comment="golang-tests is &lt;1.23.9-1.module+el8.10.0+23162+9223a61a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986157" version="1" comment="nodejs is &lt;22.16.0-1.module+el8.10.0+23140+4056b950 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986158" version="1" comment="nodejs-devel is &lt;22.16.0-1.module+el8.10.0+23140+4056b950 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986159" version="1" comment="nodejs-docs is &lt;22.16.0-1.module+el8.10.0+23140+4056b950 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986160" version="1" comment="nodejs-full-i18n is &lt;22.16.0-1.module+el8.10.0+23140+4056b950 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986161" version="1" comment="nodejs-libs is &lt;22.16.0-1.module+el8.10.0+23140+4056b950 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986165" version="1" comment="npm is &lt;10.9.2-1.22.16.0.1.module+el8.10.0+23140+4056b950 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986166" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.16.0.1.module+el8.10.0+23140+4056b950 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986167" version="1" comment="nodejs is &lt;20.19.2-1.module+el8.10.0+23139+21ba74c5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986168" version="1" comment="nodejs-devel is &lt;20.19.2-1.module+el8.10.0+23139+21ba74c5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986169" version="1" comment="nodejs-docs is &lt;20.19.2-1.module+el8.10.0+23139+21ba74c5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986170" version="1" comment="nodejs-full-i18n is &lt;20.19.2-1.module+el8.10.0+23139+21ba74c5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986171" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+23139+21ba74c5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986172" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el8.10.0+23139+21ba74c5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986173" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el8.10.0+23139+21ba74c5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986174" version="1" comment="npm is &lt;10.8.2-1.20.19.2.1.module+el8.10.0+23139+21ba74c5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986175" version="1" comment="grafana is &lt;9.2.10-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986176" version="1" comment="grafana-selinux is &lt;9.2.10-25.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986636" version="1" comment="libxslt is &lt;1.1.32-6.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986637" version="1" comment="libxslt-devel is &lt;1.1.32-6.2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997442" version="1" comment="compat-libpthread-nonshared is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997443" version="1" comment="glibc is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997444" version="1" comment="glibc-all-langpacks is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997445" version="1" comment="glibc-benchtests is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997446" version="1" comment="glibc-common is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997447" version="1" comment="glibc-devel is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997448" version="1" comment="glibc-doc is &lt;2.28-251.el8_10.22 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997449" version="1" comment="glibc-gconv-extra is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997450" version="1" comment="glibc-headers is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997451" version="1" comment="glibc-langpack-aa is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997452" version="1" comment="glibc-langpack-af is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997453" version="1" comment="glibc-langpack-agr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997454" version="1" comment="glibc-langpack-ak is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997455" version="1" comment="glibc-langpack-am is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997456" version="1" comment="glibc-langpack-an is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997457" version="1" comment="glibc-langpack-anp is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997458" version="1" comment="glibc-langpack-ar is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997459" version="1" comment="glibc-langpack-as is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997460" version="1" comment="glibc-langpack-ast is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997461" version="1" comment="glibc-langpack-ayc is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997462" version="1" comment="glibc-langpack-az is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997463" version="1" comment="glibc-langpack-be is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997464" version="1" comment="glibc-langpack-bem is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997465" version="1" comment="glibc-langpack-ber is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997466" version="1" comment="glibc-langpack-bg is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997467" version="1" comment="glibc-langpack-bhb is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997468" version="1" comment="glibc-langpack-bho is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997469" version="1" comment="glibc-langpack-bi is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997470" version="1" comment="glibc-langpack-bn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997471" version="1" comment="glibc-langpack-bo is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997472" version="1" comment="glibc-langpack-br is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997473" version="1" comment="glibc-langpack-brx is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997474" version="1" comment="glibc-langpack-bs is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997475" version="1" comment="glibc-langpack-byn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997476" version="1" comment="glibc-langpack-ca is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997477" version="1" comment="glibc-langpack-ce is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997478" version="1" comment="glibc-langpack-chr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997479" version="1" comment="glibc-langpack-cmn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997480" version="1" comment="glibc-langpack-crh is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997481" version="1" comment="glibc-langpack-cs is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997482" version="1" comment="glibc-langpack-csb is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997483" version="1" comment="glibc-langpack-cv is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997484" version="1" comment="glibc-langpack-cy is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997485" version="1" comment="glibc-langpack-da is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997486" version="1" comment="glibc-langpack-de is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997487" version="1" comment="glibc-langpack-doi is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997488" version="1" comment="glibc-langpack-dsb is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997489" version="1" comment="glibc-langpack-dv is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997490" version="1" comment="glibc-langpack-dz is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997491" version="1" comment="glibc-langpack-el is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997492" version="1" comment="glibc-langpack-en is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997493" version="1" comment="glibc-langpack-eo is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997494" version="1" comment="glibc-langpack-es is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997495" version="1" comment="glibc-langpack-et is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997496" version="1" comment="glibc-langpack-eu is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997497" version="1" comment="glibc-langpack-fa is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997498" version="1" comment="glibc-langpack-ff is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997499" version="1" comment="glibc-langpack-fi is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997500" version="1" comment="glibc-langpack-fil is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997501" version="1" comment="glibc-langpack-fo is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997502" version="1" comment="glibc-langpack-fr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997503" version="1" comment="glibc-langpack-fur is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997504" version="1" comment="glibc-langpack-fy is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997505" version="1" comment="glibc-langpack-ga is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997506" version="1" comment="glibc-langpack-gd is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997507" version="1" comment="glibc-langpack-gez is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997508" version="1" comment="glibc-langpack-gl is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997509" version="1" comment="glibc-langpack-gu is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997510" version="1" comment="glibc-langpack-gv is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997511" version="1" comment="glibc-langpack-ha is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997512" version="1" comment="glibc-langpack-hak is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997513" version="1" comment="glibc-langpack-he is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997514" version="1" comment="glibc-langpack-hi is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997515" version="1" comment="glibc-langpack-hif is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997516" version="1" comment="glibc-langpack-hne is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997517" version="1" comment="glibc-langpack-hr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997518" version="1" comment="glibc-langpack-hsb is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997519" version="1" comment="glibc-langpack-ht is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997520" version="1" comment="glibc-langpack-hu is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997521" version="1" comment="glibc-langpack-hy is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997522" version="1" comment="glibc-langpack-ia is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997523" version="1" comment="glibc-langpack-id is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997524" version="1" comment="glibc-langpack-ig is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997525" version="1" comment="glibc-langpack-ik is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997526" version="1" comment="glibc-langpack-is is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997527" version="1" comment="glibc-langpack-it is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997528" version="1" comment="glibc-langpack-iu is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997529" version="1" comment="glibc-langpack-ja is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997530" version="1" comment="glibc-langpack-ka is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997531" version="1" comment="glibc-langpack-kab is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997532" version="1" comment="glibc-langpack-kk is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997533" version="1" comment="glibc-langpack-kl is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997534" version="1" comment="glibc-langpack-km is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997535" version="1" comment="glibc-langpack-kn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997536" version="1" comment="glibc-langpack-ko is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997537" version="1" comment="glibc-langpack-kok is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997538" version="1" comment="glibc-langpack-ks is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997539" version="1" comment="glibc-langpack-ku is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997540" version="1" comment="glibc-langpack-kw is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997541" version="1" comment="glibc-langpack-ky is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997542" version="1" comment="glibc-langpack-lb is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997543" version="1" comment="glibc-langpack-lg is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997544" version="1" comment="glibc-langpack-li is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997545" version="1" comment="glibc-langpack-lij is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997546" version="1" comment="glibc-langpack-ln is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997547" version="1" comment="glibc-langpack-lo is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997548" version="1" comment="glibc-langpack-lt is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997549" version="1" comment="glibc-langpack-lv is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997550" version="1" comment="glibc-langpack-lzh is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997551" version="1" comment="glibc-langpack-mag is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997552" version="1" comment="glibc-langpack-mai is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997553" version="1" comment="glibc-langpack-mfe is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997554" version="1" comment="glibc-langpack-mg is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997555" version="1" comment="glibc-langpack-mhr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997556" version="1" comment="glibc-langpack-mi is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997557" version="1" comment="glibc-langpack-miq is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997558" version="1" comment="glibc-langpack-mjw is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997559" version="1" comment="glibc-langpack-mk is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997560" version="1" comment="glibc-langpack-ml is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997561" version="1" comment="glibc-langpack-mn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997562" version="1" comment="glibc-langpack-mni is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997563" version="1" comment="glibc-langpack-mr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997564" version="1" comment="glibc-langpack-ms is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997565" version="1" comment="glibc-langpack-mt is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997566" version="1" comment="glibc-langpack-my is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997567" version="1" comment="glibc-langpack-nan is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997568" version="1" comment="glibc-langpack-nb is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997569" version="1" comment="glibc-langpack-nds is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997570" version="1" comment="glibc-langpack-ne is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997571" version="1" comment="glibc-langpack-nhn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997572" version="1" comment="glibc-langpack-niu is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997573" version="1" comment="glibc-langpack-nl is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997574" version="1" comment="glibc-langpack-nn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997575" version="1" comment="glibc-langpack-nr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997576" version="1" comment="glibc-langpack-nso is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997577" version="1" comment="glibc-langpack-oc is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997578" version="1" comment="glibc-langpack-om is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997579" version="1" comment="glibc-langpack-or is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997580" version="1" comment="glibc-langpack-os is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997581" version="1" comment="glibc-langpack-pa is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997582" version="1" comment="glibc-langpack-pap is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997583" version="1" comment="glibc-langpack-pl is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997584" version="1" comment="glibc-langpack-ps is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997585" version="1" comment="glibc-langpack-pt is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997586" version="1" comment="glibc-langpack-quz is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997587" version="1" comment="glibc-langpack-raj is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997588" version="1" comment="glibc-langpack-ro is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997589" version="1" comment="glibc-langpack-ru is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997590" version="1" comment="glibc-langpack-rw is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997591" version="1" comment="glibc-langpack-sa is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997592" version="1" comment="glibc-langpack-sah is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997593" version="1" comment="glibc-langpack-sat is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997594" version="1" comment="glibc-langpack-sc is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997595" version="1" comment="glibc-langpack-sd is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997596" version="1" comment="glibc-langpack-se is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997597" version="1" comment="glibc-langpack-sgs is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997598" version="1" comment="glibc-langpack-shn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997599" version="1" comment="glibc-langpack-shs is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997600" version="1" comment="glibc-langpack-si is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997601" version="1" comment="glibc-langpack-sid is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997602" version="1" comment="glibc-langpack-sk is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997603" version="1" comment="glibc-langpack-sl is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997604" version="1" comment="glibc-langpack-sm is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997605" version="1" comment="glibc-langpack-so is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997606" version="1" comment="glibc-langpack-sq is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997607" version="1" comment="glibc-langpack-sr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997608" version="1" comment="glibc-langpack-ss is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997609" version="1" comment="glibc-langpack-st is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997610" version="1" comment="glibc-langpack-sv is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997611" version="1" comment="glibc-langpack-sw is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997612" version="1" comment="glibc-langpack-szl is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997613" version="1" comment="glibc-langpack-ta is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997614" version="1" comment="glibc-langpack-tcy is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997615" version="1" comment="glibc-langpack-te is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997616" version="1" comment="glibc-langpack-tg is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997617" version="1" comment="glibc-langpack-th is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997618" version="1" comment="glibc-langpack-the is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997619" version="1" comment="glibc-langpack-ti is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997620" version="1" comment="glibc-langpack-tig is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997621" version="1" comment="glibc-langpack-tk is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997622" version="1" comment="glibc-langpack-tl is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997623" version="1" comment="glibc-langpack-tn is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997624" version="1" comment="glibc-langpack-to is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997625" version="1" comment="glibc-langpack-tpi is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997626" version="1" comment="glibc-langpack-tr is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997627" version="1" comment="glibc-langpack-ts is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997628" version="1" comment="glibc-langpack-tt is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997629" version="1" comment="glibc-langpack-ug is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997630" version="1" comment="glibc-langpack-uk is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997631" version="1" comment="glibc-langpack-unm is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997632" version="1" comment="glibc-langpack-ur is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997633" version="1" comment="glibc-langpack-uz is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997634" version="1" comment="glibc-langpack-ve is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997635" version="1" comment="glibc-langpack-vi is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997636" version="1" comment="glibc-langpack-wa is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997637" version="1" comment="glibc-langpack-wae is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997638" version="1" comment="glibc-langpack-wal is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997639" version="1" comment="glibc-langpack-wo is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997640" version="1" comment="glibc-langpack-xh is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997641" version="1" comment="glibc-langpack-yi is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997642" version="1" comment="glibc-langpack-yo is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997643" version="1" comment="glibc-langpack-yue is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997644" version="1" comment="glibc-langpack-yuw is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997645" version="1" comment="glibc-langpack-zh is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997646" version="1" comment="glibc-langpack-zu is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997647" version="1" comment="glibc-locale-source is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997648" version="1" comment="glibc-minimal-langpack is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997649" version="1" comment="glibc-nss-devel is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997650" version="1" comment="glibc-static is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997651" version="1" comment="glibc-utils is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997652" version="1" comment="libnsl is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997653" version="1" comment="nscd is &lt;2.28-251.el8_10.22 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997654" version="1" comment="nss_db is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997655" version="1" comment="nss_hesiod is &lt;2.28-251.el8_10.22 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986290" version="1" comment="bpftool is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986291" version="1" comment="kernel is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986292" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.56.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986293" version="1" comment="kernel-core is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986294" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986295" version="1" comment="kernel-debug is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986296" version="1" comment="kernel-debug-core is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986298" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986299" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986301" version="1" comment="kernel-doc is &lt;4.18.0-553.56.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986302" version="1" comment="kernel-headers is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986303" version="1" comment="kernel-modules is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986304" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986305" version="1" comment="kernel-tools is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986306" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986308" version="1" comment="perf is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986309" version="1" comment="python3-perf is &lt;4.18.0-553.56.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986310" version="1" comment="thunderbird is &lt;128.11.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986638" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.17-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986639" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.17-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986640" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.17-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986641" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.17-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986642" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.17-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986643" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.17-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986644" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.17-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986645" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.117-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986646" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.117-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986647" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.117-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986648" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.17-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986649" version="1" comment="dotnet-templates-8.0 is &lt;8.0.117-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986796" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986797" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986798" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986799" version="1" comment="dotnet is &lt;9.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986800" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986801" version="1" comment="dotnet-host is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986802" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986803" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986804" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986805" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986806" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986807" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986808" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986809" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.6-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986810" version="1" comment="dotnet-templates-9.0 is &lt;9.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986811" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.107-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986650" version="1" comment="mod_security is &lt;2.9.6-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986651" version="1" comment="mod_security-mlogc is &lt;2.9.6-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986964" version="1" comment="grafana-pcp is &lt;5.1.1-10.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986965" version="1" comment="libxml2 is &lt;2.9.7-20.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986966" version="1" comment="libxml2-devel is &lt;2.9.7-20.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986967" version="1" comment="python3-libxml2 is &lt;2.9.7-20.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986968" version="1" comment="git-lfs is &lt;3.4.1-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986969" version="1" comment="libvpx is &lt;1.7.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986970" version="1" comment="libvpx-devel is &lt;1.7.0-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986834" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986835" version="1" comment="buildah is &lt;1.33.12-2.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986836" version="1" comment="buildah-tests is &lt;1.33.12-2.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986837" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+23250+94af2c8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986838" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986839" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+23250+94af2c8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986840" version="1" comment="containernetworking-plugins is &lt;1.4.0-6.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986841" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986842" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986843" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986844" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986845" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986846" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986847" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986848" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986849" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986850" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986851" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986852" version="1" comment="podman is &lt;4.9.4-20.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986853" version="1" comment="podman-catatonit is &lt;4.9.4-20.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986854" version="1" comment="podman-docker is &lt;4.9.4-20.module+el8.10.0+23250+94af2c8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986855" version="1" comment="podman-gvproxy is &lt;4.9.4-20.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986856" version="1" comment="podman-plugins is &lt;4.9.4-20.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986857" version="1" comment="podman-remote is &lt;4.9.4-20.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986858" version="1" comment="podman-tests is &lt;4.9.4-20.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986859" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986860" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+23250+94af2c8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986861" version="1" comment="runc is &lt;1.1.12-6.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986862" version="1" comment="skopeo is &lt;1.14.5-4.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986863" version="1" comment="skopeo-tests is &lt;1.14.5-4.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986864" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986865" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986866" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+23250+94af2c8e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986867" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+23250+94af2c8e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987301" version="1" comment="gimp is &lt;2.8.22-26.module+el8.10.0+23269+4b36efb0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987302" version="1" comment="gimp-devel is &lt;2.8.22-26.module+el8.10.0+23269+4b36efb0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987303" version="1" comment="gimp-devel-tools is &lt;2.8.22-26.module+el8.10.0+23269+4b36efb0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987304" version="1" comment="gimp-libs is &lt;2.8.22-26.module+el8.10.0+23269+4b36efb0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996827" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996828" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996829" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996830" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996831" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996832" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-18.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996833" version="1" comment="xorg-x11-server-common is &lt;1.20.11-26.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996834" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-26.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996835" version="1" comment="xorg-x11-server-source is &lt;1.20.11-26.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020882" version="1" comment="ant is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020883" version="1" comment="ant-antlr is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020884" version="1" comment="ant-apache-bcel is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020885" version="1" comment="ant-apache-bsf is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020886" version="1" comment="ant-apache-log4j is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020887" version="1" comment="ant-apache-oro is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020888" version="1" comment="ant-apache-regexp is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020889" version="1" comment="ant-apache-resolver is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020890" version="1" comment="ant-apache-xalan2 is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020891" version="1" comment="ant-commons-logging is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020892" version="1" comment="ant-commons-net is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020893" version="1" comment="ant-contrib is &lt;1.0-0.32.b3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020894" version="1" comment="ant-contrib-javadoc is &lt;1.0-0.32.b3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020895" version="1" comment="ant-javadoc is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020896" version="1" comment="ant-javamail is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020897" version="1" comment="ant-jdepend is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020898" version="1" comment="ant-jmf is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020899" version="1" comment="ant-jsch is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020900" version="1" comment="ant-junit is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020901" version="1" comment="ant-lib is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020902" version="1" comment="ant-manual is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020903" version="1" comment="ant-swing is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020904" version="1" comment="ant-testutil is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020905" version="1" comment="ant-xz is &lt;1.10.5-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020906" version="1" comment="antlr-C++ is &lt;2.7.7-56.module+el8.10.0+23274+27840b45 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020907" version="1" comment="antlr-javadoc is &lt;2.7.7-56.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020908" version="1" comment="antlr-manual is &lt;2.7.7-56.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020909" version="1" comment="antlr-tool is &lt;2.7.7-56.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020910" version="1" comment="aopalliance is &lt;1.0-17.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020911" version="1" comment="aopalliance-javadoc is &lt;1.0-17.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020912" version="1" comment="apache-commons-beanutils is &lt;1.9.3-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020913" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.3-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020914" version="1" comment="apache-commons-cli is &lt;1.4-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020915" version="1" comment="apache-commons-cli-javadoc is &lt;1.4-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020916" version="1" comment="apache-commons-codec is &lt;1.11-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020917" version="1" comment="apache-commons-codec-javadoc is &lt;1.11-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020918" version="1" comment="apache-commons-collections is &lt;3.2.2-10.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020919" version="1" comment="apache-commons-collections-javadoc is &lt;3.2.2-10.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020920" version="1" comment="apache-commons-collections-testframework is &lt;3.2.2-10.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020921" version="1" comment="apache-commons-compress is &lt;1.18-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020922" version="1" comment="apache-commons-compress-javadoc is &lt;1.18-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020923" version="1" comment="apache-commons-exec is &lt;1.3-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020924" version="1" comment="apache-commons-exec-javadoc is &lt;1.3-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020925" version="1" comment="apache-commons-io is &lt;2.6-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020926" version="1" comment="apache-commons-io-javadoc is &lt;2.6-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020927" version="1" comment="apache-commons-jxpath is &lt;1.3-29.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020928" version="1" comment="apache-commons-jxpath-javadoc is &lt;1.3-29.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020929" version="1" comment="apache-commons-lang is &lt;2.6-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020930" version="1" comment="apache-commons-lang-javadoc is &lt;2.6-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020931" version="1" comment="apache-commons-lang3 is &lt;3.7-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020932" version="1" comment="apache-commons-lang3-javadoc is &lt;3.7-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020933" version="1" comment="apache-commons-logging is &lt;1.2-13.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020934" version="1" comment="apache-commons-logging-javadoc is &lt;1.2-13.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020935" version="1" comment="apache-commons-net is &lt;3.6-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020936" version="1" comment="apache-commons-net-javadoc is &lt;3.6-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020937" version="1" comment="apache-commons-parent is &lt;43-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020938" version="1" comment="apache-ivy is &lt;2.4.0-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020939" version="1" comment="apache-ivy-javadoc is &lt;2.4.0-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020940" version="1" comment="apache-parent is &lt;19-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020941" version="1" comment="apache-resource-bundles is &lt;2-20.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020942" version="1" comment="aqute-bnd is &lt;3.5.0-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020943" version="1" comment="aqute-bnd-javadoc is &lt;3.5.0-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020944" version="1" comment="aqute-bndlib is &lt;3.5.0-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020945" version="1" comment="assertj-core is &lt;3.8.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020946" version="1" comment="assertj-core-javadoc is &lt;3.8.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020947" version="1" comment="atinject is &lt;1-28.20100611svn86.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020948" version="1" comment="atinject-javadoc is &lt;1-28.20100611svn86.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020949" version="1" comment="atinject-tck is &lt;1-28.20100611svn86.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020950" version="1" comment="bcel is &lt;6.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020951" version="1" comment="bcel-javadoc is &lt;6.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020952" version="1" comment="beust-jcommander is &lt;1.71-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020953" version="1" comment="beust-jcommander-javadoc is &lt;1.71-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020954" version="1" comment="bnd-maven-plugin is &lt;3.5.0-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020955" version="1" comment="bsf is &lt;2.4.0-30.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020956" version="1" comment="bsf-javadoc is &lt;2.4.0-30.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020957" version="1" comment="bsh is &lt;2.0-13.b6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020958" version="1" comment="bsh-javadoc is &lt;2.0-13.b6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020959" version="1" comment="bsh-manual is &lt;2.0-13.b6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020960" version="1" comment="byaccj is &lt;1.15-17.module+el8.10.0+23274+27840b45 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020961" version="1" comment="cal10n is &lt;0.8.1-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020962" version="1" comment="cal10n-javadoc is &lt;0.8.1-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020963" version="1" comment="cdi-api is &lt;1.2-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020964" version="1" comment="cdi-api-javadoc is &lt;1.2-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020965" version="1" comment="cglib is &lt;3.2.4-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020966" version="1" comment="cglib-javadoc is &lt;3.2.4-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020967" version="1" comment="easymock is &lt;3.5-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020968" version="1" comment="easymock-javadoc is &lt;3.5-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020969" version="1" comment="exec-maven-plugin is &lt;1.6.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020970" version="1" comment="exec-maven-plugin-javadoc is &lt;1.6.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020971" version="1" comment="felix-osgi-compendium is &lt;1.4.0-26.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020972" version="1" comment="felix-osgi-compendium-javadoc is &lt;1.4.0-26.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020973" version="1" comment="felix-osgi-core is &lt;1.4.0-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020974" version="1" comment="felix-osgi-core-javadoc is &lt;1.4.0-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020975" version="1" comment="felix-osgi-foundation is &lt;1.2.0-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020976" version="1" comment="felix-osgi-foundation-javadoc is &lt;1.2.0-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020977" version="1" comment="felix-parent is &lt;4-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020978" version="1" comment="felix-utils is &lt;1.10.4-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020979" version="1" comment="felix-utils-javadoc is &lt;1.10.4-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020980" version="1" comment="forge-parent is &lt;38-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020981" version="1" comment="fusesource-pom is &lt;1.11-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020982" version="1" comment="geronimo-annotation is &lt;1.0-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020983" version="1" comment="geronimo-annotation-javadoc is &lt;1.0-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020984" version="1" comment="geronimo-jms is &lt;1.1.1-25.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020985" version="1" comment="geronimo-jms-javadoc is &lt;1.1.1-25.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020986" version="1" comment="geronimo-jpa is &lt;1.1.1-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020987" version="1" comment="geronimo-jpa-javadoc is &lt;1.1.1-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020988" version="1" comment="geronimo-parent-poms is &lt;1.6-25.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020989" version="1" comment="glassfish-annotation-api is &lt;1.2-13.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020990" version="1" comment="glassfish-annotation-api-javadoc is &lt;1.2-13.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020991" version="1" comment="glassfish-el is &lt;3.0.1-0.7.b08.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020992" version="1" comment="glassfish-el-api is &lt;3.0.1-0.7.b08.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020993" version="1" comment="glassfish-el-javadoc is &lt;3.0.1-0.7.b08.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020994" version="1" comment="glassfish-jsp-api is &lt;2.3.2-0.9.b01.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020995" version="1" comment="glassfish-jsp-api-javadoc is &lt;2.3.2-0.9.b01.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020996" version="1" comment="glassfish-legal is &lt;1.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020997" version="1" comment="glassfish-master-pom is &lt;8-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020998" version="1" comment="glassfish-servlet-api is &lt;3.1.0-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020999" version="1" comment="glassfish-servlet-api-javadoc is &lt;3.1.0-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021000" version="1" comment="google-guice is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021001" version="1" comment="google-guice-javadoc is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021002" version="1" comment="guava20 is &lt;20.0-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021003" version="1" comment="guava20-javadoc is &lt;20.0-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021004" version="1" comment="guava20-testlib is &lt;20.0-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021005" version="1" comment="guice-assistedinject is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021006" version="1" comment="guice-bom is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021007" version="1" comment="guice-extensions is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021008" version="1" comment="guice-grapher is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021009" version="1" comment="guice-jmx is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021010" version="1" comment="guice-jndi is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021011" version="1" comment="guice-multibindings is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021012" version="1" comment="guice-parent is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021013" version="1" comment="guice-servlet is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021014" version="1" comment="guice-testlib is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021015" version="1" comment="guice-throwingproviders is &lt;4.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021016" version="1" comment="hamcrest is &lt;1.3-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021017" version="1" comment="hamcrest-core is &lt;1.3-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021018" version="1" comment="hamcrest-demo is &lt;1.3-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021019" version="1" comment="hamcrest-javadoc is &lt;1.3-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021020" version="1" comment="hawtjni is &lt;1.16-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021021" version="1" comment="hawtjni-javadoc is &lt;1.16-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021022" version="1" comment="hawtjni-runtime is &lt;1.16-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021023" version="1" comment="httpcomponents-client is &lt;4.5.5-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021024" version="1" comment="httpcomponents-client-cache is &lt;4.5.5-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021025" version="1" comment="httpcomponents-client-javadoc is &lt;4.5.5-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021026" version="1" comment="httpcomponents-core is &lt;4.4.10-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021027" version="1" comment="httpcomponents-core-javadoc is &lt;4.4.10-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021028" version="1" comment="httpcomponents-project is &lt;9-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021029" version="1" comment="isorelax is &lt;0-0.23.release20050331.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021030" version="1" comment="isorelax-javadoc is &lt;0-0.23.release20050331.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021031" version="1" comment="ivy-local is &lt;5.3.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021032" version="1" comment="jakarta-commons-httpclient is &lt;3.1-28.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021033" version="1" comment="jakarta-commons-httpclient-demo is &lt;3.1-28.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021034" version="1" comment="jakarta-commons-httpclient-javadoc is &lt;3.1-28.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021035" version="1" comment="jakarta-commons-httpclient-manual is &lt;3.1-28.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021036" version="1" comment="jakarta-oro is &lt;2.0.8-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021037" version="1" comment="jakarta-oro-javadoc is &lt;2.0.8-23.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021038" version="1" comment="jansi is &lt;1.17.1-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021039" version="1" comment="jansi-javadoc is &lt;1.17.1-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021040" version="1" comment="jansi-native is &lt;1.7-7.module+el8.10.0+23274+27840b45 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021041" version="1" comment="jansi-native-javadoc is &lt;1.7-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021042" version="1" comment="java_cup is &lt;0.11b-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021043" version="1" comment="java_cup-javadoc is &lt;0.11b-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021044" version="1" comment="java_cup-manual is &lt;0.11b-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021045" version="1" comment="javacc is &lt;7.0.2-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021046" version="1" comment="javacc-demo is &lt;7.0.2-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021047" version="1" comment="javacc-javadoc is &lt;7.0.2-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021048" version="1" comment="javacc-manual is &lt;7.0.2-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021049" version="1" comment="javacc-maven-plugin is &lt;2.6-25.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021050" version="1" comment="javacc-maven-plugin-javadoc is &lt;2.6-25.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021051" version="1" comment="javamail is &lt;1.5.2-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021052" version="1" comment="javamail-javadoc is &lt;1.5.2-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021053" version="1" comment="javapackages-filesystem is &lt;5.3.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021054" version="1" comment="javapackages-local is &lt;5.3.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021055" version="1" comment="javapackages-tools is &lt;5.3.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021056" version="1" comment="javassist is &lt;3.18.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021057" version="1" comment="javassist-javadoc is &lt;3.18.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021058" version="1" comment="jaxen is &lt;1.1.6-18.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021059" version="1" comment="jaxen-demo is &lt;1.1.6-18.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021060" version="1" comment="jaxen-javadoc is &lt;1.1.6-18.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021061" version="1" comment="jboss-interceptors-1.2-api is &lt;1.0.0-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021062" version="1" comment="jboss-interceptors-1.2-api-javadoc is &lt;1.0.0-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021063" version="1" comment="jboss-parent is &lt;20-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021064" version="1" comment="jcl-over-slf4j is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021065" version="1" comment="jdepend is &lt;2.9.1-18.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021066" version="1" comment="jdepend-demo is &lt;2.9.1-18.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021067" version="1" comment="jdepend-javadoc is &lt;2.9.1-18.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021068" version="1" comment="jdependency is &lt;1.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021069" version="1" comment="jdependency-javadoc is &lt;1.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021070" version="1" comment="jdom is &lt;1.1.3-17.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021071" version="1" comment="jdom-demo is &lt;1.1.3-17.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021072" version="1" comment="jdom-javadoc is &lt;1.1.3-17.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021073" version="1" comment="jdom2 is &lt;2.0.6-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021074" version="1" comment="jdom2-javadoc is &lt;2.0.6-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021075" version="1" comment="jflex is &lt;1.6.1-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021076" version="1" comment="jflex-javadoc is &lt;1.6.1-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021077" version="1" comment="jline is &lt;2.14.6-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021078" version="1" comment="jline-javadoc is &lt;2.14.6-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021079" version="1" comment="jsch is &lt;0.1.54-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021080" version="1" comment="jsch-javadoc is &lt;0.1.54-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021081" version="1" comment="jsoup is &lt;1.11.3-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021082" version="1" comment="jsoup-javadoc is &lt;1.11.3-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021083" version="1" comment="jsr-305 is &lt;0-0.22.20130910svn.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021084" version="1" comment="jsr-305-javadoc is &lt;0-0.22.20130910svn.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021085" version="1" comment="jtidy is &lt;1.0-0.28.20100930svn1125.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021086" version="1" comment="jtidy-javadoc is &lt;1.0-0.28.20100930svn1125.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021087" version="1" comment="jul-to-slf4j is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021088" version="1" comment="junit is &lt;4.12-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021089" version="1" comment="junit-javadoc is &lt;4.12-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021090" version="1" comment="junit-manual is &lt;4.12-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021091" version="1" comment="jvnet-parent is &lt;4-10.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021092" version="1" comment="jzlib is &lt;1.1.3-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021093" version="1" comment="jzlib-demo is &lt;1.1.3-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021094" version="1" comment="jzlib-javadoc is &lt;1.1.3-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021095" version="1" comment="log4j-over-slf4j is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021096" version="1" comment="log4j12 is &lt;1.2.17-22.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021097" version="1" comment="log4j12-javadoc is &lt;1.2.17-22.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021098" version="1" comment="maven is &lt;3.5.4-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021099" version="1" comment="maven-antrun-plugin is &lt;1.8-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021100" version="1" comment="maven-antrun-plugin-javadoc is &lt;1.8-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021101" version="1" comment="maven-archiver is &lt;3.2.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021102" version="1" comment="maven-archiver-javadoc is &lt;3.2.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021103" version="1" comment="maven-artifact is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021104" version="1" comment="maven-artifact-manager is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021105" version="1" comment="maven-artifact-resolver is &lt;1.0-18.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021106" version="1" comment="maven-artifact-resolver-javadoc is &lt;1.0-18.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021107" version="1" comment="maven-artifact-transfer is &lt;0.9.0-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021108" version="1" comment="maven-artifact-transfer-javadoc is &lt;0.9.0-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021109" version="1" comment="maven-assembly-plugin is &lt;3.1.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021110" version="1" comment="maven-assembly-plugin-javadoc is &lt;3.1.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021111" version="1" comment="maven-cal10n-plugin is &lt;0.8.1-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021112" version="1" comment="maven-clean-plugin is &lt;3.0.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021113" version="1" comment="maven-clean-plugin-javadoc is &lt;3.0.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021114" version="1" comment="maven-common-artifact-filters is &lt;3.0.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021115" version="1" comment="maven-common-artifact-filters-javadoc is &lt;3.0.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021116" version="1" comment="maven-compiler-plugin is &lt;3.7.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021117" version="1" comment="maven-compiler-plugin-javadoc is &lt;3.7.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021118" version="1" comment="maven-dependency-analyzer is &lt;1.8-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021119" version="1" comment="maven-dependency-analyzer-javadoc is &lt;1.8-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021120" version="1" comment="maven-dependency-plugin is &lt;3.0.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021121" version="1" comment="maven-dependency-plugin-javadoc is &lt;3.0.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021122" version="1" comment="maven-dependency-tree is &lt;3.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021123" version="1" comment="maven-dependency-tree-javadoc is &lt;3.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021124" version="1" comment="maven-doxia is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021125" version="1" comment="maven-doxia-core is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021126" version="1" comment="maven-doxia-javadoc is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021127" version="1" comment="maven-doxia-logging-api is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021128" version="1" comment="maven-doxia-module-apt is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021129" version="1" comment="maven-doxia-module-confluence is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021130" version="1" comment="maven-doxia-module-docbook-simple is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021131" version="1" comment="maven-doxia-module-fml is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021132" version="1" comment="maven-doxia-module-latex is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021133" version="1" comment="maven-doxia-module-rtf is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021134" version="1" comment="maven-doxia-module-twiki is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021135" version="1" comment="maven-doxia-module-xdoc is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021136" version="1" comment="maven-doxia-module-xhtml is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021137" version="1" comment="maven-doxia-modules is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021138" version="1" comment="maven-doxia-sink-api is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021139" version="1" comment="maven-doxia-sitetools is &lt;1.7.5-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021140" version="1" comment="maven-doxia-sitetools-javadoc is &lt;1.7.5-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021141" version="1" comment="maven-doxia-test-docs is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021142" version="1" comment="maven-doxia-tests is &lt;1.7-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021143" version="1" comment="maven-enforcer is &lt;1.4.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021144" version="1" comment="maven-enforcer-api is &lt;1.4.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021145" version="1" comment="maven-enforcer-javadoc is &lt;1.4.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021146" version="1" comment="maven-enforcer-plugin is &lt;1.4.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021147" version="1" comment="maven-enforcer-rules is &lt;1.4.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021148" version="1" comment="maven-failsafe-plugin is &lt;2.22.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021149" version="1" comment="maven-file-management is &lt;3.0.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021150" version="1" comment="maven-file-management-javadoc is &lt;3.0.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021151" version="1" comment="maven-filtering is &lt;3.1.1-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021152" version="1" comment="maven-filtering-javadoc is &lt;3.1.1-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021153" version="1" comment="maven-hawtjni-plugin is &lt;1.16-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021154" version="1" comment="maven-install-plugin is &lt;2.5.2-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021155" version="1" comment="maven-install-plugin-javadoc is &lt;2.5.2-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021156" version="1" comment="maven-invoker is &lt;2.2-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021157" version="1" comment="maven-invoker-javadoc is &lt;2.2-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021158" version="1" comment="maven-invoker-plugin is &lt;1.10-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021159" version="1" comment="maven-invoker-plugin-javadoc is &lt;1.10-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021160" version="1" comment="maven-jar-plugin is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021161" version="1" comment="maven-jar-plugin-javadoc is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021162" version="1" comment="maven-javadoc is &lt;3.5.4-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021163" version="1" comment="maven-lib is &lt;3.5.4-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021164" version="1" comment="maven-local is &lt;5.3.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021165" version="1" comment="maven-model is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021166" version="1" comment="maven-monitor is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021167" version="1" comment="maven-parent is &lt;27-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021168" version="1" comment="maven-plugin-annotations is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021169" version="1" comment="maven-plugin-build-helper is &lt;1.9.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021170" version="1" comment="maven-plugin-build-helper-javadoc is &lt;1.9.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021171" version="1" comment="maven-plugin-bundle is &lt;3.5.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021172" version="1" comment="maven-plugin-bundle-javadoc is &lt;3.5.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021173" version="1" comment="maven-plugin-descriptor is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021174" version="1" comment="maven-plugin-plugin is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021175" version="1" comment="maven-plugin-registry is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021176" version="1" comment="maven-plugin-testing is &lt;3.3.0-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021177" version="1" comment="maven-plugin-testing-harness is &lt;3.3.0-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021178" version="1" comment="maven-plugin-testing-javadoc is &lt;3.3.0-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021179" version="1" comment="maven-plugin-testing-tools is &lt;3.3.0-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021180" version="1" comment="maven-plugin-tools is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021181" version="1" comment="maven-plugin-tools-annotations is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021182" version="1" comment="maven-plugin-tools-ant is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021183" version="1" comment="maven-plugin-tools-api is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021184" version="1" comment="maven-plugin-tools-beanshell is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021185" version="1" comment="maven-plugin-tools-generators is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021186" version="1" comment="maven-plugin-tools-java is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021187" version="1" comment="maven-plugin-tools-javadoc is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021188" version="1" comment="maven-plugin-tools-javadocs is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021189" version="1" comment="maven-plugin-tools-model is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021190" version="1" comment="maven-plugins-pom is &lt;28-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021191" version="1" comment="maven-profile is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021192" version="1" comment="maven-project is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021193" version="1" comment="maven-remote-resources-plugin is &lt;1.5-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021194" version="1" comment="maven-remote-resources-plugin-javadoc is &lt;1.5-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021195" version="1" comment="maven-reporting-api is &lt;3.0-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021196" version="1" comment="maven-reporting-api-javadoc is &lt;3.0-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021197" version="1" comment="maven-reporting-impl is &lt;3.0.0-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021198" version="1" comment="maven-reporting-impl-javadoc is &lt;3.0.0-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021199" version="1" comment="maven-resolver is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021200" version="1" comment="maven-resolver-api is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021201" version="1" comment="maven-resolver-connector-basic is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021202" version="1" comment="maven-resolver-impl is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021203" version="1" comment="maven-resolver-javadoc is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021204" version="1" comment="maven-resolver-spi is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021205" version="1" comment="maven-resolver-test-util is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021206" version="1" comment="maven-resolver-transport-classpath is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021207" version="1" comment="maven-resolver-transport-file is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021208" version="1" comment="maven-resolver-transport-http is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021209" version="1" comment="maven-resolver-transport-wagon is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021210" version="1" comment="maven-resolver-util is &lt;1.1.1-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021211" version="1" comment="maven-resources-plugin is &lt;3.1.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021212" version="1" comment="maven-resources-plugin-javadoc is &lt;3.1.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021213" version="1" comment="maven-script is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021214" version="1" comment="maven-script-ant is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021215" version="1" comment="maven-script-beanshell is &lt;3.5.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021216" version="1" comment="maven-script-interpreter is &lt;1.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021217" version="1" comment="maven-script-interpreter-javadoc is &lt;1.1-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021218" version="1" comment="maven-settings is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021219" version="1" comment="maven-shade-plugin is &lt;3.1.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021220" version="1" comment="maven-shade-plugin-javadoc is &lt;3.1.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021221" version="1" comment="maven-shared is &lt;22-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021222" version="1" comment="maven-shared-incremental is &lt;1.1-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021223" version="1" comment="maven-shared-incremental-javadoc is &lt;1.1-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021224" version="1" comment="maven-shared-io is &lt;3.0.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021225" version="1" comment="maven-shared-io-javadoc is &lt;3.0.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021226" version="1" comment="maven-shared-utils is &lt;3.2.1-0.1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021227" version="1" comment="maven-shared-utils-javadoc is &lt;3.2.1-0.1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021228" version="1" comment="maven-source-plugin is &lt;3.0.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021229" version="1" comment="maven-source-plugin-javadoc is &lt;3.0.1-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021230" version="1" comment="maven-surefire is &lt;2.22.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021231" version="1" comment="maven-surefire-javadoc is &lt;2.22.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021232" version="1" comment="maven-surefire-plugin is &lt;2.22.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021233" version="1" comment="maven-surefire-provider-junit is &lt;2.22.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021234" version="1" comment="maven-surefire-provider-testng is &lt;2.22.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021235" version="1" comment="maven-surefire-report-parser is &lt;2.22.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021236" version="1" comment="maven-surefire-report-plugin is &lt;2.22.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021237" version="1" comment="maven-test-tools is &lt;3.3.0-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021238" version="1" comment="maven-toolchain is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021239" version="1" comment="maven-verifier is &lt;1.6-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021240" version="1" comment="maven-verifier-javadoc is &lt;1.6-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021241" version="1" comment="maven-wagon is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021242" version="1" comment="maven-wagon-file is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021243" version="1" comment="maven-wagon-ftp is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021244" version="1" comment="maven-wagon-http is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021245" version="1" comment="maven-wagon-http-lightweight is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021246" version="1" comment="maven-wagon-http-shared is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021247" version="1" comment="maven-wagon-javadoc is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021248" version="1" comment="maven-wagon-provider-api is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021249" version="1" comment="maven-wagon-providers is &lt;3.1.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021250" version="1" comment="maven2-javadoc is &lt;2.2.1-59.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021251" version="1" comment="mockito is &lt;1.10.19-17.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021252" version="1" comment="mockito-javadoc is &lt;1.10.19-17.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021253" version="1" comment="modello is &lt;1.9.1-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021254" version="1" comment="modello-javadoc is &lt;1.9.1-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021255" version="1" comment="mojo-parent is &lt;40-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021256" version="1" comment="munge-maven-plugin is &lt;1.0-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021257" version="1" comment="munge-maven-plugin-javadoc is &lt;1.0-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021258" version="1" comment="objectweb-asm is &lt;6.2-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021259" version="1" comment="objectweb-asm-javadoc is &lt;6.2-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021260" version="1" comment="objectweb-pom is &lt;1.5-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021261" version="1" comment="objenesis is &lt;2.6-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021262" version="1" comment="objenesis-javadoc is &lt;2.6-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021263" version="1" comment="os-maven-plugin is &lt;1.2.3-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021264" version="1" comment="os-maven-plugin-javadoc is &lt;1.2.3-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021265" version="1" comment="osgi-annotation is &lt;6.0.0-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021266" version="1" comment="osgi-annotation-javadoc is &lt;6.0.0-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021267" version="1" comment="osgi-compendium is &lt;6.0.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021268" version="1" comment="osgi-compendium-javadoc is &lt;6.0.0-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021269" version="1" comment="osgi-core is &lt;6.0.0-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021270" version="1" comment="osgi-core-javadoc is &lt;6.0.0-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021271" version="1" comment="plexus-ant-factory is &lt;1.0-0.20.a2.2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021272" version="1" comment="plexus-ant-factory-javadoc is &lt;1.0-0.20.a2.2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021273" version="1" comment="plexus-archiver is &lt;3.6.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021274" version="1" comment="plexus-archiver-javadoc is &lt;3.6.0-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021275" version="1" comment="plexus-bsh-factory is &lt;1.0-0.19.a7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021276" version="1" comment="plexus-bsh-factory-javadoc is &lt;1.0-0.19.a7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021277" version="1" comment="plexus-build-api is &lt;0.0.7-20.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021278" version="1" comment="plexus-build-api-javadoc is &lt;0.0.7-20.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021279" version="1" comment="plexus-cipher is &lt;1.7-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021280" version="1" comment="plexus-cipher-javadoc is &lt;1.7-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021281" version="1" comment="plexus-classworlds is &lt;2.5.2-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021282" version="1" comment="plexus-classworlds-javadoc is &lt;2.5.2-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021283" version="1" comment="plexus-cli is &lt;1.6-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021284" version="1" comment="plexus-cli-javadoc is &lt;1.6-6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021285" version="1" comment="plexus-compiler is &lt;2.8.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021286" version="1" comment="plexus-compiler-extras is &lt;2.8.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021287" version="1" comment="plexus-compiler-javadoc is &lt;2.8.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021288" version="1" comment="plexus-compiler-pom is &lt;2.8.2-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021289" version="1" comment="plexus-component-api is &lt;1.0-0.24.alpha15.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021290" version="1" comment="plexus-component-api-javadoc is &lt;1.0-0.24.alpha15.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021291" version="1" comment="plexus-component-factories-pom is &lt;1.0-0.15.alpha11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021292" version="1" comment="plexus-components-pom is &lt;1.3.1-10.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021293" version="1" comment="plexus-containers is &lt;1.7.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021294" version="1" comment="plexus-containers-component-annotations is &lt;1.7.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021295" version="1" comment="plexus-containers-component-javadoc is &lt;1.7.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021296" version="1" comment="plexus-containers-component-metadata is &lt;1.7.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021297" version="1" comment="plexus-containers-container-default is &lt;1.7.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021298" version="1" comment="plexus-containers-javadoc is &lt;1.7.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021299" version="1" comment="plexus-i18n is &lt;1.0-0.11.b10.4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021300" version="1" comment="plexus-i18n-javadoc is &lt;1.0-0.11.b10.4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021301" version="1" comment="plexus-interactivity is &lt;1.0-0.27.alpha6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021302" version="1" comment="plexus-interactivity-api is &lt;1.0-0.27.alpha6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021303" version="1" comment="plexus-interactivity-javadoc is &lt;1.0-0.27.alpha6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021304" version="1" comment="plexus-interactivity-jline is &lt;1.0-0.27.alpha6.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021305" version="1" comment="plexus-interpolation is &lt;1.22-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021306" version="1" comment="plexus-interpolation-javadoc is &lt;1.22-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021307" version="1" comment="plexus-io is &lt;3.0.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021308" version="1" comment="plexus-io-javadoc is &lt;3.0.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021309" version="1" comment="plexus-languages is &lt;0.9.10-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021310" version="1" comment="plexus-languages-javadoc is &lt;0.9.10-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021311" version="1" comment="plexus-pom is &lt;5.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021312" version="1" comment="plexus-resources is &lt;1.0-0.23.a7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021313" version="1" comment="plexus-resources-javadoc is &lt;1.0-0.23.a7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021314" version="1" comment="plexus-sec-dispatcher is &lt;1.4-26.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021315" version="1" comment="plexus-sec-dispatcher-javadoc is &lt;1.4-26.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021316" version="1" comment="plexus-utils is &lt;3.1.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021317" version="1" comment="plexus-utils-javadoc is &lt;3.1.0-3.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021318" version="1" comment="plexus-velocity is &lt;1.2-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021319" version="1" comment="plexus-velocity-javadoc is &lt;1.2-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021320" version="1" comment="powermock-api-easymock is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021321" version="1" comment="powermock-api-mockito is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021322" version="1" comment="powermock-api-support is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021323" version="1" comment="powermock-common is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021324" version="1" comment="powermock-core is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021325" version="1" comment="powermock-javadoc is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021326" version="1" comment="powermock-junit4 is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021327" version="1" comment="powermock-reflect is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021328" version="1" comment="powermock-testng is &lt;1.6.5-9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021329" version="1" comment="python3-javapackages is &lt;5.3.0-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021330" version="1" comment="qdox is &lt;2.0-3.M9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021331" version="1" comment="qdox-javadoc is &lt;2.0-3.M9.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021332" version="1" comment="regexp is &lt;1.5-26.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021333" version="1" comment="regexp-javadoc is &lt;1.5-26.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021334" version="1" comment="sisu-inject is &lt;0.3.3-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021335" version="1" comment="sisu-javadoc is &lt;0.3.3-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021336" version="1" comment="sisu-mojos is &lt;0.3.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021337" version="1" comment="sisu-mojos-javadoc is &lt;0.3.1-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021338" version="1" comment="sisu-plexus is &lt;0.3.3-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021339" version="1" comment="slf4j is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021340" version="1" comment="slf4j-ext is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021341" version="1" comment="slf4j-javadoc is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021342" version="1" comment="slf4j-jcl is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021343" version="1" comment="slf4j-jdk14 is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021344" version="1" comment="slf4j-log4j12 is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021345" version="1" comment="slf4j-manual is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021346" version="1" comment="slf4j-sources is &lt;1.7.25-4.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021347" version="1" comment="sonatype-oss-parent is &lt;7-14.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021348" version="1" comment="sonatype-plugins-parent is &lt;8-12.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021349" version="1" comment="spec-version-maven-plugin is &lt;1.2-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021350" version="1" comment="spec-version-maven-plugin-javadoc is &lt;1.2-11.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021351" version="1" comment="spice-parent is &lt;26-8.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021352" version="1" comment="testng is &lt;6.14.3-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021353" version="1" comment="testng-javadoc is &lt;6.14.3-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021354" version="1" comment="velocity is &lt;1.7-24.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021355" version="1" comment="velocity-demo is &lt;1.7-24.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021356" version="1" comment="velocity-javadoc is &lt;1.7-24.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021357" version="1" comment="velocity-manual is &lt;1.7-24.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021358" version="1" comment="weld-parent is &lt;34-5.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021359" version="1" comment="xalan-j2 is &lt;2.7.1-38.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021360" version="1" comment="xalan-j2-demo is &lt;2.7.1-38.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021361" version="1" comment="xalan-j2-javadoc is &lt;2.7.1-38.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021362" version="1" comment="xalan-j2-manual is &lt;2.7.1-38.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021363" version="1" comment="xalan-j2-xsltc is &lt;2.7.1-38.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021364" version="1" comment="xbean is &lt;4.8-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021365" version="1" comment="xbean-javadoc is &lt;4.8-1.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021366" version="1" comment="xerces-j2 is &lt;2.11.0-34.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021367" version="1" comment="xerces-j2-demo is &lt;2.11.0-34.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021368" version="1" comment="xerces-j2-javadoc is &lt;2.11.0-34.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021369" version="1" comment="xml-commons-apis is &lt;1.4.01-25.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021370" version="1" comment="xml-commons-apis-javadoc is &lt;1.4.01-25.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021371" version="1" comment="xml-commons-apis-manual is &lt;1.4.01-25.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021372" version="1" comment="xml-commons-resolver is &lt;1.2-26.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021373" version="1" comment="xml-commons-resolver-javadoc is &lt;1.2-26.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021374" version="1" comment="xmlunit is &lt;1.6-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021375" version="1" comment="xmlunit-javadoc is &lt;1.6-7.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021376" version="1" comment="xmvn is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021377" version="1" comment="xmvn-api is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021378" version="1" comment="xmvn-bisect is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021379" version="1" comment="xmvn-connector-aether is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021380" version="1" comment="xmvn-connector-ivy is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021381" version="1" comment="xmvn-core is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021382" version="1" comment="xmvn-install is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021383" version="1" comment="xmvn-javadoc is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021384" version="1" comment="xmvn-minimal is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021385" version="1" comment="xmvn-mojo is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021386" version="1" comment="xmvn-parent-pom is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021387" version="1" comment="xmvn-resolve is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021388" version="1" comment="xmvn-subst is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021389" version="1" comment="xmvn-tools-pom is &lt;3.0.0-21.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021390" version="1" comment="xz-java is &lt;1.8-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021391" version="1" comment="xz-java-javadoc is &lt;1.8-2.module+el8.10.0+23274+27840b45 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996836" version="1" comment="perl-YAML-LibYAML is &lt;0.70-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996837" version="1" comment="tigervnc is &lt;1.15.0-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996838" version="1" comment="tigervnc-icons is &lt;1.15.0-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996839" version="1" comment="tigervnc-license is &lt;1.15.0-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996840" version="1" comment="tigervnc-selinux is &lt;1.15.0-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996841" version="1" comment="tigervnc-server is &lt;1.15.0-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996842" version="1" comment="tigervnc-server-minimal is &lt;1.15.0-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996843" version="1" comment="tigervnc-server-module is &lt;1.15.0-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997656" version="1" comment="bpftool is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997657" version="1" comment="kernel is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997658" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.58.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997659" version="1" comment="kernel-core is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997660" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997661" version="1" comment="kernel-debug is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997662" version="1" comment="kernel-debug-core is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997664" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997665" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997667" version="1" comment="kernel-doc is &lt;4.18.0-553.58.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997668" version="1" comment="kernel-headers is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997669" version="1" comment="kernel-modules is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997670" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997671" version="1" comment="kernel-tools is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997672" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997674" version="1" comment="perf is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997675" version="1" comment="python3-perf is &lt;4.18.0-553.58.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997676" version="1" comment="perl-File-Find-Rule is &lt;0.34-9.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997677" version="1" comment="weldr-client is &lt;35.12-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997678" version="1" comment="libblockdev is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997679" version="1" comment="libblockdev-crypto is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997680" version="1" comment="libblockdev-crypto-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997681" version="1" comment="libblockdev-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997682" version="1" comment="libblockdev-dm is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997683" version="1" comment="libblockdev-fs is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997684" version="1" comment="libblockdev-fs-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997685" version="1" comment="libblockdev-kbd is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997686" version="1" comment="libblockdev-loop is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997687" version="1" comment="libblockdev-loop-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997688" version="1" comment="libblockdev-lvm is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997689" version="1" comment="libblockdev-lvm-dbus is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997690" version="1" comment="libblockdev-lvm-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997691" version="1" comment="libblockdev-mdraid is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997692" version="1" comment="libblockdev-mdraid-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997693" version="1" comment="libblockdev-mpath is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997694" version="1" comment="libblockdev-nvdimm is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997695" version="1" comment="libblockdev-part is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997696" version="1" comment="libblockdev-part-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997697" version="1" comment="libblockdev-plugins-all is &lt;2.28-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997698" version="1" comment="libblockdev-swap is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997699" version="1" comment="libblockdev-swap-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997700" version="1" comment="libblockdev-utils is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997701" version="1" comment="libblockdev-utils-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997702" version="1" comment="libblockdev-vdo is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997703" version="1" comment="libblockdev-vdo-devel is &lt;2.28-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997704" version="1" comment="python3-blockdev is &lt;2.28-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035687" version="1" comment="thunderbird is &lt;140.6.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036453" version="1" comment="python3.12 is &lt;3.12.12-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036454" version="1" comment="python3.12-debug is &lt;3.12.12-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036455" version="1" comment="python3.12-devel is &lt;3.12.12-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036456" version="1" comment="python3.12-idle is &lt;3.12.12-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036457" version="1" comment="python3.12-libs is &lt;3.12.12-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036458" version="1" comment="python3.12-rpm-macros is &lt;3.12.12-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036459" version="1" comment="python3.12-test is &lt;3.12.12-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036460" version="1" comment="python3.12-tkinter is &lt;3.12.12-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036461" version="1" comment="mingw32-libpng is &lt;1.6.34-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036462" version="1" comment="mingw32-libpng-static is &lt;1.6.34-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036463" version="1" comment="mingw64-libpng is &lt;1.6.34-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036464" version="1" comment="mingw64-libpng-static is &lt;1.6.34-1.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036465" version="1" comment="poppler is &lt;20.11.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036466" version="1" comment="poppler-cpp is &lt;20.11.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036467" version="1" comment="poppler-cpp-devel is &lt;20.11.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036468" version="1" comment="poppler-devel is &lt;20.11.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036469" version="1" comment="poppler-glib is &lt;20.11.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036470" version="1" comment="poppler-glib-devel is &lt;20.11.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036471" version="1" comment="poppler-glib-doc is &lt;20.11.0-13.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036472" version="1" comment="poppler-qt5 is &lt;20.11.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036473" version="1" comment="poppler-qt5-devel is &lt;20.11.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036474" version="1" comment="poppler-utils is &lt;20.11.0-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036574" version="1" comment="Judy is &lt;1.0.5-18.module+el8.9.0+19449+ad5852d3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036575" version="1" comment="galera is &lt;25.3.37-1.module+el8.9.0+19449+ad5852d3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036576" version="1" comment="mariadb is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036577" version="1" comment="mariadb-backup is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036578" version="1" comment="mariadb-common is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036579" version="1" comment="mariadb-devel is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036580" version="1" comment="mariadb-embedded is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036581" version="1" comment="mariadb-embedded-devel is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036582" version="1" comment="mariadb-errmsg is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036583" version="1" comment="mariadb-gssapi-server is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036584" version="1" comment="mariadb-oqgraph-engine is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036585" version="1" comment="mariadb-server is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036586" version="1" comment="mariadb-server-galera is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036587" version="1" comment="mariadb-server-utils is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036588" version="1" comment="mariadb-test is &lt;10.3.39-2.module+el8.10.0+23756+5eac0e54 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036589" version="1" comment="mariadb is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036590" version="1" comment="mariadb-backup is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036591" version="1" comment="mariadb-common is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036592" version="1" comment="mariadb-devel is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036593" version="1" comment="mariadb-embedded is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036594" version="1" comment="mariadb-embedded-devel is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036595" version="1" comment="mariadb-errmsg is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036596" version="1" comment="mariadb-gssapi-server is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036597" version="1" comment="mariadb-oqgraph-engine is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036598" version="1" comment="mariadb-pam is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036599" version="1" comment="mariadb-server is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036600" version="1" comment="mariadb-server-galera is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036601" version="1" comment="mariadb-server-utils is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036602" version="1" comment="mariadb-test is &lt;10.11.10-2.module+el8.10.0+23755+8858eb6a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036603" version="1" comment="mariadb is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036604" version="1" comment="mariadb-backup is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036605" version="1" comment="mariadb-common is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036606" version="1" comment="mariadb-devel is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036607" version="1" comment="mariadb-embedded is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036608" version="1" comment="mariadb-embedded-devel is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036609" version="1" comment="mariadb-errmsg is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036610" version="1" comment="mariadb-gssapi-server is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036611" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036612" version="1" comment="mariadb-pam is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036613" version="1" comment="mariadb-server is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036614" version="1" comment="mariadb-server-galera is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036615" version="1" comment="mariadb-server-utils is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036616" version="1" comment="mariadb-test is &lt;10.5.29-3.module+el8.10.0+23752+7ef55629 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036617" version="1" comment="libpng is &lt;1.6.34-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036618" version="1" comment="libpng-devel is &lt;1.6.34-9.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036619" version="1" comment="openssl is &lt;1.1.1k-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036620" version="1" comment="openssl-devel is &lt;1.1.1k-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036621" version="1" comment="openssl-libs is &lt;1.1.1k-14.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010036622" version="1" comment="openssl-perl is &lt;1.1.1k-14.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037078" version="1" comment="libsoup is &lt;2.62.3-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037079" version="1" comment="libsoup-devel is &lt;2.62.3-11.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037345" version="1" comment="bpftool is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037346" version="1" comment="kernel is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037347" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.92.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037348" version="1" comment="kernel-core is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037349" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037350" version="1" comment="kernel-debug is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037351" version="1" comment="kernel-debug-core is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037353" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037354" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037356" version="1" comment="kernel-doc is &lt;4.18.0-553.92.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037357" version="1" comment="kernel-headers is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037358" version="1" comment="kernel-modules is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037359" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037360" version="1" comment="kernel-tools is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037361" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037363" version="1" comment="perf is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037364" version="1" comment="python3-perf is &lt;4.18.0-553.92.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037365" version="1" comment="postgresql is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037366" version="1" comment="postgresql-contrib is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037367" version="1" comment="postgresql-docs is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037368" version="1" comment="postgresql-plperl is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037369" version="1" comment="postgresql-plpython3 is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037370" version="1" comment="postgresql-pltcl is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037371" version="1" comment="postgresql-private-devel is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037372" version="1" comment="postgresql-private-libs is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037373" version="1" comment="postgresql-server is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037374" version="1" comment="postgresql-server-devel is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037375" version="1" comment="postgresql-static is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037376" version="1" comment="postgresql-test is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037377" version="1" comment="postgresql-test-rpm-macros is &lt;16.11-1.module+el8.10.0+23783+d9790420 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037378" version="1" comment="postgresql-upgrade is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037379" version="1" comment="postgresql-upgrade-devel is &lt;16.11-1.module+el8.10.0+23783+d9790420 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037380" version="1" comment="postgresql is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037381" version="1" comment="postgresql-contrib is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037382" version="1" comment="postgresql-docs is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037383" version="1" comment="postgresql-plperl is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037384" version="1" comment="postgresql-plpython3 is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037385" version="1" comment="postgresql-pltcl is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037386" version="1" comment="postgresql-server is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037387" version="1" comment="postgresql-server-devel is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037388" version="1" comment="postgresql-static is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037389" version="1" comment="postgresql-test is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037390" version="1" comment="postgresql-test-rpm-macros is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037391" version="1" comment="postgresql-upgrade is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037392" version="1" comment="postgresql-upgrade-devel is &lt;13.23-1.module+el8.10.0+23781+c6a61bc8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037648" version="1" comment="postgresql is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037649" version="1" comment="postgresql-contrib is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037650" version="1" comment="postgresql-docs is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037651" version="1" comment="postgresql-plperl is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037652" version="1" comment="postgresql-plpython3 is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037653" version="1" comment="postgresql-pltcl is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037654" version="1" comment="postgresql-private-devel is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037655" version="1" comment="postgresql-private-libs is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037656" version="1" comment="postgresql-server is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037657" version="1" comment="postgresql-server-devel is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037658" version="1" comment="postgresql-static is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037659" version="1" comment="postgresql-test is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037660" version="1" comment="postgresql-test-rpm-macros is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037661" version="1" comment="postgresql-upgrade is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037662" version="1" comment="postgresql-upgrade-devel is &lt;15.15-1.module+el8.10.0+23782+2d6b2a31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037663" version="1" comment="cups is &lt;2.2.6-66.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037664" version="1" comment="cups-client is &lt;2.2.6-66.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037665" version="1" comment="cups-devel is &lt;2.2.6-66.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037666" version="1" comment="cups-filesystem is &lt;2.2.6-66.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037667" version="1" comment="cups-ipptool is &lt;2.2.6-66.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037668" version="1" comment="cups-libs is &lt;2.2.6-66.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037669" version="1" comment="cups-lpd is &lt;2.2.6-66.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037670" version="1" comment="vsftpd is &lt;3.0.3-36.el8_10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037797" version="1" comment="firefox is &lt;140.7.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037671" version="1" comment="libpq is &lt;13.23-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037672" version="1" comment="libpq-devel is &lt;13.23-1.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037798" version="1" comment="gnupg2 is &lt;2.2.20-4.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037799" version="1" comment="gnupg2-smime is &lt;2.2.20-4.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038231" version="1" comment="net-snmp is &lt;5.8-33.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038232" version="1" comment="net-snmp-agent-libs is &lt;5.8-33.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038233" version="1" comment="net-snmp-devel is &lt;5.8-33.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038234" version="1" comment="net-snmp-libs is &lt;5.8-33.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038235" version="1" comment="net-snmp-perl is &lt;5.8-33.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038236" version="1" comment="net-snmp-utils is &lt;5.8-33.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038237" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038238" version="1" comment="buildah is &lt;1.33.14-1.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038239" version="1" comment="buildah-tests is &lt;1.33.14-1.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038240" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+23863+d7fda2d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038241" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038242" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+23863+d7fda2d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038243" version="1" comment="containernetworking-plugins is &lt;1.4.0-6.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038244" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038245" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038246" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038247" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038248" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038249" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038250" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038251" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038252" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038253" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038254" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038255" version="1" comment="podman is &lt;4.9.4-27.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038256" version="1" comment="podman-catatonit is &lt;4.9.4-27.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038257" version="1" comment="podman-docker is &lt;4.9.4-27.module+el8.10.0+23863+d7fda2d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038258" version="1" comment="podman-gvproxy is &lt;4.9.4-27.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038259" version="1" comment="podman-plugins is &lt;4.9.4-27.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038260" version="1" comment="podman-remote is &lt;4.9.4-27.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038261" version="1" comment="podman-tests is &lt;4.9.4-27.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038262" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038263" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+23863+d7fda2d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038264" version="1" comment="runc is &lt;1.2.9-2.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038265" version="1" comment="skopeo is &lt;1.14.5-5.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038266" version="1" comment="skopeo-tests is &lt;1.14.5-5.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038267" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038268" version="1" comment="toolbox is &lt;0.0.99.5-2.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038269" version="1" comment="toolbox-tests is &lt;0.0.99.5-2.module+el8.10.0+23863+d7fda2d7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038270" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+23863+d7fda2d7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038271" version="1" comment="transfig is &lt;3.2.6a-5.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038272" version="1" comment="bpftool is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038273" version="1" comment="kernel is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038274" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.94.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038275" version="1" comment="kernel-core is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038276" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038277" version="1" comment="kernel-debug is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038278" version="1" comment="kernel-debug-core is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038280" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038281" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038283" version="1" comment="kernel-doc is &lt;4.18.0-553.94.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038284" version="1" comment="kernel-headers is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038285" version="1" comment="kernel-modules is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038286" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038287" version="1" comment="kernel-tools is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038288" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038290" version="1" comment="perf is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038291" version="1" comment="python3-perf is &lt;4.18.0-553.94.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053475" version="1" comment="java-11-openjdk is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043334" version="1" comment="java-11-openjdk-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053476" version="1" comment="java-11-openjdk-demo is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043336" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053477" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053478" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053479" version="1" comment="java-11-openjdk-devel is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043340" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053480" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053481" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053482" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053483" version="1" comment="java-11-openjdk-headless is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043345" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053484" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053485" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053486" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043349" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053487" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043351" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053488" version="1" comment="java-11-openjdk-jmods is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043353" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053489" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053490" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053491" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053492" version="1" comment="java-11-openjdk-src is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043358" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053493" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053494" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053495" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043362" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053496" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053497" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038514" version="1" comment="go-toolset is &lt;1.25.5-1.module+el8.10.0+23901+9d60aaf1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038515" version="1" comment="golang is &lt;1.25.5-1.module+el8.10.0+23901+9d60aaf1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038516" version="1" comment="golang-bin is &lt;1.25.5-1.module+el8.10.0+23901+9d60aaf1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038517" version="1" comment="golang-docs is &lt;1.25.5-1.module+el8.10.0+23901+9d60aaf1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038518" version="1" comment="golang-misc is &lt;1.25.5-1.module+el8.10.0+23901+9d60aaf1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038519" version="1" comment="golang-race is &lt;1.25.5-1.module+el8.10.0+23901+9d60aaf1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038520" version="1" comment="golang-src is &lt;1.25.5-1.module+el8.10.0+23901+9d60aaf1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038521" version="1" comment="golang-tests is &lt;1.25.5-1.module+el8.10.0+23901+9d60aaf1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039028" version="1" comment="java-17-openjdk is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039029" version="1" comment="java-17-openjdk-demo is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039030" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039031" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039032" version="1" comment="java-17-openjdk-devel is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039033" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039034" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039035" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039036" version="1" comment="java-17-openjdk-headless is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039037" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039038" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039039" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039040" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039041" version="1" comment="java-17-openjdk-jmods is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039042" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039043" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039044" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039045" version="1" comment="java-17-openjdk-src is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039046" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039047" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039048" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039049" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039050" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039592" version="1" comment="java-21-openjdk is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039593" version="1" comment="java-21-openjdk-demo is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039594" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039595" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039596" version="1" comment="java-21-openjdk-devel is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039597" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039598" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039599" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039600" version="1" comment="java-21-openjdk-headless is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039601" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039602" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039603" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039604" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039605" version="1" comment="java-21-openjdk-jmods is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039606" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039607" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039608" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039609" version="1" comment="java-21-openjdk-src is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039610" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039611" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039612" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039613" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039614" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038522" version="1" comment="pcs is &lt;0.10.18-2.el8_10.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038523" version="1" comment="pcs-snmp is &lt;0.10.18-2.el8_10.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040212" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040213" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040214" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040215" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040216" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040217" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040218" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040219" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040220" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040221" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040222" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040223" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040224" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.482.b08-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040225" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.482.b08-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040226" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040227" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.482.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040228" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.482.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039051" version="1" comment="glib2 is &lt;2.56.4-168.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039052" version="1" comment="glib2-devel is &lt;2.56.4-168.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039053" version="1" comment="glib2-doc is &lt;2.56.4-168.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039054" version="1" comment="glib2-fam is &lt;2.56.4-168.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039055" version="1" comment="glib2-static is &lt;2.56.4-168.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039056" version="1" comment="glib2-tests is &lt;2.56.4-168.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040291" version="1" comment="bpftool is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040292" version="1" comment="kernel is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040293" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.97.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040294" version="1" comment="kernel-core is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040295" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040296" version="1" comment="kernel-debug is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040297" version="1" comment="kernel-debug-core is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040299" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040300" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040302" version="1" comment="kernel-doc is &lt;4.18.0-553.97.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040303" version="1" comment="kernel-headers is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040304" version="1" comment="kernel-modules is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040305" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040306" version="1" comment="kernel-tools is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040307" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040309" version="1" comment="perf is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040310" version="1" comment="python3-perf is &lt;4.18.0-553.97.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040229" version="1" comment="python3.11-urllib3 is &lt;1.26.12-6.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040230" version="1" comment="python3.12-urllib3 is &lt;1.26.19-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041198" version="1" comment="fence-agents-aliyun is &lt;4.2.1-129.el8_10.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041199" version="1" comment="fence-agents-all is &lt;4.2.1-129.el8_10.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041200" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041201" version="1" comment="fence-agents-apc is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041202" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041203" version="1" comment="fence-agents-aws is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041204" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-129.el8_10.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041205" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041206" version="1" comment="fence-agents-brocade is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041207" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041208" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041209" version="1" comment="fence-agents-common is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041210" version="1" comment="fence-agents-compute is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041211" version="1" comment="fence-agents-drac5 is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041212" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041213" version="1" comment="fence-agents-emerson is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041214" version="1" comment="fence-agents-eps is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041215" version="1" comment="fence-agents-gce is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041216" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041217" version="1" comment="fence-agents-hpblade is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041218" version="1" comment="fence-agents-ibm-powervs is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041219" version="1" comment="fence-agents-ibm-vpc is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041220" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041221" version="1" comment="fence-agents-ifmib is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041222" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041223" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041224" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041225" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041226" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041227" version="1" comment="fence-agents-ipdu is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041228" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041229" version="1" comment="fence-agents-kdump is &lt;4.2.1-129.el8_10.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041230" version="1" comment="fence-agents-kubevirt is &lt;4.2.1-129.el8_10.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041231" version="1" comment="fence-agents-lpar is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041232" version="1" comment="fence-agents-mpath is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041233" version="1" comment="fence-agents-nutanix-ahv is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041234" version="1" comment="fence-agents-openstack is &lt;4.2.1-129.el8_10.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041235" version="1" comment="fence-agents-redfish is &lt;4.2.1-129.el8_10.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041236" version="1" comment="fence-agents-rhevm is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041237" version="1" comment="fence-agents-rsa is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041238" version="1" comment="fence-agents-rsb is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041239" version="1" comment="fence-agents-sbd is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041240" version="1" comment="fence-agents-scsi is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041241" version="1" comment="fence-agents-virsh is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041242" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041243" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041244" version="1" comment="fence-agents-wti is &lt;4.2.1-129.el8_10.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040231" version="1" comment="resource-agents is &lt;4.9.0-54.el8_10.27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040232" version="1" comment="resource-agents-aliyun is &lt;4.9.0-54.el8_10.27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040233" version="1" comment="resource-agents-gcp is &lt;4.9.0-54.el8_10.27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040234" version="1" comment="resource-agents-paf is &lt;4.9.0-54.el8_10.27 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040235" version="1" comment="python3-urllib3 is &lt;1.24.2-9.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040718" version="1" comment="grafana is &lt;9.2.10-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040719" version="1" comment="grafana-selinux is &lt;9.2.10-27.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040720" version="1" comment="python3.11 is &lt;3.11.13-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040721" version="1" comment="python3.11-debug is &lt;3.11.13-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040722" version="1" comment="python3.11-devel is &lt;3.11.13-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040723" version="1" comment="python3.11-idle is &lt;3.11.13-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040724" version="1" comment="python3.11-libs is &lt;3.11.13-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040725" version="1" comment="python3.11-rpm-macros is &lt;3.11.13-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040726" version="1" comment="python3.11-test is &lt;3.11.13-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040727" version="1" comment="python3.11-tkinter is &lt;3.11.13-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040728" version="1" comment="php is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040729" version="1" comment="php-bcmath is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040730" version="1" comment="php-cli is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040731" version="1" comment="php-common is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040732" version="1" comment="php-dba is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040733" version="1" comment="php-dbg is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040734" version="1" comment="php-devel is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040735" version="1" comment="php-embedded is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040736" version="1" comment="php-enchant is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040737" version="1" comment="php-ffi is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040738" version="1" comment="php-fpm is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040739" version="1" comment="php-gd is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040740" version="1" comment="php-gmp is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040741" version="1" comment="php-intl is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040742" version="1" comment="php-ldap is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040743" version="1" comment="php-mbstring is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040744" version="1" comment="php-mysqlnd is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040745" version="1" comment="php-odbc is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040746" version="1" comment="php-opcache is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040747" version="1" comment="php-pdo is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040748" version="1" comment="php-pgsql is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040749" version="1" comment="php-process is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040750" version="1" comment="php-snmp is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040751" version="1" comment="php-soap is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040752" version="1" comment="php-xml is &lt;8.2.30-1.module+el8.10.0+23848+33d54484 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040753" version="1" comment="spice-client-win-x64 is &lt;8.10-6.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040754" version="1" comment="spice-client-win-x86 is &lt;8.10-6.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040755" version="1" comment="grafana-pcp is &lt;5.1.1-11.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040756" version="1" comment="gimp is &lt;2.8.22-26.module+el8.10.0+23914+4745738d.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040757" version="1" comment="gimp-devel is &lt;2.8.22-26.module+el8.10.0+23914+4745738d.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040758" version="1" comment="gimp-devel-tools is &lt;2.8.22-26.module+el8.10.0+23914+4745738d.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040759" version="1" comment="gimp-libs is &lt;2.8.22-26.module+el8.10.0+23914+4745738d.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040955" version="1" comment="iperf3 is &lt;3.5-12.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041245" version="1" comment="platform-python is &lt;3.6.8-72.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041246" version="1" comment="platform-python-debug is &lt;3.6.8-72.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041247" version="1" comment="platform-python-devel is &lt;3.6.8-72.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041248" version="1" comment="python3-idle is &lt;3.6.8-72.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041249" version="1" comment="python3-libs is &lt;3.6.8-72.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041250" version="1" comment="python3-test is &lt;3.6.8-72.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041251" version="1" comment="python3-tkinter is &lt;3.6.8-72.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041252" version="1" comment="bpftool is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041253" version="1" comment="kernel is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041254" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.100.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041255" version="1" comment="kernel-core is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041256" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041257" version="1" comment="kernel-debug is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041258" version="1" comment="kernel-debug-core is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041260" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041261" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041263" version="1" comment="kernel-doc is &lt;4.18.0-553.100.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041264" version="1" comment="kernel-headers is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041265" version="1" comment="kernel-modules is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041266" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041267" version="1" comment="kernel-tools is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041268" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041270" version="1" comment="perf is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041271" version="1" comment="python3-perf is &lt;4.18.0-553.100.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042258" version="1" comment="libblkid is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042259" version="1" comment="libblkid-devel is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042260" version="1" comment="libfdisk is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042261" version="1" comment="libfdisk-devel is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042262" version="1" comment="libmount is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042263" version="1" comment="libmount-devel is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042264" version="1" comment="libsmartcols is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042265" version="1" comment="libsmartcols-devel is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042266" version="1" comment="libuuid is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042267" version="1" comment="libuuid-devel is &lt;2.32.1-48.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042268" version="1" comment="python3-libmount is &lt;2.32.1-48.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042269" version="1" comment="util-linux is &lt;2.32.1-48.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042270" version="1" comment="util-linux-user is &lt;2.32.1-48.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042271" version="1" comment="uuidd is &lt;2.32.1-48.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042416" version="1" comment="resource-agents is &lt;4.9.0-54.el8_10.28 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042417" version="1" comment="resource-agents-aliyun is &lt;4.9.0-54.el8_10.28 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042418" version="1" comment="resource-agents-gcp is &lt;4.9.0-54.el8_10.28 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042419" version="1" comment="resource-agents-paf is &lt;4.9.0-54.el8_10.28 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042420" version="1" comment="fence-agents-aliyun is &lt;4.2.1-129.el8_10.21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042421" version="1" comment="fence-agents-all is &lt;4.2.1-129.el8_10.21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042422" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042423" version="1" comment="fence-agents-apc is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042424" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042425" version="1" comment="fence-agents-aws is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042426" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-129.el8_10.21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042427" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042428" version="1" comment="fence-agents-brocade is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042429" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042430" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042431" version="1" comment="fence-agents-common is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042432" version="1" comment="fence-agents-compute is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042433" version="1" comment="fence-agents-drac5 is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042434" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042435" version="1" comment="fence-agents-emerson is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042436" version="1" comment="fence-agents-eps is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042437" version="1" comment="fence-agents-gce is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042438" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042439" version="1" comment="fence-agents-hpblade is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042440" version="1" comment="fence-agents-ibm-powervs is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042441" version="1" comment="fence-agents-ibm-vpc is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042442" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042443" version="1" comment="fence-agents-ifmib is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042444" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042445" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042446" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042447" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042448" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042449" version="1" comment="fence-agents-ipdu is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042450" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042451" version="1" comment="fence-agents-kdump is &lt;4.2.1-129.el8_10.21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042452" version="1" comment="fence-agents-kubevirt is &lt;4.2.1-129.el8_10.21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042453" version="1" comment="fence-agents-lpar is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042454" version="1" comment="fence-agents-mpath is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042455" version="1" comment="fence-agents-nutanix-ahv is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042456" version="1" comment="fence-agents-openstack is &lt;4.2.1-129.el8_10.21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042457" version="1" comment="fence-agents-redfish is &lt;4.2.1-129.el8_10.21 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042458" version="1" comment="fence-agents-rhevm is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042459" version="1" comment="fence-agents-rsa is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042460" version="1" comment="fence-agents-rsb is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042461" version="1" comment="fence-agents-sbd is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042462" version="1" comment="fence-agents-scsi is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042463" version="1" comment="fence-agents-virsh is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042464" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042465" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042466" version="1" comment="fence-agents-wti is &lt;4.2.1-129.el8_10.21 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042272" version="1" comment="freerdp is &lt;2.11.7-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042273" version="1" comment="freerdp-devel is &lt;2.11.7-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042274" version="1" comment="freerdp-libs is &lt;2.11.7-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042275" version="1" comment="libwinpr is &lt;2.11.7-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042276" version="1" comment="libwinpr-devel is &lt;2.11.7-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042277" version="1" comment="python3.12-wheel is &lt;0.41.2-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042278" version="1" comment="python3.12-wheel-wheel is &lt;0.41.2-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042279" version="1" comment="platform-python is &lt;3.6.8-73.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042280" version="1" comment="platform-python-debug is &lt;3.6.8-73.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042281" version="1" comment="platform-python-devel is &lt;3.6.8-73.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042282" version="1" comment="python3-idle is &lt;3.6.8-73.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042283" version="1" comment="python3-libs is &lt;3.6.8-73.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042284" version="1" comment="python3-test is &lt;3.6.8-73.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042285" version="1" comment="python3-tkinter is &lt;3.6.8-73.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042467" version="1" comment="spice-client-win-x64 is &lt;8.10-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042468" version="1" comment="spice-client-win-x86 is &lt;8.10-7.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042469" version="1" comment="libsoup is &lt;2.62.3-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042470" version="1" comment="libsoup-devel is &lt;2.62.3-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042512" version="1" comment="thunderbird is &lt;140.7.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042471" version="1" comment="bpftool is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042472" version="1" comment="kernel is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042473" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.104.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042474" version="1" comment="kernel-core is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042475" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042476" version="1" comment="kernel-debug is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042477" version="1" comment="kernel-debug-core is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042479" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042480" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042482" version="1" comment="kernel-doc is &lt;4.18.0-553.104.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042483" version="1" comment="kernel-headers is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042484" version="1" comment="kernel-modules is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042485" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042486" version="1" comment="kernel-tools is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042487" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042489" version="1" comment="perf is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042490" version="1" comment="python3-perf is &lt;4.18.0-553.104.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042513" version="1" comment="git-lfs is &lt;3.4.1-7.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042514" version="1" comment="brotli is &lt;1.0.6-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042515" version="1" comment="brotli-devel is &lt;1.0.6-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042516" version="1" comment="python3-brotli is &lt;1.0.6-4.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042723" version="1" comment="python3.12 is &lt;3.12.12-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042724" version="1" comment="python3.12-debug is &lt;3.12.12-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042725" version="1" comment="python3.12-devel is &lt;3.12.12-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042726" version="1" comment="python3.12-idle is &lt;3.12.12-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042727" version="1" comment="python3.12-libs is &lt;3.12.12-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042728" version="1" comment="python3.12-rpm-macros is &lt;3.12.12-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042729" version="1" comment="python3.12-test is &lt;3.12.12-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042730" version="1" comment="python3.12-tkinter is &lt;3.12.12-2.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042731" version="1" comment="nodejs is &lt;24.13.0-0.module+el8.10.0+23888+24fa7806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042732" version="1" comment="nodejs-devel is &lt;24.13.0-0.module+el8.10.0+23888+24fa7806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042733" version="1" comment="nodejs-docs is &lt;24.13.0-0.module+el8.10.0+23888+24fa7806 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042734" version="1" comment="nodejs-full-i18n is &lt;24.13.0-0.module+el8.10.0+23888+24fa7806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042735" version="1" comment="nodejs-libs is &lt;24.13.0-0.module+el8.10.0+23888+24fa7806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042736" version="1" comment="nodejs-nodemon is &lt;3.0.3-1.module+el8.10.0+23730+2ad7beb8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042737" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el8.10.0+23730+2ad7beb8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042738" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el8.10.0+23730+2ad7beb8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042739" version="1" comment="npm is &lt;11.6.2-1.24.13.0.0.module+el8.10.0+23888+24fa7806 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042740" version="1" comment="v8-13.6-devel is &lt;13.6.233.17-1.24.13.0.0.module+el8.10.0+23888+24fa7806 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042741" version="1" comment="nodejs is &lt;22.22.0-1.module+el8.10.0+23904+2c92f862 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042742" version="1" comment="nodejs-devel is &lt;22.22.0-1.module+el8.10.0+23904+2c92f862 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042743" version="1" comment="nodejs-docs is &lt;22.22.0-1.module+el8.10.0+23904+2c92f862 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042744" version="1" comment="nodejs-full-i18n is &lt;22.22.0-1.module+el8.10.0+23904+2c92f862 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042745" version="1" comment="nodejs-libs is &lt;22.22.0-1.module+el8.10.0+23904+2c92f862 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042746" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+23474+222d264a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042747" version="1" comment="nodejs-packaging is &lt;2021.06-5.module+el8.10.0+23590+1e59695e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042748" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-5.module+el8.10.0+23590+1e59695e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042749" version="1" comment="npm is &lt;10.9.4-1.22.22.0.1.module+el8.10.0+23904+2c92f862 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042750" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.22.0.1.module+el8.10.0+23904+2c92f862 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042517" version="1" comment="nodejs is &lt;20.20.0-1.module+el8.10.0+23905+c49b2aec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042518" version="1" comment="nodejs-devel is &lt;20.20.0-1.module+el8.10.0+23905+c49b2aec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042519" version="1" comment="nodejs-docs is &lt;20.20.0-1.module+el8.10.0+23905+c49b2aec for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042520" version="1" comment="nodejs-full-i18n is &lt;20.20.0-1.module+el8.10.0+23905+c49b2aec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042521" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+23521+490ebfde for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042522" version="1" comment="nodejs-packaging is &lt;2021.06-5.module+el8.10.0+23591+ff544af9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042523" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-5.module+el8.10.0+23591+ff544af9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042524" version="1" comment="npm is &lt;10.8.2-1.20.20.0.1.module+el8.10.0+23905+c49b2aec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042751" version="1" comment="php is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042752" version="1" comment="php-bcmath is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042753" version="1" comment="php-cli is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042754" version="1" comment="php-common is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042755" version="1" comment="php-dba is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042756" version="1" comment="php-dbg is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042757" version="1" comment="php-devel is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042758" version="1" comment="php-embedded is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042759" version="1" comment="php-enchant is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042760" version="1" comment="php-ffi is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042761" version="1" comment="php-fpm is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042762" version="1" comment="php-gd is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042763" version="1" comment="php-gmp is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042764" version="1" comment="php-intl is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042765" version="1" comment="php-json is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042766" version="1" comment="php-ldap is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042767" version="1" comment="php-mbstring is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042768" version="1" comment="php-mysqlnd is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042769" version="1" comment="php-odbc is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042770" version="1" comment="php-opcache is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042771" version="1" comment="php-pdo is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042772" version="1" comment="php-pgsql is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042773" version="1" comment="php-process is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042774" version="1" comment="php-snmp is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042775" version="1" comment="php-soap is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042776" version="1" comment="php-xml is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042777" version="1" comment="php-xmlrpc is &lt;7.4.33-3.module+el8.10.0+23902+d3c8dd8f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043374" version="1" comment="gcc-toolset-14-binutils is &lt;2.41-4.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043375" version="1" comment="gcc-toolset-14-binutils-devel is &lt;2.41-4.el8_10.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043376" version="1" comment="gcc-toolset-14-binutils-gold is &lt;2.41-4.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043377" version="1" comment="gcc-toolset-14-binutils-gprofng is &lt;2.41-4.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044030" version="1" comment="go-toolset is &lt;1.25.7-1.module+el8.10.0+23993+83a15e10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044031" version="1" comment="golang is &lt;1.25.7-1.module+el8.10.0+23993+83a15e10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044032" version="1" comment="golang-bin is &lt;1.25.7-1.module+el8.10.0+23993+83a15e10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044033" version="1" comment="golang-docs is &lt;1.25.7-1.module+el8.10.0+23993+83a15e10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044034" version="1" comment="golang-misc is &lt;1.25.7-1.module+el8.10.0+23993+83a15e10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044035" version="1" comment="golang-race is &lt;1.25.7-1.module+el8.10.0+23993+83a15e10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044036" version="1" comment="golang-src is &lt;1.25.7-1.module+el8.10.0+23993+83a15e10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044037" version="1" comment="golang-tests is &lt;1.25.7-1.module+el8.10.0+23993+83a15e10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044135" version="1" comment="bpftool is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044136" version="1" comment="kernel is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044137" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.105.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044138" version="1" comment="kernel-core is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044139" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044140" version="1" comment="kernel-debug is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044141" version="1" comment="kernel-debug-core is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044143" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044144" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044146" version="1" comment="kernel-doc is &lt;4.18.0-553.105.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044147" version="1" comment="kernel-headers is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044148" version="1" comment="kernel-modules is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044149" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044150" version="1" comment="kernel-tools is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044151" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044153" version="1" comment="perf is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044154" version="1" comment="python3-perf is &lt;4.18.0-553.105.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044616" version="1" comment="munge is &lt;0.5.13-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044617" version="1" comment="munge-devel is &lt;0.5.13-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044618" version="1" comment="munge-libs is &lt;0.5.13-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044619" version="1" comment="openssl is &lt;1.1.1k-15.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044620" version="1" comment="openssl-devel is &lt;1.1.1k-15.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044621" version="1" comment="openssl-libs is &lt;1.1.1k-15.el8_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044622" version="1" comment="openssl-perl is &lt;1.1.1k-15.el8_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044734" version="1" comment="bpftool is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044735" version="1" comment="kernel is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044736" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.107.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044737" version="1" comment="kernel-core is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044738" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044739" version="1" comment="kernel-debug is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044740" version="1" comment="kernel-debug-core is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044742" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044743" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044745" version="1" comment="kernel-doc is &lt;4.18.0-553.107.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044746" version="1" comment="kernel-headers is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044747" version="1" comment="kernel-modules is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044748" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044749" version="1" comment="kernel-tools is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044750" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044752" version="1" comment="perf is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044753" version="1" comment="python3-perf is &lt;4.18.0-553.107.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044754" version="1" comment="grafana-pcp is &lt;5.1.1-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044755" version="1" comment="grafana is &lt;9.2.10-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044756" version="1" comment="grafana-selinux is &lt;9.2.10-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045096" version="1" comment="freerdp is &lt;2.11.7-3.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045097" version="1" comment="freerdp-devel is &lt;2.11.7-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045098" version="1" comment="freerdp-libs is &lt;2.11.7-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045099" version="1" comment="libwinpr is &lt;2.11.7-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045100" version="1" comment="libwinpr-devel is &lt;2.11.7-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045282" version="1" comment="firefox is &lt;140.8.0-2.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045283" version="1" comment="mingw32-fontconfig is &lt;2.12.6-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045284" version="1" comment="mingw64-fontconfig is &lt;2.12.6-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045285" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045286" version="1" comment="buildah is &lt;1.33.14-2.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045287" version="1" comment="buildah-tests is &lt;1.33.14-2.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045288" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+23963+b64d8032 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045289" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045290" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+23963+b64d8032 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045291" version="1" comment="containernetworking-plugins is &lt;1.4.0-7.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045292" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045293" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045294" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045295" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045296" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045297" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045298" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045299" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045300" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045301" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045302" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045303" version="1" comment="podman is &lt;4.9.4-28.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045304" version="1" comment="podman-catatonit is &lt;4.9.4-28.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045305" version="1" comment="podman-docker is &lt;4.9.4-28.module+el8.10.0+23963+b64d8032 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045306" version="1" comment="podman-gvproxy is &lt;4.9.4-28.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045307" version="1" comment="podman-plugins is &lt;4.9.4-28.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045308" version="1" comment="podman-remote is &lt;4.9.4-28.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045309" version="1" comment="podman-tests is &lt;4.9.4-28.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045310" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045311" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+23963+b64d8032 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045312" version="1" comment="runc is &lt;1.2.9-3.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045313" version="1" comment="skopeo is &lt;1.14.5-6.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045314" version="1" comment="skopeo-tests is &lt;1.14.5-6.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045315" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045316" version="1" comment="toolbox is &lt;0.0.99.5.1-1.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045317" version="1" comment="toolbox-tests is &lt;0.0.99.5.1-1.module+el8.10.0+23963+b64d8032 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045318" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+23963+b64d8032 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046346" version="1" comment="bpftool is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046347" version="1" comment="kernel is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046348" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.109.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046349" version="1" comment="kernel-core is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046350" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046351" version="1" comment="kernel-debug is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046352" version="1" comment="kernel-debug-core is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046354" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046355" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046357" version="1" comment="kernel-doc is &lt;4.18.0-553.109.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046358" version="1" comment="kernel-headers is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046359" version="1" comment="kernel-modules is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046360" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046361" version="1" comment="kernel-tools is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046362" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046364" version="1" comment="perf is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046365" version="1" comment="python3-perf is &lt;4.18.0-553.109.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046386" version="1" comment="thunderbird is &lt;140.8.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047518" version="1" comment="libnfsidmap is &lt;2.3.3-68.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047519" version="1" comment="libnfsidmap-devel is &lt;2.3.3-68.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047520" version="1" comment="nfs-utils is &lt;2.3.3-68.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047807" version="1" comment="bpftool is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047808" version="1" comment="kernel is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047809" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.111.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047810" version="1" comment="kernel-core is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047811" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047812" version="1" comment="kernel-debug is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047813" version="1" comment="kernel-debug-core is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047814" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047815" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047816" version="1" comment="kernel-doc is &lt;4.18.0-553.111.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047817" version="1" comment="kernel-headers is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047818" version="1" comment="kernel-modules is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047819" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047820" version="1" comment="kernel-tools is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047821" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047822" version="1" comment="perf is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047823" version="1" comment="python3-perf is &lt;4.18.0-553.111.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047824" version="1" comment="libvpx is &lt;1.7.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047825" version="1" comment="libvpx-devel is &lt;1.7.0-13.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047826" version="1" comment="git-lfs is &lt;3.4.1-8.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048068" version="1" comment="postgresql is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048069" version="1" comment="postgresql-contrib is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048070" version="1" comment="postgresql-docs is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048071" version="1" comment="postgresql-plperl is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048072" version="1" comment="postgresql-plpython3 is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048073" version="1" comment="postgresql-pltcl is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048074" version="1" comment="postgresql-server is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048075" version="1" comment="postgresql-server-devel is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048076" version="1" comment="postgresql-static is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048077" version="1" comment="postgresql-test is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048078" version="1" comment="postgresql-test-rpm-macros is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048079" version="1" comment="postgresql-upgrade is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048080" version="1" comment="postgresql-upgrade-devel is &lt;13.23-2.module+el8.10.0+24039+b49622e4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048490" version="1" comment="postgresql is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048491" version="1" comment="postgresql-contrib is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048492" version="1" comment="postgresql-docs is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048493" version="1" comment="postgresql-plperl is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048494" version="1" comment="postgresql-plpython3 is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048495" version="1" comment="postgresql-pltcl is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048496" version="1" comment="postgresql-private-devel is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048497" version="1" comment="postgresql-private-libs is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048498" version="1" comment="postgresql-server is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048499" version="1" comment="postgresql-server-devel is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048500" version="1" comment="postgresql-static is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048501" version="1" comment="postgresql-test is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048502" version="1" comment="postgresql-test-rpm-macros is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048503" version="1" comment="postgresql-upgrade is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048504" version="1" comment="postgresql-upgrade-devel is &lt;15.17-1.module+el8.10.0+24043+d28c3b3f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048081" version="1" comment="postgresql is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048082" version="1" comment="postgresql-contrib is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048083" version="1" comment="postgresql-docs is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048084" version="1" comment="postgresql-plperl is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048085" version="1" comment="postgresql-plpython3 is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048086" version="1" comment="postgresql-pltcl is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048087" version="1" comment="postgresql-private-devel is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048088" version="1" comment="postgresql-private-libs is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048089" version="1" comment="postgresql-server is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048090" version="1" comment="postgresql-server-devel is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048091" version="1" comment="postgresql-static is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048092" version="1" comment="postgresql-test is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048093" version="1" comment="postgresql-test-rpm-macros is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048094" version="1" comment="postgresql-upgrade is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048095" version="1" comment="postgresql-upgrade-devel is &lt;16.13-1.module+el8.10.0+24044+3710dd58 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048153" version="1" comment="pg_repack is &lt;1.4.6-3.module+el8.9.0+19330+c97ddbdf for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048154" version="1" comment="pgaudit is &lt;1.4.0-7.module+el8.10.0+22214+9beb89d6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048155" version="1" comment="postgres-decoderbufs is &lt;0.10.0-2.module+el8.9.0+19330+c97ddbdf for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048156" version="1" comment="postgresql is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048157" version="1" comment="postgresql-contrib is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048158" version="1" comment="postgresql-docs is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048159" version="1" comment="postgresql-plperl is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048160" version="1" comment="postgresql-plpython3 is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048161" version="1" comment="postgresql-pltcl is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048162" version="1" comment="postgresql-server is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048163" version="1" comment="postgresql-server-devel is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048164" version="1" comment="postgresql-static is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048165" version="1" comment="postgresql-test is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048166" version="1" comment="postgresql-test-rpm-macros is &lt;12.22-6.module+el8.10.0+24045+2b30545f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048167" version="1" comment="postgresql-upgrade is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048168" version="1" comment="postgresql-upgrade-devel is &lt;12.22-6.module+el8.10.0+24045+2b30545f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047827" version="1" comment="python3-pyasn1 is &lt;0.3.7-6.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047828" version="1" comment="python3-pyasn1-modules is &lt;0.3.7-6.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048169" version="1" comment="mingw32-libpng is &lt;1.6.34-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048170" version="1" comment="mingw32-libpng-static is &lt;1.6.34-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048171" version="1" comment="mingw64-libpng is &lt;1.6.34-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048172" version="1" comment="mingw64-libpng-static is &lt;1.6.34-2.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048505" version="1" comment="vim-X11 is &lt;8.0.1763-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048506" version="1" comment="vim-common is &lt;8.0.1763-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048507" version="1" comment="vim-enhanced is &lt;8.0.1763-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048508" version="1" comment="vim-filesystem is &lt;8.0.1763-22.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048509" version="1" comment="vim-minimal is &lt;8.0.1763-22.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048877" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048878" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048879" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048880" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048881" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048882" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048883" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048884" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.115-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048885" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.115-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048886" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.115-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048887" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.115-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048888" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.14-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048889" version="1" comment="dotnet-templates-9.0 is &lt;9.0.115-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048890" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.115-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048891" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.25-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048892" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.25-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048893" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.25-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048894" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.25-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048895" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.25-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048896" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.25-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048897" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.25-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048898" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.125-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048899" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.125-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048900" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.125-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048901" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.25-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048902" version="1" comment="dotnet-templates-8.0 is &lt;8.0.125-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048903" version="1" comment="aspnetcore-runtime-10.0 is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048904" version="1" comment="aspnetcore-runtime-dbg-10.0 is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048905" version="1" comment="aspnetcore-targeting-pack-10.0 is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048906" version="1" comment="dotnet is &lt;10.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048907" version="1" comment="dotnet-apphost-pack-10.0 is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048908" version="1" comment="dotnet-host is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048909" version="1" comment="dotnet-hostfxr-10.0 is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048910" version="1" comment="dotnet-runtime-10.0 is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048911" version="1" comment="dotnet-runtime-dbg-10.0 is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048912" version="1" comment="dotnet-sdk-10.0 is &lt;10.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048913" version="1" comment="dotnet-sdk-10.0-source-built-artifacts is &lt;10.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048914" version="1" comment="dotnet-sdk-aot-10.0 is &lt;10.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048915" version="1" comment="dotnet-sdk-dbg-10.0 is &lt;10.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048916" version="1" comment="dotnet-targeting-pack-10.0 is &lt;10.0.4-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048917" version="1" comment="dotnet-templates-10.0 is &lt;10.0.104-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048510" version="1" comment="python3.12 is &lt;3.12.12-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048511" version="1" comment="python3.12-debug is &lt;3.12.12-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048512" version="1" comment="python3.12-devel is &lt;3.12.12-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048513" version="1" comment="python3.12-idle is &lt;3.12.12-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048514" version="1" comment="python3.12-libs is &lt;3.12.12-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048515" version="1" comment="python3.12-rpm-macros is &lt;3.12.12-3.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048516" version="1" comment="python3.12-test is &lt;3.12.12-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048517" version="1" comment="python3.12-tkinter is &lt;3.12.12-3.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048918" version="1" comment="python3.11 is &lt;3.11.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048919" version="1" comment="python3.11-debug is &lt;3.11.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048920" version="1" comment="python3.11-devel is &lt;3.11.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048921" version="1" comment="python3.11-idle is &lt;3.11.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048922" version="1" comment="python3.11-libs is &lt;3.11.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048923" version="1" comment="python3.11-rpm-macros is &lt;3.11.13-5.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048924" version="1" comment="python3.11-test is &lt;3.11.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048925" version="1" comment="python3.11-tkinter is &lt;3.11.13-5.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048982" version="1" comment="grub2-common is &lt;2.02-170.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048983" version="1" comment="grub2-efi-ia32 is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048984" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048985" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-170.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048986" version="1" comment="grub2-efi-x64 is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048987" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048988" version="1" comment="grub2-efi-x64-modules is &lt;2.02-170.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048989" version="1" comment="grub2-pc is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048990" version="1" comment="grub2-pc-modules is &lt;2.02-170.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048991" version="1" comment="grub2-tools is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048992" version="1" comment="grub2-tools-efi is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048993" version="1" comment="grub2-tools-extra is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048994" version="1" comment="grub2-tools-minimal is &lt;2.02-170.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048995" version="1" comment="aardvark-dns is &lt;1.10.1-2.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048996" version="1" comment="buildah is &lt;1.33.14-3.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048997" version="1" comment="buildah-tests is &lt;1.33.14-3.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048998" version="1" comment="cockpit-podman is &lt;84.1-1.module+el8.10.0+24081+a04d358a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048999" version="1" comment="conmon is &lt;2.1.10-1.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049000" version="1" comment="container-selinux is &lt;2.229.0-2.module+el8.10.0+24081+a04d358a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049001" version="1" comment="containernetworking-plugins is &lt;1.4.0-8.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049002" version="1" comment="containers-common is &lt;1-82.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049003" version="1" comment="crit is &lt;3.18-5.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049004" version="1" comment="criu is &lt;3.18-5.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049005" version="1" comment="criu-devel is &lt;3.18-5.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049006" version="1" comment="criu-libs is &lt;3.18-5.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049007" version="1" comment="crun is &lt;1.14.3-2.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049008" version="1" comment="fuse-overlayfs is &lt;1.13-1.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049009" version="1" comment="libslirp is &lt;4.4.0-2.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049010" version="1" comment="libslirp-devel is &lt;4.4.0-2.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049011" version="1" comment="netavark is &lt;1.10.3-1.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049012" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-1.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049013" version="1" comment="podman is &lt;4.9.4-30.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049014" version="1" comment="podman-catatonit is &lt;4.9.4-30.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049015" version="1" comment="podman-docker is &lt;4.9.4-30.module+el8.10.0+24081+a04d358a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049016" version="1" comment="podman-gvproxy is &lt;4.9.4-30.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049017" version="1" comment="podman-plugins is &lt;4.9.4-30.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049018" version="1" comment="podman-remote is &lt;4.9.4-30.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049019" version="1" comment="podman-tests is &lt;4.9.4-30.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049020" version="1" comment="python3-criu is &lt;3.18-5.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049021" version="1" comment="python3-podman is &lt;4.9.0-3.module+el8.10.0+24081+a04d358a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049022" version="1" comment="runc is &lt;1.2.9-4.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049023" version="1" comment="skopeo is &lt;1.14.5-7.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049024" version="1" comment="skopeo-tests is &lt;1.14.5-7.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049025" version="1" comment="slirp4netns is &lt;1.2.3-1.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049026" version="1" comment="toolbox is &lt;0.0.99.5.1-1.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049027" version="1" comment="toolbox-tests is &lt;0.0.99.5.1-1.module+el8.10.0+24081+a04d358a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049028" version="1" comment="udica is &lt;0.2.6-21.module+el8.10.0+24081+a04d358a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049029" version="1" comment="libpng is &lt;1.6.34-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049030" version="1" comment="libpng-devel is &lt;1.6.34-10.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049251" version="1" comment="glibc-langpack-aa is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049252" version="1" comment="glibc-langpack-af is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049253" version="1" comment="glibc-langpack-agr is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049254" version="1" comment="glibc-langpack-ak is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049255" version="1" comment="glibc-langpack-am is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049256" version="1" comment="glibc-langpack-an is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049257" version="1" comment="glibc-langpack-anp is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049258" version="1" comment="glibc-langpack-ast is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049259" version="1" comment="glibc-langpack-ayc is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049260" version="1" comment="glibc-langpack-az is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049261" version="1" comment="glibc-langpack-be is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049262" version="1" comment="glibc-langpack-bem is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049263" version="1" comment="glibc-langpack-ber is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049264" version="1" comment="glibc-langpack-bg is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049265" version="1" comment="glibc-langpack-bho is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049266" version="1" comment="glibc-langpack-bi is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049267" version="1" comment="glibc-langpack-bn is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049268" version="1" comment="glibc-langpack-bo is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049269" version="1" comment="glibc-langpack-brx is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049270" version="1" comment="glibc-langpack-bs is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049271" version="1" comment="glibc-langpack-ca is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049272" version="1" comment="glibc-langpack-cs is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049273" version="1" comment="glibc-langpack-csb is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049274" version="1" comment="glibc-langpack-cv is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049275" version="1" comment="glibc-langpack-cy is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049276" version="1" comment="glibc-langpack-de is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049277" version="1" comment="glibc-langpack-doi is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049278" version="1" comment="glibc-langpack-es is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049279" version="1" comment="glibc-langpack-et is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049280" version="1" comment="glibc-langpack-eu is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049281" version="1" comment="glibc-langpack-fi is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049282" version="1" comment="glibc-langpack-fil is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049283" version="1" comment="glibc-langpack-fo is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049284" version="1" comment="glibc-langpack-fr is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049285" version="1" comment="glibc-langpack-gez is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049286" version="1" comment="glibc-langpack-gl is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049287" version="1" comment="glibc-langpack-gu is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049288" version="1" comment="glibc-langpack-hak is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049289" version="1" comment="glibc-langpack-he is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049290" version="1" comment="glibc-langpack-ks is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049291" version="1" comment="glibc-langpack-ku is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049292" version="1" comment="glibc-langpack-kw is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049293" version="1" comment="glibc-langpack-lb is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049294" version="1" comment="glibc-langpack-lt is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049295" version="1" comment="glibc-langpack-lv is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049296" version="1" comment="glibc-langpack-mag is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049297" version="1" comment="glibc-langpack-mai is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049298" version="1" comment="glibc-langpack-mfe is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049299" version="1" comment="glibc-langpack-ps is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049300" version="1" comment="glibc-langpack-pt is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049301" version="1" comment="glibc-langpack-quz is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049302" version="1" comment="glibc-langpack-sat is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049303" version="1" comment="glibc-langpack-sc is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049304" version="1" comment="glibc-langpack-te is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049305" version="1" comment="glibc-langpack-tg is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049306" version="1" comment="glibc-langpack-ug is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049307" version="1" comment="glibc-langpack-uk is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049308" version="1" comment="glibc-langpack-ur is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049309" version="1" comment="glibc-langpack-uz is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049310" version="1" comment="glibc-langpack-ve is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049311" version="1" comment="glibc-langpack-vi is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049312" version="1" comment="glibc-langpack-wa is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049313" version="1" comment="glibc-locale-source is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049314" version="1" comment="glibc-minimal-langpack is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049315" version="1" comment="glibc-utils is &lt;2.28-251.el8_10.31 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049628" version="1" comment="gimp is &lt;2.8.22-26.module+el8.10.0+24086+d017a7e0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049629" version="1" comment="gimp-devel is &lt;2.8.22-26.module+el8.10.0+24086+d017a7e0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049630" version="1" comment="gimp-devel-tools is &lt;2.8.22-26.module+el8.10.0+24086+d017a7e0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049631" version="1" comment="gimp-libs is &lt;2.8.22-26.module+el8.10.0+24086+d017a7e0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050076" version="1" comment="389-ds-base is &lt;1.4.3.39-23.module+el8.10.0+24085+b368a310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050077" version="1" comment="389-ds-base-devel is &lt;1.4.3.39-23.module+el8.10.0+24085+b368a310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050078" version="1" comment="389-ds-base-legacy-tools is &lt;1.4.3.39-23.module+el8.10.0+24085+b368a310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050079" version="1" comment="389-ds-base-libs is &lt;1.4.3.39-23.module+el8.10.0+24085+b368a310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050080" version="1" comment="389-ds-base-snmp is &lt;1.4.3.39-23.module+el8.10.0+24085+b368a310 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050081" version="1" comment="python3-lib389 is &lt;1.4.3.39-23.module+el8.10.0+24085+b368a310 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050320" version="1" comment="mysql is &lt;8.0.45-1.module+el8.10.0+24016+b28eaa79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050321" version="1" comment="mysql-common is &lt;8.0.45-1.module+el8.10.0+24016+b28eaa79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050322" version="1" comment="mysql-devel is &lt;8.0.45-1.module+el8.10.0+24016+b28eaa79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050323" version="1" comment="mysql-errmsg is &lt;8.0.45-1.module+el8.10.0+24016+b28eaa79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050324" version="1" comment="mysql-libs is &lt;8.0.45-1.module+el8.10.0+24016+b28eaa79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050325" version="1" comment="mysql-server is &lt;8.0.45-1.module+el8.10.0+24016+b28eaa79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050326" version="1" comment="mysql-test is &lt;8.0.45-1.module+el8.10.0+24016+b28eaa79 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050082" version="1" comment="nginx is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050083" version="1" comment="nginx-all-modules is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050084" version="1" comment="nginx-filesystem is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050085" version="1" comment="nginx-mod-devel is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050086" version="1" comment="nginx-mod-http-image-filter is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050087" version="1" comment="nginx-mod-http-perl is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050088" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050089" version="1" comment="nginx-mod-mail is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050090" version="1" comment="nginx-mod-stream is &lt;1.24.0-2.module+el8.10.0+24013+f603d2af for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050327" version="1" comment="gnutls is &lt;3.6.16-8.el8_10.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050328" version="1" comment="gnutls-c++ is &lt;3.6.16-8.el8_10.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050329" version="1" comment="gnutls-dane is &lt;3.6.16-8.el8_10.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050330" version="1" comment="gnutls-devel is &lt;3.6.16-8.el8_10.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050331" version="1" comment="gnutls-utils is &lt;3.6.16-8.el8_10.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050091" version="1" comment="opencryptoki is &lt;3.22.0-3.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050092" version="1" comment="opencryptoki-devel is &lt;3.22.0-3.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050093" version="1" comment="opencryptoki-icsftok is &lt;3.22.0-3.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050094" version="1" comment="opencryptoki-libs is &lt;3.22.0-3.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050095" version="1" comment="opencryptoki-swtok is &lt;3.22.0-3.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050096" version="1" comment="opencryptoki-tpmtok is &lt;3.22.0-3.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050332" version="1" comment="platform-python is &lt;3.6.8-74.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050333" version="1" comment="platform-python-debug is &lt;3.6.8-74.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050334" version="1" comment="platform-python-devel is &lt;3.6.8-74.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050335" version="1" comment="python3-idle is &lt;3.6.8-74.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050336" version="1" comment="python3-libs is &lt;3.6.8-74.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050337" version="1" comment="python3-test is &lt;3.6.8-74.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050338" version="1" comment="python3-tkinter is &lt;3.6.8-74.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051546" version="1" comment="firefox is &lt;140.9.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052303" version="1" comment="freerdp is &lt;2.11.7-4.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052304" version="1" comment="freerdp-devel is &lt;2.11.7-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052305" version="1" comment="freerdp-libs is &lt;2.11.7-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052306" version="1" comment="libwinpr is &lt;2.11.7-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052307" version="1" comment="libwinpr-devel is &lt;2.11.7-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052134" version="1" comment="bpftool is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052135" version="1" comment="kernel is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052136" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.115.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052137" version="1" comment="kernel-core is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052138" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052139" version="1" comment="kernel-debug is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052140" version="1" comment="kernel-debug-core is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052141" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052142" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052143" version="1" comment="kernel-doc is &lt;4.18.0-553.115.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052144" version="1" comment="kernel-headers is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052145" version="1" comment="kernel-modules is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052146" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052147" version="1" comment="kernel-tools is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052148" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052149" version="1" comment="perf is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052150" version="1" comment="python3-perf is &lt;4.18.0-553.115.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052386" version="1" comment="python3.11 is &lt;3.11.13-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052387" version="1" comment="python3.11-debug is &lt;3.11.13-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052388" version="1" comment="python3.11-devel is &lt;3.11.13-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052389" version="1" comment="python3.11-idle is &lt;3.11.13-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052390" version="1" comment="python3.11-libs is &lt;3.11.13-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052391" version="1" comment="python3.11-rpm-macros is &lt;3.11.13-6.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052392" version="1" comment="python3.11-test is &lt;3.11.13-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052393" version="1" comment="python3.11-tkinter is &lt;3.11.13-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052394" version="1" comment="python3.12 is &lt;3.12.12-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052395" version="1" comment="python3.12-debug is &lt;3.12.12-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052396" version="1" comment="python3.12-devel is &lt;3.12.12-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052397" version="1" comment="python3.12-idle is &lt;3.12.12-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052398" version="1" comment="python3.12-libs is &lt;3.12.12-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052399" version="1" comment="python3.12-rpm-macros is &lt;3.12.12-4.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052400" version="1" comment="python3.12-test is &lt;3.12.12-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052401" version="1" comment="python3.12-tkinter is &lt;3.12.12-4.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052486" version="1" comment="mysql is &lt;8.4.8-1.module+el8.10.0+24007+c07a67f2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052487" version="1" comment="mysql-common is &lt;8.4.8-1.module+el8.10.0+24007+c07a67f2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052488" version="1" comment="mysql-devel is &lt;8.4.8-1.module+el8.10.0+24007+c07a67f2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052489" version="1" comment="mysql-errmsg is &lt;8.4.8-1.module+el8.10.0+24007+c07a67f2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052490" version="1" comment="mysql-libs is &lt;8.4.8-1.module+el8.10.0+24007+c07a67f2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052491" version="1" comment="mysql-server is &lt;8.4.8-1.module+el8.10.0+24007+c07a67f2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052492" version="1" comment="mysql-test is &lt;8.4.8-1.module+el8.10.0+24007+c07a67f2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052493" version="1" comment="mysql-test-data is &lt;8.4.8-1.module+el8.10.0+24007+c07a67f2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052883" version="1" comment="galera is &lt;26.4.23-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052884" version="1" comment="mariadb is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052885" version="1" comment="mariadb-backup is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052886" version="1" comment="mariadb-common is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052887" version="1" comment="mariadb-devel is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052888" version="1" comment="mariadb-embedded is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052889" version="1" comment="mariadb-embedded-devel is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052890" version="1" comment="mariadb-errmsg is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052891" version="1" comment="mariadb-gssapi-server is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052892" version="1" comment="mariadb-oqgraph-engine is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052893" version="1" comment="mariadb-pam is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052894" version="1" comment="mariadb-server is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052895" version="1" comment="mariadb-server-galera is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052896" version="1" comment="mariadb-server-utils is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052897" version="1" comment="mariadb-test is &lt;10.11.15-1.module+el8.10.0+24010+d874728a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052766" version="1" comment="rsync is &lt;3.1.3-24.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052767" version="1" comment="rsync-daemon is &lt;3.1.3-24.el8_10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052768" version="1" comment="libpng15 is &lt;1.5.30-8.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052769" version="1" comment="libpng12 is &lt;1.2.57-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052898" version="1" comment="openssh is &lt;8.0p1-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052899" version="1" comment="openssh-askpass is &lt;8.0p1-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052900" version="1" comment="openssh-cavs is &lt;8.0p1-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052901" version="1" comment="openssh-clients is &lt;8.0p1-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052902" version="1" comment="openssh-keycat is &lt;8.0p1-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052903" version="1" comment="openssh-ldap is &lt;8.0p1-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052904" version="1" comment="openssh-server is &lt;8.0p1-28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052905" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-7.28.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052770" version="1" comment="perl-YAML-Syck is &lt;1.30-6.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052771" version="1" comment="platform-python is &lt;3.6.8-75.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052772" version="1" comment="platform-python-debug is &lt;3.6.8-75.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052773" version="1" comment="platform-python-devel is &lt;3.6.8-75.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052774" version="1" comment="python3-idle is &lt;3.6.8-75.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052775" version="1" comment="python3-libs is &lt;3.6.8-75.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052776" version="1" comment="python3-test is &lt;3.6.8-75.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052777" version="1" comment="python3-tkinter is &lt;3.6.8-75.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052855" version="1" comment="bpftool is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052856" version="1" comment="kernel is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052857" version="1" comment="kernel-abi-stablelists is &lt;4.18.0-553.117.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052858" version="1" comment="kernel-core is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052859" version="1" comment="kernel-cross-headers is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052860" version="1" comment="kernel-debug is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052861" version="1" comment="kernel-debug-core is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052862" version="1" comment="kernel-debug-modules is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052863" version="1" comment="kernel-debug-modules-extra is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052864" version="1" comment="kernel-doc is &lt;4.18.0-553.117.1.el8_10 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052865" version="1" comment="kernel-headers is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052866" version="1" comment="kernel-modules is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052867" version="1" comment="kernel-modules-extra is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052868" version="1" comment="kernel-tools is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052869" version="1" comment="kernel-tools-libs is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052870" version="1" comment="perf is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052871" version="1" comment="python3-perf is &lt;4.18.0-553.117.1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052906" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.16.1-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052907" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.16.1-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052908" version="1" comment="gstreamer1-plugins-base is &lt;1.16.1-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052909" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.16.1-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052910" version="1" comment="gstreamer1-plugins-good is &lt;1.16.1-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052911" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.16.1-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053254" version="1" comment="nginx is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053255" version="1" comment="nginx-all-modules is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053256" version="1" comment="nginx-filesystem is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053257" version="1" comment="nginx-mod-devel is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053258" version="1" comment="nginx-mod-http-image-filter is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053259" version="1" comment="nginx-mod-http-perl is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053260" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053261" version="1" comment="nginx-mod-mail is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053262" version="1" comment="nginx-mod-stream is &lt;1.24.0-3.module+el8.10.0+24155+8a5ade52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053085" version="1" comment="vim-X11 is &lt;8.0.1763-22.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053086" version="1" comment="vim-common is &lt;8.0.1763-22.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053087" version="1" comment="vim-enhanced is &lt;8.0.1763-22.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053088" version="1" comment="vim-filesystem is &lt;8.0.1763-22.el8_10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053089" version="1" comment="vim-minimal is &lt;8.0.1763-22.el8_10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053090" version="1" comment="thunderbird is &lt;140.9.0-1.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053263" version="1" comment="freerdp is &lt;2.11.7-6.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053264" version="1" comment="freerdp-devel is &lt;2.11.7-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053265" version="1" comment="freerdp-libs is &lt;2.11.7-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053266" version="1" comment="libwinpr is &lt;2.11.7-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053267" version="1" comment="libwinpr-devel is &lt;2.11.7-6.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053091" version="1" comment="go-toolset is &lt;1.25.8-1.module+el8.10.0+24168+9fd3a552 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053092" version="1" comment="golang is &lt;1.25.8-1.module+el8.10.0+24168+9fd3a552 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053093" version="1" comment="golang-bin is &lt;1.25.8-1.module+el8.10.0+24168+9fd3a552 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053094" version="1" comment="golang-docs is &lt;1.25.8-1.module+el8.10.0+24168+9fd3a552 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053095" version="1" comment="golang-misc is &lt;1.25.8-1.module+el8.10.0+24168+9fd3a552 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053096" version="1" comment="golang-race is &lt;1.25.8-1.module+el8.10.0+24168+9fd3a552 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053097" version="1" comment="golang-src is &lt;1.25.8-1.module+el8.10.0+24168+9fd3a552 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053098" version="1" comment="golang-tests is &lt;1.25.8-1.module+el8.10.0+24168+9fd3a552 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053268" version="1" comment="grafana-pcp is &lt;5.1.1-13.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053269" version="1" comment="grafana is &lt;9.2.10-29.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053270" version="1" comment="grafana-selinux is &lt;9.2.10-29.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053271" version="1" comment="nodejs is &lt;22.22.2-1.module+el8.10.0+24148+847b6786 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053272" version="1" comment="nodejs-devel is &lt;22.22.2-1.module+el8.10.0+24148+847b6786 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053273" version="1" comment="nodejs-docs is &lt;22.22.2-1.module+el8.10.0+24148+847b6786 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053274" version="1" comment="nodejs-full-i18n is &lt;22.22.2-1.module+el8.10.0+24148+847b6786 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053275" version="1" comment="nodejs-libs is &lt;22.22.2-1.module+el8.10.0+24148+847b6786 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053276" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el8.10.0+24148+847b6786 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053277" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el8.10.0+24148+847b6786 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053278" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el8.10.0+24148+847b6786 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053279" version="1" comment="npm is &lt;10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053280" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056372" version="1" comment="libnghttp2 is &lt;1.33.0-6.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056373" version="1" comment="libnghttp2-devel is &lt;1.33.0-6.el8_10.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056374" version="1" comment="nghttp2 is &lt;1.33.0-6.el8_10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056587" version="1" comment="nodejs is &lt;24.14.1-2.module+el8.10.0+24190+49a46c75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056588" version="1" comment="nodejs-devel is &lt;24.14.1-2.module+el8.10.0+24190+49a46c75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056589" version="1" comment="nodejs-docs is &lt;24.14.1-2.module+el8.10.0+24190+49a46c75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056590" version="1" comment="nodejs-full-i18n is &lt;24.14.1-2.module+el8.10.0+24190+49a46c75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056591" version="1" comment="nodejs-libs is &lt;24.14.1-2.module+el8.10.0+24190+49a46c75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056592" version="1" comment="nodejs-nodemon is &lt;3.0.3-1.module+el8.10.0+24190+49a46c75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056593" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el8.10.0+24190+49a46c75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056594" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el8.10.0+24190+49a46c75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056595" version="1" comment="npm is &lt;11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056596" version="1" comment="v8-13.6-devel is &lt;13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056597" version="1" comment="fontforge is &lt;20200314-7.el8_10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056375" version="1" comment="perl-XML-Parser is &lt;2.44-12.el8_10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250328"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles_es-release-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-appliance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-inspect-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-java-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rescue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-tools-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-winsupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-xfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiscsi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiscsi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdfuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-basic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-basic-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-curl-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-example-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-gzip-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-gzip-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-linuxdisk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-nbd-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-python-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-ssh-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-tar-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-tar-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-tmpdisk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-vddk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-xz-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-hw-usbredir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-ui-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seabios-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seavgabios-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sgabios-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supermin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supermin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-tools-pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-dib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32-cdboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-cdboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>appstream-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-samples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-command-not-found</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dleyna-renderer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dleyna-renderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frei0r-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frei0r-plugins-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-pam-extensions-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-classic-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-control-center</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-control-center-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-remote-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-kiosk-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-wayland-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-xsession</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-apps-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-auto-move-windows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-dash-to-dock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-disable-screenshield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-drive-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-horizontal-workspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-launch-new-instance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-native-window-placement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-no-hot-corner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-panel-favorites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-places-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-screenshot-window-sizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-systemMonitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-top-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-updates-dialog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-user-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-window-grouper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-window-list</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-windowsNavigator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-workspace-indicator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-terminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-terminal-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsettings-desktop-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsettings-desktop-schemas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-update-icon-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-afp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-archive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-gphoto2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-mtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-smb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutter-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire0.2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire0.2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte291</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-jsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-jsc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webrtc-audio-processing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webrtc-audio-processing-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frei0r-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygobject3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte291-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gobject-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-benchmarking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Judy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-gssapi-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-oqgraph-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-Cython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-chardet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-markupsafe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-numpy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-numpy-f2py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-psutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-psycopg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-psycopg2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-psycopg2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pysocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pytz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-pyyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-scipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python38-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-chardet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-numpy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-numpy-f2py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-psutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-psycopg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-psycopg2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-psycopg2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pysocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-scipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-toml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_md</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_proxy_html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aopalliance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-codec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atinject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdi-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-annotation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-el-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-guice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawtjni-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jansi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jansi-native</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jboss-interceptors-1.2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jcl-over-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-connector-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-spi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-transport-wagon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon-file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon-http-shared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon-provider-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-cipher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-classworlds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-containers-component-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-interpolation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-sec-dispatcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sisu-inject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sisu-plexus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-openjdk11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-openjdk17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-openjdk8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sisu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osbuild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osbuild-luks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osbuild-lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osbuild-ostree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osbuild-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osbuild-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-osbuild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weldr-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weldr-client-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-sdmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-App-cpanminus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN-DistnameInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN-Meta-Check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-pushd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-CPANfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Parse-PMFile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-String-ShellQuote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-gdb-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-offload-nvptx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-plugin-annobin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp-offload-nvptx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc-plugin-annobin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libatomic-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libgccjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libgccjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libhwasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-liblsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libtsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-libubsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-offload-nvptx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhwasan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc-plugin-annobin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libatomic-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libgccjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libgccjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libhwasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-liblsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libtsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-libubsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-offload-nvptx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-epn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-python-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-trust-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipalib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipaserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipatests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dyndb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>custodia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-healthcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-healthcheck-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opendnssec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-custodia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-kdcproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyusb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qrcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qrcode-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-yubico</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slapi-nis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>softhsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>softhsm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-icsftok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-swtok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-tpmtok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>container-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containernetworking-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>criu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-overlayfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslirp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oci-seccomp-bpf-hook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-catatonit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-criu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>toolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>toolbox-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-3.1-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-3.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-6.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netstandard-targeting-pack-2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qatzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qatzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qatzip-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl100-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl1000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl105-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl135-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2030-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl3160-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl3945-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl4965-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5150-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2a-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2b-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6050-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl7260-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libertas-sd8686-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libertas-sd8787-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libertas-usb8388-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libertas-usb8388-olpc-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cifscreds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>delve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-toolset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-full-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-nodemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-workstation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>edk2-ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-dvipdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oci-systemd-hook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oci-umount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nose-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-psycopg2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sqlalchemy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Cython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-attrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-backports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-backports-ssl_match_hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-bson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-chardet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-coverage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-docs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-docutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-funcsigs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-markupsafe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-mock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-nose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-f2py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pluggy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-psycopg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-psycopg2-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-psycopg2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pymongo-gridfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pysocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pytest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pytest-mock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pytz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-scipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools_scm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-sqlalchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pymongo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-virtualenv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-docutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-nose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pymongo-gridfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-scipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sqlalchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python36-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_mellon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>platform-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>platform-python-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>platform-python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-export-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-export-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-sdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-sdb-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-abi-whitelists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-cross-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-python-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-vddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-p2v-maker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-host-fxr-2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-2.1.5xx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cluster-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-nagios-plugins-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bea-stax-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-fastinfoset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-jaxb-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-jaxb-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-jaxb-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-jaxb-txw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-jaxrs-json-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-jaxrs-providers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-module-jaxb-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javassist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javassist-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-servlet-4.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-servlet-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>relaxngDatatype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-jdk14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stax-ex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xml-commons-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xml-commons-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlstreambuffer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-X11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-enhanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-vzic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-irb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-abrt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-abrt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bigdecimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bson-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-did_you_mean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-io-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-minitest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mongo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mysql2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mysql2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-net-telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-pg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-power_assert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-psych</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-test-unit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-ipadic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-ipadic-EUCJP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-errmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_dav_svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-javahl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utf8proc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-all-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-image-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-xslt-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-stream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-boxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osinfo-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osinfo-db-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-assistant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-doctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qdbusviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designercomponents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-legacy-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-manpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-podman-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_mellon-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pigeonhole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>http-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libpthread-nonshared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-all-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-benchtests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-agr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-an</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-anp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ayc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-az</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bhb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bho</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-byn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-chr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cmn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-crh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-csb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-doi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-iu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-li</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lzh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mfe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mhr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-miq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mjw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nhn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-niu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-os</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-quz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-raj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-se</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-shn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-shs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-so</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-szl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tcy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-the</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-to</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-unm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yuw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-zh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-minimal-langpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_hesiod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baobab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrome-gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-xlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-xlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gjs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gjs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-tweaks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs60-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-core-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-graphics-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-plugin-fade-throbber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-plugin-label</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-plugin-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-plugin-space-flares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-plugin-throbgress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-plugin-two-step</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-system-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-theme-charge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-theme-fade-in</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-theme-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-theme-solar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-theme-spinfinity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plymouth-theme-spinner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayland-protocols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-plugin-process-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-default-yama-scope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb5-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-krb5-locator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>createrepo_c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>createrepo_c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>createrepo_c-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnf-automatic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnf-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnf-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcomps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcomps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microdnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-createrepo_c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dnf-plugin-versionlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dnf-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-hawkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libcomps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libdnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-dane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssdconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common-pac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-libwbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-nfs-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-polkit-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldpad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-keycat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh_agent_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-f2py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Judy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>asio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-dbg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mysqlnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-process</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-recode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apcu-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-apcu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-apcu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-instaweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-subtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git-SVN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-3.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exchange-bmc-os-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmievd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-color-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgexiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-ugly-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jss-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-kra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-servlet-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-symkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcatjss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-azure-monitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-cloudwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-loki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-opentsdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-postgres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-stackdriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-qt5-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyqt5-sip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qgnomeplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtcanvas3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtcanvas3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttranslations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-srpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmjsonparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmkubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmsnmptrapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ipptool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-lpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-menus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-menus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs52-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vinagre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-hid2hci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-obexd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>platform-python-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jbig2dec-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-drivers-cameras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-drivers-scanners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-adsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-cloud-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-dispatcher-routing-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-team</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wwan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-rrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-xdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-upgrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-upgrade-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2-smime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-md5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-utf16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-utf32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup-reencrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>integritysetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>veritysetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents-aliyun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oddjob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oddjob-mkhomedir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-jmx-exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oniguruma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oniguruma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-agent-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-connector-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-connector-c-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-connector-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fapolicyd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fapolicyd-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgres-decoderbufs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-session-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Attribute-Handlers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Devel-Peek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Devel-SelfStubber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Errno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Miniperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Locale-Maketext-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Math-Complex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Memoize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Loaded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SelfLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time-Piece</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-interpreter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libnetcfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-open</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-resize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-connectivity-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-abi-stablelists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atkmm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atkmm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atkmm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairomm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairomm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dleyna-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dleyna-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enchant2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enchant2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gamin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gamin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geocode-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geocode-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkmm24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkmm24-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkmm24-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkmm30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkmm30-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkmm30-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdazzle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdazzle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepubgen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsigc++20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsigc++20-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsigc++20-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisual-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pangomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pangomm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pangomm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>woff2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>woff2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-trust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winexe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-cxx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-cxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdb-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brotli-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-acme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>egl-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-egl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-gles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-glx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-dri-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libEGL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libOSMesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libgbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libglapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libxatracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-vdpau-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-vulkan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-vulkan-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xdmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xephyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xnest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xorg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clippy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-debugger-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-lldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-toolset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustfmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw-binutils-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw-filesystem-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-bzip2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-sqlite-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-bzip2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-sqlite-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pandoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pandoc-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-fapolicyd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-ima</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-prioreset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-syslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-systemd-inhibit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-sign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-default-gems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-irb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-exiv2-026</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents-gcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents-paf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-distro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>criu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>criu-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-gvproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadwaita-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wx-siplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-ffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static-wasm32-unknown-unknown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-psutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-utf16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-utf32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-autoar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-calculator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-gesture-inhibitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kexec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-c++-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-compat-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-term</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdnf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dnf-plugin-post-transaction-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsepol-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-gcc-gdb-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-libasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-libatomic-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-liblsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-libtsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-libubsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-gcc-gdb-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libasan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libatomic-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libgccjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libgccjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libgccjit-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-liblsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libtsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-libubsan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-annobin-annocheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-annobin-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-annobin-plugin-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-annobin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>annobin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>annobin-annocheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-11-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-10-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang-analyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang-resource-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang-tools-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compiler-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-clang-format</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lld-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm-googletest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm-toolset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-clang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vfs-iouring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pg_repack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl04</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parfait</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parfait-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parfait-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-parfait-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>si-units</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>si-units-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unit-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unit-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uom-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uom-lib-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uom-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uom-se</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uom-se-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uom-systems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uom-systems-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-5.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pillow-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pillow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c-client++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aardvark-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netavark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfbgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cjose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cjose-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static-wasm32-wasi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmfields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-omamqp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lzma-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-xdebug3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-arbitrator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-site</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rexml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-typeprof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.16-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.16-dnssec-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.16-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.16-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.16-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.16-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind9.16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-jmx-exporter-openjdk11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-lfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-builder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-acme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-base-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-kra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-symkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idm-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xtrans-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-Rblas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-openmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-openmp64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-openmp64_</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-serial64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-serial64_</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-threads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-threads64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openblas-threads64_</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ldb-devel-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-packaging-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-7.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-jmx-exporter-openjdk17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-jmx-exporter-openjdk8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>platform-python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-lucid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-terminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-cursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-egl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags-etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-12-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-12-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-12-binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dcerpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ldb-ldap-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-usershares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssntlmssp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-bdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alphalph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anyfontsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atbegshi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atveryend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auxhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-awesomebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigintcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-capt-of</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-htmlxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorprofiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctablestack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dehyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-environ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqparbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etexcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finstrut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotehyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garuda-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gettitlestring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glyphlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grffile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobsub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hologo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hycolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-infwarerr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvdefinekeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvoptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvsetkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-letltxmacro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linegoal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lineno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltabptch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahbtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex85</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minitoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-needspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newunicodechar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-norasi-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notoccite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-passivetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcolmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfescape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftexcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-arrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ragged2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rerunfilecheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathaccent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ini-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-common-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-docindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-msg-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-scripts-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trimspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uniquecounter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-updmap-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upquote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy2-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dmidecode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-gconv-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2.3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-Cython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-attrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-iniconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-more-itertools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pluggy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pybind11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pybind11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pyparsing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-pytest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-wcwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils-subid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils-subid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Tiny</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-8.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aliyun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-amt-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-azure-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-bladecenter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-brocade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-drac5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eaton-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-emerson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-gce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-heuristics-ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-hpblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibm-powervs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibm-vpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibmblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ifmib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-moonshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-mp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-intelmodular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipdu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipmilan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-kubevirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-lpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-openstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-redfish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rhevm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-sbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-virsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-wti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmaxminddb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmaxminddb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-python-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-private-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-bundled-gems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-atomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-cpu-partitioning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils-systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-plugins-pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motif-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Convert-ASN1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Algorithm-Diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-AutoLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-AutoSplit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-B</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Benchmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN-Meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN-Meta-Requirements</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN-Meta-YAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Carp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Class-Struct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Compress-Bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Compress-Raw-Bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Compress-Raw-Lzma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Compress-Raw-Zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-Extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-Perl-V</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBM_Filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DB_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Data-Dumper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Data-OptList</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Data-Section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Devel-PPPort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Devel-Size</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Digest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Digest-MD5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Digest-SHA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DirHandle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Dumpvalue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DynaLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Encode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Encode-Locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Encode-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-English</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Env</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-CBuilder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Command</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Constant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-MM-Utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-MakeMaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Manifest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-ParseXS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Fcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Fedora-VSP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Basename</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Compare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Copy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-DosGlob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Fetch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-HomeDir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Path</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Temp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Which</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-stat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FileCache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FileHandle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Filter-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FindBin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GDBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Getopt-Long</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Getopt-Std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Hash-Util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Hash-Util-FieldHash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-Collate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-LangTags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-Langinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Compress-Lzma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Socket-IP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IPC-Cmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IPC-Open3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IPC-SysV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IPC-System-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Importer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-JSON-PP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Locale-Maketext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-MIME-Base64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-MRO-Compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Math-BigInt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Math-BigInt-FastCalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Math-BigRat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-CoreList</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-CoreList-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Load</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Load-Conditional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-NDBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-NEXT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ODBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Object-HashBase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Object-HashBase-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Opcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-POSIX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Package-Generator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Params-Check</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Params-Util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PathTools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Perl-OSType</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlIO-via-QuotedPrint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Checker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Escapes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Functions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Perldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Usage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Safe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Scalar-List-Utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Search-Dict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SelectSaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Socket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Software-License</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Storable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sub-Exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sub-Install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Syslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-ANSIColor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-Cap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-Complete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-ReadLine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-Table</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Harness</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-Abbrev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-Balanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-Diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-Glob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-ParseWords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-Tabs+Wrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-Template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Thread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Thread-Queue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Thread-Semaphore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie-File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie-Memoize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie-RefHash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time-HiRes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time-Local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-URI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Unicode-Collate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Unicode-Normalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Unicode-UCD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-User-pwent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-autodie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-autouse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-bignum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-blib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-constant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-deprecate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-encoding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-encoding-warnings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-fields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-filetest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-generators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-homedir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-if</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-inc-latest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-local-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-meta-notation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-mro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-overload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-overloading</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-perlfaq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-podlators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-sigtrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-sort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-subs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-threads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-threads-shared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-vars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-vmsish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bind2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-denki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-hacluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mongodb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-statsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-idp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-racc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjose-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-initscripts-updown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-9.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-aot-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygobject2-codegen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygobject2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygobject2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygtk2-codegen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pygtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-12.4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tbb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tbb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen-doxywizard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fasterxml-oss-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-bom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-modules-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-JSON-XS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-ccpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-coredump-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-kerneloops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-pstoreoops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-vmcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-xorg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-cli-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-console-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-gui-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-plugin-machine-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-plugin-sosreport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-abrt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-abrt-addon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-abrt-container-addon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-abrt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libluksmeta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libluksmeta-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luksmeta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-test-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_security-mlogc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-xalan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-contrib-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-testutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>antlr-C++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>antlr-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>antlr-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>antlr-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aopalliance-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-cli-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-codec-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-testframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-exec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-exec-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-jxpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-jxpath-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang3-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-logging-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-net-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-ivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-ivy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-resource-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aqute-bnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aqute-bnd-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aqute-bndlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atinject-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atinject-tck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beust-jcommander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beust-jcommander-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bnd-maven-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsf-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>byaccj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cal10n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cal10n-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdi-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cglib-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>easymock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>easymock-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exec-maven-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exec-maven-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-osgi-compendium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-osgi-compendium-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-osgi-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-osgi-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-osgi-foundation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-osgi-foundation-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>felix-utils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>forge-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fusesource-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-annotation-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jms-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jpa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jpa-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-parent-poms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-annotation-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-annotation-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-el-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-jsp-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-jsp-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-legal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-master-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-servlet-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glassfish-servlet-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-guice-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava20-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava20-testlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-assistedinject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-bom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-grapher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-jmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-jndi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-multibindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-testlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guice-throwingproviders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hamcrest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hamcrest-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hamcrest-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hamcrest-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawtjni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawtjni-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-project</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>isorelax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>isorelax-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ivy-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-oro-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jansi-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jansi-native-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java_cup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java_cup-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java_cup-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javacc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javacc-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javacc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javacc-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javacc-maven-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javacc-maven-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javamail-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jaxen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jaxen-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jaxen-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jboss-interceptors-1.2-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jboss-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdepend-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdepend-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdependency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdependency-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jflex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jflex-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jline-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jul-to-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jvnet-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jzlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jzlib-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jzlib-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-over-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-antrun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-antrun-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archiver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archiver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-artifact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-artifact-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-artifact-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-artifact-resolver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-artifact-transfer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-artifact-transfer-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-assembly-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-assembly-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-cal10n-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-clean-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-clean-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-common-artifact-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-common-artifact-filters-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-compiler-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-compiler-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-analyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-analyzer-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-tree-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-logging-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-apt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-confluence</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-docbook-simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-fml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-rtf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-twiki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-xdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-xhtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-sink-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-sitetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-sitetools-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-test-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-failsafe-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-file-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-file-management-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-filtering</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-filtering-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-hawtjni-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-install-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-install-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-invoker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-invoker-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-invoker-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-invoker-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-jar-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-jar-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-model</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-monitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-build-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-build-helper-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-bundle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-bundle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-descriptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-testing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-testing-harness</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-testing-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-testing-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-beanshell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-generators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-javadocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-model</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugins-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-project</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-remote-resources-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-remote-resources-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-reporting-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-reporting-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-reporting-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-reporting-impl-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-test-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-transport-classpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-transport-file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-transport-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resources-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resources-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-script-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-script-beanshell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-script-interpreter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-script-interpreter-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-settings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shade-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shade-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-incremental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-incremental-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-io-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-shared-utils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-source-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-source-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-provider-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-provider-testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-report-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-report-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-test-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-toolchain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-verifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-verifier-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon-http-lightweight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-wagon-providers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mockito</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mockito-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>modello</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>modello-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mojo-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-maven-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-maven-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>objectweb-asm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>objectweb-asm-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>objectweb-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>objenesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>objenesis-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-maven-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-maven-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osgi-annotation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osgi-annotation-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osgi-compendium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osgi-compendium-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osgi-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osgi-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-ant-factory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-ant-factory-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-bsh-factory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-bsh-factory-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-build-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-build-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-cipher-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-classworlds-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-cli-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-compiler-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-compiler-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-compiler-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-component-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-component-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-component-factories-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-components-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-containers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-containers-component-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-containers-component-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-containers-container-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-containers-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-i18n-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-interactivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-interactivity-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-interactivity-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-interactivity-jline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-interpolation-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-io-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-languages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-languages-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-resources</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-resources-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-sec-dispatcher-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-utils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-velocity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-velocity-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-api-easymock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-api-mockito</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-api-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-junit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-reflect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powermock-testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-javapackages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qdox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qdox-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>regexp-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sisu-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sisu-mojos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sisu-mojos-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-ext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-jcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-log4j12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-sources</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonatype-oss-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sonatype-plugins-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spec-version-maven-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spec-version-maven-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testng-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weld-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-xsltc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xbean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xbean-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xml-commons-apis-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xml-commons-apis-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xml-commons-resolver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlunit-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-bisect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-connector-aether</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-connector-ivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-mojo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-parent-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-resolve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-subst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-tools-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-java-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-crypto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-fs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-loop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-loop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mdraid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mdraid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvdimm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-part-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-plugins-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-swap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-swap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-vdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-vdo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-blockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-libpng-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-libpng-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-nutanix-ahv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-client-win-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-client-win-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-13.6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-gprofng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-10.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-aot-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-Syck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Parser</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-4.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.18-23.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.0-9.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.0-9.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6-1.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-8.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-5.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-5.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.20211126git1ff6fe1f43.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-10.1.module+el8.7.0+17192+cbc2449b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-2.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-4.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-4.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-12.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-1.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-2.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-21.module+el8.7.0+17573+effbd7e8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-3.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-3.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-2.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.20211109gitb79fd91.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-21.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-21.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-142.el8_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-142.el8_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.18-23.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.0-9.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.0-9.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.8-1.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-8.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-5.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-5.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+e0bf0d1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-19.module+el8.8.0+18453+e0bf0d1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-2.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-5.module+el8.8.0+17308+05924798</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-5.module+el8.8.0+17308+05924798</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-12.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-1.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-2.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-32.module+el8.8.0+18361+9f407f6e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-3.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-3.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-2.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.20211109gitb79fd91.module+el8.8.0+16781+9f4724c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-22.module+el8.8.0+18611+5846c3aa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-22.module+el8.8.0+18611+5846c3aa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-86.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-86.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-6.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-6.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-87.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-87.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-20200724.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.1-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-26.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-34.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.1-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.8-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-48.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.4-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.18-20.module+el8.3.0+6423+e4cb6418</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.2-25.module+el8.3.0+7421+642fe24f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.2-25.module+el8.3.0+7421+642fe24f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2-1.module+el8.3.0+6423+e4cb6418</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-8.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-1.module+el8.3.0+7353+9de0a3cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-28.module+el8.3.0+7827+5e65edd7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-2.module+el8.3.0+6423+e4cb6418</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-4.module+el8.3.0+6922+fd575af8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-4.module+el8.3.0+6922+fd575af8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-12.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-1.module+el8.3.0+6423+e4cb6418</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-34.module+el8.3.0+7976+077be4ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-2.module+el8.3.0+7353+9de0a3cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-2.module+el8.3.0+7353+9de0a3cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.19-10.module+el8.3.0+6423+e4cb6418</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-18.module+el8+2765+cfa4f87b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.32-1.module+el8.3.0+10472+7adc332a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.28-1.module+el8.3.0+10472+7adc332a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.2-27.module+el8.4.0+9282+0bdec052</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.2-27.module+el8.4.0+9282+0bdec052</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-35.module+el8.4.0+10230+7a9b21e4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-48.module+el8.4.0+10368+630e803b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.6-3.module+el8.4.0+9579+e9717e18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.14-4.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.module+el8.4.0+9692+8e86ab84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-10.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-3.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-19.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-3.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-6.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-4.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-5.module+el8.4.0+9001+fc421f6c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-3.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-5.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-5.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.3.1-1.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11-10.module+el8.4.0+9579+e9717e18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.4-3.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.4-4.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-3.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.3-3.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-1.module+el8.4.0+10706+5c295a3e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-9.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.6-3.module+el8.4.0+9579+e9717e18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-4.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.6.0-4.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-10.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-4.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33.6-5.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.18-21.module+el8.4.0+10770+19c037f9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-48.module+el8.4.0+11909+3300d70f.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.18-21.module+el8.5.0+10709+b3edb581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.2-28.module+el8.5.0+10717+67be7ac4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.2-28.module+el8.5.0+10717+67be7ac4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-37.module+el8.5.0+12162+40884dd2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-59.module+el8.5.0+12817+cb650d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.8-4.module+el8.5.0+12205+a865257a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-11.module+el8.5.0+11015+9c1c7c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-5.module+el8.5.0+10542+ba057329</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-6.module+el8.5.0+10542+ba057329</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-6.module+el8.5.0+12205+a865257a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-6.module+el8.5.0+12205+a865257a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.3.1-4.module+el8.5.0+12205+a865257a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.4-4.module+el8.5.0+12031+10ce4870</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-1.module+el8.5.0+10721+14d8e0d5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.8-4.module+el8.5.0+12205+a865257a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.6.0-5.module+el8.5.0+12205+a865257a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-5.module+el8.5.0+11639+ea5b349d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33.6-6.module+el8.5.0+12205+a865257a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-2.module+el8.5.0+12204+54860423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-19.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-3.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-3.module+el8.5.0+10536+a233b742</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-4.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.4-3.module+el8.5.0+12204+54860423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.4-3.module+el8.5.0+12204+54860423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.2.4-6.module+el8.5.0+12204+54860423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11-10.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.0-4.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.6-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20-3.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-1.module+el8.5.0+10613+59a13ec4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.0-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-2.module+el8.5.0+12204+54860423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-3.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:50.3.2-4.module+el8.5.0+12204+54860423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-3.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-5.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-4.module+el8.5.0+11712+ea2d2be1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.1-4.module+el8.5.0+12204+54860423</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-43.module+el8.5.0+13806+b30d9eec.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-43.module+el8.5.0+13806+b30d9eec.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-3.module+el8.4.0+8625+d397f3da</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-8.module+el8.3.0+6814+67d1e611</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.12-1.module+el8.6.0+12642+c3710b74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-7.module+el8.6.0+13958+214a5473</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.3.1-5.module+el8.6.0+13002+70cfc74a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.12-1.module+el8.6.0+12642+c3710b74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.7-1.module+el8.6.0+12577+62b8d0a1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-1.module+el8.6.0+13933+9cf0c87c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.2.4-7.module+el8.6.0+13003+6bb2c488</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.7-1.module+el8.6.0+12577+62b8d0a1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-17.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-4.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-3.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-3.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-3.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-13.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-28.20100611svn86.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-8.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-23.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-0.7.b08.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-11.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0-8.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-2.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5-5.module+el8.6.0+13298+7b5243c0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.10-3.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-1.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-7.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.25-4.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-3.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4-5.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-0.2.module+el8.6.0+15045+b1156105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-1.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-14.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-9.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-8.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-9.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-26.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-3.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-6.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-20.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-7.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-6.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-4.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-31.20100611svn86.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-26.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-4.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:28.1-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.10-4.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.12-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-4.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.28-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0-0.25.20130910svn.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-7.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-0.5.module+el8.6.0+15049+43453910</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.4-2.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-17.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-4.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-2.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-29.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-3.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.4-2.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.13-1.module+el8.7.0+15641+2ece4388</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-1.module+el8.7.0+15575+d005caff</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-4.module+el8.7.0+16653+23ccaf52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.3.1-6.module+el8.7.0+15823+8950cfa7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.13-1.module+el8.7.0+15641+2ece4388</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-10.module+el8.7.0+16689+53d59bc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-20.module+el8.7.0+16689+53d59bc2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:35.5-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.13-1.module+el8.7.0+15656+ffd4a257</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-5.module+el8.7.0+16654+645aad7f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.13-1.module+el8.7.0+15656+ffd4a257</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.16-1.module+el8.8.0+17624+9a09af5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.16-1.module+el8.8.0+17624+9a09af5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.16-1.module+el8.8.0+18967+20d359ae.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.16-1.module+el8.8.0+18967+20d359ae.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.module+el8.8.0+18968+3d7b19f0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.module+el8.8.0+18968+3d7b19f0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.8-2.module+el8.8.0+19817+dd5e62f6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-2.20211126git1ff6fe1f43.module+el8.8.0+18453+1482ba89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-19.2.module+el8.8.0+18944+7f5acf75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-33.module+el8.8.0+19768+98f68f21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-4.module+el8.8.0+19627+2d14cb21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-4.module+el8.8.0+19627+2d14cb21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-22.module+el8.8.0+19067+b66cdac6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-22.module+el8.8.0+19067+b66cdac6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.module+el8.9.0+20024+793d7211</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-2.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-19.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-3.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-1.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-7.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.4-3.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.4-3.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.2.4-8.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11-10.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.0-4.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.6-2.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20-3.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-1.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.0-3.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.module+el8.9.0+20024+793d7211</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-5.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:50.3.2-4.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-3.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-5.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-4.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.1-4.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.17-2.module+el8.9.0+19642+a12b4af6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.14-4.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-11.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-3.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-19.module+el8.9.0+19592+4b459c9b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-3.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-6.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-1.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-7.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.module+el8.9.0+19592+4b459c9b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-7.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-7.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.3.1-7.module+el8.9.0+19642+a12b4af6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11-10.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.4-4.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.4-4.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-3.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.module+el8.9.0+19592+4b459c9b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.3-4.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.1-1.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-10.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.17-2.module+el8.9.0+19642+a12b4af6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-5.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.6.0-5.module+el8.9.0+19592+4b459c9b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-10.module+el8.9.0+19592+4b459c9b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-5.module+el8.9.0+19598+4a60c7b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33.6-6.module+el8.9.0+19592+4b459c9b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.18-23.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.0-9.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.0-9.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.9-1.module+el8.9.0+19846+58c50e4e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-8.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-5.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-5.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-2.20211126git1ff6fe1f43.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-22.module+el8.9.0+19544+b3045133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-2.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-5.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-5.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-12.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-1.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-2.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-40.module+el8.9.0+20056+d9fb1ac3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-4.module+el8.9.0+19570+14a90618</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-4.module+el8.9.0+19570+14a90618</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-2.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.20211109gitb79fd91.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-22.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-22.module+el8.9.0+18724+20190c23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-40.module+el8.9.0+20867+9a6a0901.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.10-1.module+el8.10.0+19908+9938c7c9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-23.module+el8.10.0+21023+5962ee04</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-49.module+el8.10.0+21533+3df3c4b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.module+el8.10.0+21142+453d2b75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-3.module+el8.10.0+21271+eccd1d86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.2.4-9.module+el8.10.0+21329+8d76b841</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.6-3.module+el8.10.0+21142+453d2b75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.module+el8.10.0+21142+453d2b75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:50.3.2-5.module+el8.10.0+20345+671a55aa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-5.module+el8.10.0+20443+f0a692fe</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-23.2.module+el8.10.0+21972+d7867348</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-50.module+el8.10.0+22027+db0a70a4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-7.module+el8.10.0+22237+51382d7a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-4.module+el8.10.0+21815+bb024982</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-7.module+el8.10.0+22237+51382d7a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:50.3.2-6.module+el8.10.0+22183+c898c0c1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-6.module+el8.10.0+22250+3c790083</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-6.module+el8.10.0+22250+3c790083</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-53.module+el8.10.0+22268+f82ccd96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7044-6.module+el8.10.0+22411+7e3d2305</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12-11.module+el8.10.0+22411+7e3d2305</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.014-6.module+el8.10.0+22411+7e3d2305</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.014-6.module+el8.10.0+22411+7e3d2305</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1002-7.module+el8.10.0+22411+7e3d2305</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-7.module+el8.10.0+22411+7e3d2305</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-24.module+el8.10.0+22411+7e3d2305</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7044-6.module+el8.10.0+22411+e14e3526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12-11.module+el8.10.0+22411+e14e3526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.014-6.module+el8.10.0+22411+e14e3526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.014-6.module+el8.10.0+22411+e14e3526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1002-7.module+el8.10.0+22411+e14e3526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-7.module+el8.10.0+22411+e14e3526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-24.module+el8.10.0+22411+e14e3526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7044-6.module+el8.10.0+22411+85254afd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.014-6.module+el8.10.0+22411+85254afd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.014-6.module+el8.10.0+22411+85254afd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1002-7.module+el8.10.0+22411+85254afd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-7.module+el8.10.0+22411+85254afd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-24.module+el8.10.0+22411+85254afd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7044-6.module+el8.10.0+22411+409a293e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12-11.module+el8.10.0+22411+409a293e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.014-6.module+el8.10.0+22411+409a293e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.014-6.module+el8.10.0+22411+409a293e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1002-7.module+el8.10.0+22411+409a293e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-7.module+el8.10.0+22411+409a293e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-24.module+el8.10.0+22411+409a293e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-23.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-23.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3.1-2.2.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3.1-2.2.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.1-7.1.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.1-7.1.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.78-12.module+el8.10.0+23147+63faba8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.78-12.module+el8.10.0+23147+20b7d289</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.78-12.module+el8.10.0+23147+df114ff4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.78-12.module+el8.10.0+23147+95b68fad</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-18.module+el8.10.0+23182+cbb72bb2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-18.module+el8.10.0+23182+cbb72bb2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-18.module+el8.10.0+23183+85190b0c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-18.module+el8.10.0+23183+85190b0c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-23.4.module+el8.10.0+23205+d8da55c1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6-6.module+el8.10.0+23009+91fb337e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-3.module+el8.9.0+18911+94941f82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-18.module+el8.10.0+23403+cc1f9b40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-18.module+el8.10.0+23403+cc1f9b40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12-6.module+el8.10.0+23403+cc1f9b40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-2.module+el8.10.0+22913+7aa1a207</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-2.module+el8.10.0+21691+df63127d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-5.module+el8.10.0+22564+098ba143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.1.module+el8.9.0+18911+94941f82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-1.module+el8.10.0+22543+0dae60ab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.1.module+el8.9.0+18911+94941f82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.0-4.module+el8.10.0+20723+03062ebd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-5.module+el8.9.0+18911+94941f82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-20.module+el8.10.0+23534+744f3864</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-20.module+el8.10.0+23534+744f3864</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-20.module+el8.10.0+23537+32c82745</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-20.module+el8.10.0+23537+32c82745</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12-6.module+el8.10.0+23404+f6b3454f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-2.module+el8.10.0+21692+c9b201bc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.1.module+el8.9.0+18920+2223d05e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-1.module+el8.10.0+22544+6a7f07c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.1.module+el8.9.0+18920+2223d05e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-20.module+el8.10.0+23610+7d6e87e5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-20.module+el8.10.0+23610+7d6e87e5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-5.module+el8.10.0+23610+7d6e87e5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-20.module+el8.10.0+23617+3e211261</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.13-20.module+el8.10.0+23617+3e211261</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.4-7.el8_10.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200609-2.20210216.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.1-6.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.1-6.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-1.module+el8.5.0+12236+c988d830</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:29-2.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-1.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.167.0-1.module+el8.5.0+12609+beaa716d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-1.module+el8.5.0+13605+73abf821</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-2.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.5.0+11073+ba5c6d09</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-7.module+el8.5.0+12960+5b7d72b5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-7.module+el8.5.0+12960+5b7d72b5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-72.rc92.module+el8.5.0+12236+c988d830</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-1.module+el8.5.0+13746+87221ce8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.24-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.418-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.7-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.107-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-114.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230404-114.git2e92a49f.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.2-1.module+el8.9.0+18926+5193682d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.module+el8.9.0+20382+04f7fe80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.module+el8.9.0+20382+04f7fe80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-120.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230824-120.git0e048b06.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.2.69_v8.0.303-80.0.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.5-2.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.184-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-1.module+el8.6.0+15324+1f2c5d8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-1.module+el8.6.0+15324+1f2c5d8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.module+el8.4.0+11732+c668cc9f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17-3.module+el8.1.0+3369+37ae6a45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.16-1.12.22.12.1.module+el8.6.0+15324+1f2c5d8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-25.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-25.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250211-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508gitee3198e672e2-9.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-3.gite94b4f9.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.94-1.git1e99f1d.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-3.git9ebe139.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.32-3.git1715c90.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-2.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.15-2.git2d0b8a3.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-2.git87f9237.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.git921f98f.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.git921f98f.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-55.rc5.dev.git2abd837.module+el8.0.0+3049+59fd2bba</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-2.dev.gitc4e1bc5.module+el8.0.0+2958+4e823551</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-11.module+el8.0.0+2969+90015743</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-11.module+el8.0.0+2969+90015743</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-2.module+el8.0.0+2969+90015743</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-9.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-30.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.0.0+2974+76d21d2e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.15-22.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.1-7.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-10.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.4.0-10.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-15.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0.1-11.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-9.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-10.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-4.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-9.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.15-4.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14-12.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-13.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-7.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-6.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-8.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-19.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-13.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-10.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-10.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-13.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-8.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-6.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-20.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-6.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-13.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.2-12.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-16.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-2.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3-38.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-19.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.0.1-11.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-6.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.0.0+2974+76d21d2e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-7.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-18.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.0-13.module+el8.0.0+2961+596d0223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.5-7.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-30.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-9.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.0.0+2975+e0f02136</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-18.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-10.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-9.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-2.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14-12.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-20.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-19.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.0.0+2975+e0f02136</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.0-13.module+el8.0.0+2966+d39a1df3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-2.module+el8.0.0+2975+e0f02136</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-2.module+el8.0.0+2975+e0f02136</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.el8_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-13.el8_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-13.el8_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.17-4.module+el8.0.0+3108+851cb559</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-3.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-3.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-17.P2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-17.P2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-17.P2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212.b04-1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212.b04-1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.1.2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.1.2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.15-6.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.4-10.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.4-10.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0-2.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-6.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-7.module+el8.0.0+3075+09be6b65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-23.1.module+el8.0.0+3151+3ba813f9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-10.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-4.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-1.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-64.module+el8.0.0+3180+d6a3561d.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-3.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-3.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-2.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-2.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.19-8.module+el8.0.0+3075+09be6b65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.507-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-23.2.module+el8.0.0+3213+f56c86d8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-4.el8_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-4.el8_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-4.el8_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.4.2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.4.2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-2.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-2.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.3.7-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.5-2.module+el8.0.0+3175+261ae921</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.5-2.module+el8.0.0+3175+261ae921</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-10.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-21.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-16.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-9.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-8.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-11.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.8-1.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-4.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-28.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.1-8.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.7-14.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-10.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2011.1-7.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-3.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.25-4.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-8.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-24.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-38.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-34.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.01-25.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-26.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-8.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0-19.20110809svn.module+el8.0.0+3248+9d514f3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.15-6.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.4-10.1.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0-2.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-6.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-7.module+el8.0.0.z+3418+a72cf898.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-23.3.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-10.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-4.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-1.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-64.module+el8.0.0.z+3418+a72cf898.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-3.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-3.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-2.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-2.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.19-8.module+el8.0.0.z+3418+a72cf898</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-11.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-11.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-3.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-17.P2.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-17.P2.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-17.P2.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-15.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-15.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222.b10-0.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222.b10-0.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4.11-0.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.0-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-7.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-7.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.7.1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.7.1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-2.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-2.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-2.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-4.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-4.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-104.module+el8.0.0+3250+4b7d6d43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-2.module+el8.0.0.z+3657+acb471dc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-2.module+el8.0.0.z+3657+acb471dc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-17.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.7.2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.7.2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-1.module+el8.0.0+3898+e09bb8de.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0.20070801-16.module+el8.0.0+3898+e09bb8de</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.17-3.module+el8.0.0+3898+e09bb8de</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-9.module+el8.0.0+3900+919b6753</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-2.module+el8.0.0+3900+919b6753</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-2.module+el8.0.0+3900+919b6753</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-5.module+el8.0.0+3900+919b6753</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-5.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el8_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.module+el8.0.0+4045+70edde92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-5.module+el8.0.0+4045+70edde92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-1.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-1.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.11.1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.11.1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66.0-11.el8_0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66.0-11.el8_0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-10.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-21.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-16.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-9.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-8.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-11.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.9-1.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.9.2-1.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-4.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-28.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.1-8.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.7-14.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-10.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2011.1-7.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-3.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.25-4.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-8.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-24.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-38.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-34.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.01-25.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-26.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-8.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0-19.20110809svn.module+el8.0.0+3892+c903d3f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-8.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.13-1.module+el8.0.1+4087+d8180914</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.13-2.module+el8.0.1+4087+d8180914</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.13-2.module+el8.0.1+4087+d8180914</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.509-1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.13-1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-9.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-9.module+el8.0.0+4108+af250afe</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-9.module+el8.0.0+4108+af250afe</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-5.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-5.el8_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.11.2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-80.11.2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-12.module+el8.0.0+4096+eb40e6da</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-12.module+el8.0.0+4096+eb40e6da</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-3.module+el8.0.0+4096+eb40e6da</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.16.3-2.module+el8.0.0+4214+49953fda</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.16.3-2.module+el8.0.0+4214+49953fda</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.3-1.module+el8+2632+6c5111ed</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17-3.module+el8+2873+aa7dfd9a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232.b09-0.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232.b09-0.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5.10-0.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-2.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-1.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-9.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-30.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.1.0+2994+98e054d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-12.module+el8.1.0+4148+33a50073</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.1-7.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-10.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.4.0-10.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-15.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0.1-11.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-11.module+el8.1.0+3446+c3d52da3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-10.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-4.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-10.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-2.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14-12.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-13.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-7.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-6.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-8.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-19.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-13.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-13.module+el8.1.0+3323+7ac3e00f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-13.module+el8.1.0+3323+7ac3e00f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-14.module+el8.1.0+3446+c3d52da3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-8.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-6.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-20.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-6.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-13.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.2-12.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-16.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-2.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3-38.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-20.module+el8.1.0+3323+7ac3e00f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.0.1-11.module+el8.1.0+3446+c3d52da3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-6.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-5.module+el8.1.0+3111+de3f2d8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.1.0+2994+98e054d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-1.module+el8.1.0+3280+19512f10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-19.module+el8.1.0+3507+d69c168d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-2.module+el8.1.0+3725+aac5cd17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190308git89910a39dcfd-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.15-7.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.4-14.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.4-14.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0-4.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-8.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-35.module+el8.1.0+4227+b2722cb3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-35.module+el8.1.0+4227+b2722cb3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-12.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-5.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-2.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-88.module+el8.1.0+4233+bc44be3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-4.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-4.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20170427git-3.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.19-9.module+el8.1.0+4066+0f1aadab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.17-6.module+el8.1.0+3392+9bd8939b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190611-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.1-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.1-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.1-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1.3-7.module+el8.1.0+4150+5b8c2c1f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-5.module+el8.1.0+4240+893c1ab8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4-1.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.107-2.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-2.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.37-5.module+el8.1.0+4240+893c1ab8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-1.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.module+el8.1.0+4240+893c1ab8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.module+el8.1.0+4240+893c1ab8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-60.rc8.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.module+el8.1.0+4306+1d917805</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.4-1.module+el8.1.0+4081+b29780af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-1.module+el8.1.0+4089+be929cf8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-2.module+el8.1.0+4089+be929cf8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-2.module+el8.1.0+4089+be929cf8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-16.module+el8.1.0+4134+e6bad0ed</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-16.module+el8.1.0+4134+e6bad0ed</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-3.module+el8.1.0+4134+e6bad0ed</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.module+el8.1.0+4044+36416a77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-8.module+el8.1.0+4044+36416a77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-5.gite94b4f9.module+el8.1.0+4241+a7060183</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-3.git9ebe139.module+el8.1.0+3468+011f0ab0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-5.module+el8.1.0+3468+011f0ab0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.git921f98f.module+el8.1.0+4241+a7060183</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.git921f98f.module+el8.1.0+4241+a7060183</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-55.rc5.dev.git2abd837.module+el8.1.0+3468+011f0ab0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-72.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-72.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-15.1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-34.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-34.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-34.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-35.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-20190805.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.12-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.2-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.1-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.30.6-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.11-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.1-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.1-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.11-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-13.git036e314.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.25p1-8.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1c-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1c-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.4-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-18.module+el8+2765+cfa4f87b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-18.module+el8+2765+cfa4f87b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-7.module+el8+2765+cfa4f87b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.26-1.module+el8.1.0+3974+90eded84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.17-1.module+el8.1.0+3974+90eded84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.11-4.module+el8.1.0+4555+f5cb8e18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.17-1.module+el8.1.0+3189+a1bff096</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.module+el8.1.0+3189+a1bff096</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.5-5.module+el8.1.0+4560+e0eee7d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.9-1.module+el8.1.0+3189+a1bff096</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.17-1.module+el8.1.0+3189+a1bff096</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.4-1.module+el8.1.0+3189+a1bff096</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.0.2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.0.2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.0.3.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.0.3.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el8_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el8_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el8_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-36.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-9.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-9.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.123.0-2.module+el8.1.0+4900+9d7326b8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-3.module+el8.1.0+4881+045289ee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.37-6.module+el8.1.0+4876+e678a192</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-6.module+el8.1.0+4830+f49150d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-6.module+el8.1.0+4830+f49150d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.105-3.el8_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-7.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6.10-0.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.102-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-6.el8_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242.b08-0.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242.b08-0.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-8.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-8.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-4.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-4.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-4.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-88.module+el8.1.0+5149+3ff2765e.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-2.module+el8.1.0+5317+8a49ffbb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-4.module+el8.1.0+5317+8a49ffbb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-4.module+el8.1.0+5317+8a49ffbb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-78.el8_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-78.el8_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.5.1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.5.1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.6-4.module+el8.1.1+5259+bcdd613a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.module+el8.1.1+5259+bcdd613a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-1.module+el8.1.1+5259+bcdd613a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.124.0-1.module+el8.1.1+5259+bcdd613a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.3-4.module+el8.1.1+5259+bcdd613a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.40-8.module+el8.1.1+5351+506397b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-1.module+el8.1.1+5259+bcdd613a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-2.module+el8.1.1+5363+bf8ff1af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-2.module+el8.1.1+5363+bf8ff1af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.1.1+5259+bcdd613a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-64.rc9.module+el8.1.1+5259+bcdd613a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-2.git21fdece.module+el8.1.1+5460+3ac089c3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.4-1.module+el8.1.1+4407+ac444e5d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-2.module+el8.1.1+4975+482d6f5d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.25p1-8.el8_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120801-253.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-18.el8_1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-18.el8_1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19.0-1.module+el8.1.0+5726+6ed65f8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19.0-1.module+el8.1.0+5726+6ed65f8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.13.4-1.10.19.0.1.module+el8.1.0+5726+6ed65f8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-10.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16.1-1.module+el8.1.0+5811+44509afe</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16.1-1.module+el8.1.0+5811+44509afe</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.3-1.module+el8.1.0+3369+37ae6a45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.13.4-1.12.16.1.1.module+el8.1.0+5811+44509afe</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-26.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-5.el8_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.1-6.el8_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.11-9.el8_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-12.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-12.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.15-6.el8_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16.1-2.module+el8.1.0+6117+b25a342c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16.1-2.module+el8.1.0+6117+b25a342c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.13.4-1.12.16.1.2.module+el8.1.0+6117+b25a342c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19.0-2.module+el8.1.0+6118+5aaa808b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19.0-2.module+el8.1.0+6118+5aaa808b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.13.4-1.10.19.0.2.module+el8.1.0+6118+5aaa808b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17-73.el8_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-35.3.module+el8.1.0+5931+8897e7e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-35.3.module+el8.1.0+5931+8897e7e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-88.module+el8.1.0+5708+85d8e057.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-4.dev.gitc4e1bc5.module+el8.1.0+5654+5237a55d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.8.1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-147.8.1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.6-6.module+el8.1.1+5865+cc793d95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-5.module+el8.1.1+6114+953c5a57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-4.module+el8.1.1+5885+44006e55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-4.module+el8.1.1+5885+44006e55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.git21fdece.module+el8.1.1+5657+524a77d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-14.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-14.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.2-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.7.10-1.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252.b09-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252.b09-2.el8_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.9-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-39.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.8-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-1.module+el8.2.0+4561+f4e0d66a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-16.module+el8.2.0+5478+b505947e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-3.module+el8.2.0+4577+feefd9b8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.12-2.module+el8.1.0+3202+af5476b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.module+el8.1.0+3202+af5476b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.24-1.module+el8.2.0+4601+7c76a223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-9.module+el8.1.0+3202+af5476b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.12-2.module+el8.1.0+3202+af5476b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.3-1.module+el8.1.0+3186+20164e6f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-37.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.10-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1b-25.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-10.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-21.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-16.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-9.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-8.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-11.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-1.module+el8.2.0+5059+3eb3af25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.9-1.module+el8.1.0+3832+9784644d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-4.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-28.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.1-8.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-4.module+el8.2.0+6123+b4678599</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.0-2.module+el8.2.0+4573+c3c38c7b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.3-1.module+el8.2.0+5925+bad5981a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.7-16.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.3-1.module+el8.2.0+5925+bad5981a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-10.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2011.1-7.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-3.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.25-4.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-8.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.1-2.module+el8.2.0+4573+c3c38c7b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-24.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-38.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-34.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.01-25.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-26.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-8.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0-19.20110809svn.module+el8.1.0+3366+6dfb954c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.6-7.module+el8.2.0+5856+b8046c6d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12-1.module+el8.2.0+5950+6d183a6a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-1.module+el8.2.0+5182+3136e5d4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.124.0-1.module+el8.2.0+5182+3136e5d4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.3-5.module+el8.2.0+5201+6b31f0d9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.40-10.module+el8.2.0+5955+6cd70ceb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-9.module+el8.2.0+5029+3ac48e7d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-5.module+el8.2.0+6060+9dbc027d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-10.module+el8.2.0+6063+e761893a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-10.module+el8.2.0+6063+e761893a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+5201+6b31f0d9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-65.rc10.module+el8.2.0+5762+aaee29fb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.git21fdece.module+el8.2.0+5658+9a15711d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-1.module+el8.2.0+6096+9c3f08f3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-2.module+el8.2.0+4896+8f613c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.68-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.68-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.6-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.19-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.17-7.module+el8.2.0+4847+336970e8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-0.3.alpha.el8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1911.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1911.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-21.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-21.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190829git37eef91017ad-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.79-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-23.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-33.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-33.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-33.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-20191129.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-29.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.2-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.3-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.30.6-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.11-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-34.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.19-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-21.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-43.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-29.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-29.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-73.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-73.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.29-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-101.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-101.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1c-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1c-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.13-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.13-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.13-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-24.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.50-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.50-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.45.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.45.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170731-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-4.gite94b4f9.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.124.0-1.gitf958d0c.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-3.git9ebe139.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.32-4.git1715c90.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-9.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-5.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.15-2.git2d0b8a3.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-2.git87f9237.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-4.git921f98f.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-4.git921f98f.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-56.rc5.dev.git2abd837.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-5.dev.gitc4e1bc5.module+el8.2.0+6370+6fb6c8ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.6-7.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-1.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.124.0-1.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.3-4.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.40-9.module+el8.2.0+6373+4950d421</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-9.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-5.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-11.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-11.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-64.rc10.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.git21fdece.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-1.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-2.module+el8.2.0+6369+1f4293b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.6-8.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12-1.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-1.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.124.0-1.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.3-5.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.40-11.module+el8.2.0+6374+67f43e89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-9.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-5.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-11.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-11.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-65.rc10.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.git21fdece.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-1.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-2.module+el8.2.0+6368+cf16aa14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.51-4.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.4-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.4-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-10.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-10.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-8.module+el8.2.0+6449+6ba3df3e.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29-7.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.1.2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.1.2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.18-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.514-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.104-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-46.rc4.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-46.rc4.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.13-5.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.13-5.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.13-5.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-46.rc4.el8_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-46.rc4.el8_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-11.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-11.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.6.3.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.6.3.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191115-4.20200602.2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.105-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-6.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.19-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.515-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-17.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-11.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-11.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.6-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-3.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-3.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.4-15.module+el8.2.0+5297+222a20af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38.4-15.module+el8.2.0+5297+222a20af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-42.module+el8.2.0+6024+15a2423f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-42.module+el8.2.0+6024+15a2423f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-99.module+el8.2.0+6870+55b789b4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.10.0-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21.0-3.module+el8.2.0+7071+d2377ea3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21.0-3.module+el8.2.0+7071+d2377ea3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18.2-1.module+el8.2.0+7233+61d664c1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18.2-1.module+el8.2.0+7233+61d664c1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14-4.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-2.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-2.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.27-19.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.27-19.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.27-19.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.20-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.516-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.6-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.106-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.10-0.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.262.b10-0.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.262.b10-0.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.13.2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.13.2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.8-5.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.8-5.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.8-5.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-10.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-10.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-10.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-4.module+el8.2.0+6919+ac02cfd2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.4-1.el8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.9-1.module+el8.2.1+6689+748e6520</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17-1.module+el8.2.1+6636+bf4db4ab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.17-1.module+el8.2.1+6771+3533eb4c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.135.0-1.module+el8.2.1+6849+893e4f4a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-1.module+el8.2.1+6626+598993b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-1.module+el8.2.1+6676+604e1b26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-2.module+el8.2.1+6750+e53a300c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.module+el8.2.1+6465+1a51e8b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-3.module+el8.2.1+6816+bedf4f91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-2.module+el8.2.1+6867+366c07d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-2.module+el8.2.1+6867+366c07d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.2.1+6465+1a51e8b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-66.rc10.module+el8.2.1+6465+1a51e8b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-1.module+el8.2.1+6595+03641d72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-1.module+el8.2.1+6465+1a51e8b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-2.module+el8.2.1+6465+1a51e8b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.3-3.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-12.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.14.3.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.14.3.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.11.0-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.0-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-11.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-11.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.11-15.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.107-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-8.module+el8.2.0+7834+b8ecaeef.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.12.0-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.12-4.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-3.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-3.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.20-1.module+el8.2.0+7373+b272fdef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.module+el8.2.0+4968+1d5097db</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-1.module+el8.2.0+4968+1d5097db</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.module+el8.2.0+5581+896cb53e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.15-1.module+el8.2.0+7662+fa98b974</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.15-1.module+el8.2.0+7662+fa98b974</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-1.module+el8.2.0+7801+be0fed80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.8-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.108-2.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-2.el8_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-2.el8_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-21.module+el8.2.0+5008+cca404a3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-21.module+el8.2.0+5008+cca404a3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-3.module+el8.2.0+7758+84b4ca3e.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-7.module+el8.2.0+5531+7e4d69a2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.21-1.module+el8.2.0+7855+47abd494</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-99.module+el8.2.0+7988+c1d02dbb.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.1-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37-1.el8_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37-1.el8_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.2-1.el8_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18.4-2.module+el8.2.0+8361+192e434e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18.4-2.module+el8.2.0+8361+192e434e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.6-1.12.18.4.2.module+el8.2.0+8361+192e434e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.28.1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009196999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-193.28.1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.11-0.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272.b10-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272.b10-1.el8_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-31.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.1-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.15-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-127.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-127.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.8-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.4-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-79.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-79.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-38.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-38.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-38.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.50-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.50-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.20-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.27-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.20-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.20-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.20-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.11-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.11-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1g-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1g-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.32-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.32-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.4-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.4-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-68.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-38.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.7.3-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-3.module+el8.3.0+7680+79e7e61a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.14-4.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-3.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-10.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-3.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-19.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-3.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-6.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-4.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-4.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-3.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-5.module+el8.3.0+7187+a27ec44b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-5.module+el8.3.0+7187+a27ec44b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.3.1-1.module+el8.3.0+7187+a27ec44b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11-8.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.4-3.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.4-4.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19-3.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2019.3-3.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-1.module+el8.3.0+7187+a27ec44b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-9.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-3.module+el8.3.0+7680+79e7e61a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-4.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.6.0-4.module+el8.3.0+7187+a27ec44b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-9.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-4.module+el8.2.0+5234+f98739b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33.6-5.module+el8.3.0+7187+a27ec44b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66.0-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66.0-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-23.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.4-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.module+el8.3.0+6647+8d010749</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-2.module+el8.3.0+7681+f1f02ded</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-18.module+el8.3.0+7707+eb4bba01</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.0.1-12.module+el8.3.0+7075+8484f0d0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.module+el8.3.0+6647+8d010749</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.29-10.module+el8.3.0+6860+8e47d84b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.1.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.1.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34.5-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-2.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.1-2.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.144.0-1.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-2.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-2.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-2.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-3.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-5.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.5-5.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-68.rc92.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-2.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.8-1.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.2-1.module+el8.3.0+8221+97165c3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.53-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.7-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.7-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-9.module+el8.3.0+6671+2675c974</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.module+el8.3.0+6671+2675c974</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-3.module+el8.3.0+6671+2675c974</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-5.module+el8.3.0+6671+2675c974</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11-3.module+el8.3.0+7851+7808b5f9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-30.module+el8.3.0+7001+0766b9e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-30.module+el8.3.0+7001+0766b9e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-2.module+el8.3.0+7670+8bf57d29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.6-2.module+el8.3.0+6843+b3b42fcc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-5.module+el8.3.0+6843+b3b42fcc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.20-3.module+el8.3.0+7597+67902674</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200602gitca407c7246bf-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170731-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-4.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200609-2.20201027.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.3-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-5.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.1-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.8.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.8.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1g-12.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1g-12.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-101.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200619-101.git3890db36.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-18.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-18.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.14-7.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.14-7.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-6.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-6.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4-6.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-1.module+el8.3.0+7840+63dfb1ed</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.12-1.module+el8.3.0+8784+380394dc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.12-1.module+el8.3.0+8784+380394dc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-1.module+el8.3.0+8844+e5e7039f.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-1.module+el8.3.0+8844+e5e7039f.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.19.1-1.module+el8.3.0+8851+b7b41ca0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.19.1-1.module+el8.3.0+8851+b7b41ca0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.8-1.12.19.1.1.module+el8.3.0+8851+b7b41ca0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.31-1.module+el8.3.0+8843+3f4e42f6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.27-3.module+el8.3.0+8972+5e3224e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-2.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-2.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-1.module+el8.3.0+8944+1ca16b1f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-3.el8_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-3.el8_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-1.module+el8.3.0+8938+7f0e88b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-4.module+el8.3.0+9042+664538f4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.module+el8.3.0+9042+664538f4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-1.module+el8.3.0+9042+664538f4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-1.module+el8.3.0+9042+664538f4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.10.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.10.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-2.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.102-2.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.111-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.79-13.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.29-6.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-2.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-5.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-5.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-5.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.112-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.25-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.521-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.103-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-4.module+el8.3.0+9886+ac338b6d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-4.module+el8.3.0+9886+ac338b6d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.7-4.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.1-3.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.22-3.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.155.0-1.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-9.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-2.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-2.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.3.1+9803+64eb0fd6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-7.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-7.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-70.rc92.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.8-1.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.3.1+9857+68fb1526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-17.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-17.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23.1-1.module+el8.3.0+9502+012d8a97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23.1-1.module+el8.3.0+9502+012d8a97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.10-1.10.23.1.1.module+el8.3.0+9502+012d8a97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20.1-1.module+el8.3.0+9503+19cb079c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20.1-1.module+el8.3.0+9503+19cb079c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.module+el8.3.0+9715+1718613f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.10-1.12.20.1.1.module+el8.3.0+9503+19cb079c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.15.4-2.module+el8.3.0+9635+ffdf8381</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.15.4-2.module+el8.3.0+9635+ffdf8381</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.module+el8.3.0+6519+9f98ed83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23-3.module+el8.3.0+6519+9f98ed83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.06-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.55-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.02-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-417.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.15.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.15.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:331-1.el8_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.56-5.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.20-5.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.20-5.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.20-5.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-90.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-90.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-8.gite94b4f9.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.124.0-1.gitf958d0c.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-4.git9ebe139.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.32-6.git1715c90.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-9.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3-5.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.15-2.git2d0b8a3.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-2.git87f9237.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.git921f98f.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.git921f98f.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-56.rc5.dev.git2abd837.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-5.dev.gitc4e1bc5.module+el8.3.0+10171+12421f43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.21.0-1.module+el8.3.0+10191+34fb5a07</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.21.0-1.module+el8.3.0+10191+34fb5a07</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.11-1.12.21.0.1.module+el8.3.0+10191+34fb5a07</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.0-1.module+el8.3.0+10166+b07ac28e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.0-1.module+el8.3.0+10166+b07ac28e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.11-1.10.24.0.1.module+el8.3.0+10166+b07ac28e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.16.0-2.module+el8.3.0+10180+b92e1eb6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.16.0-2.module+el8.3.0+10180+b92e1eb6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.11-1.14.16.0.2.module+el8.3.0+10180+b92e1eb6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.522-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.13-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.113-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.104-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-2.el8_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3-1.module+el8.3.0+8058+d5cd4219</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.0-1.module+el8.3.0+6784+6e1e4c62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.4-3.module+el8.3.0+10353+73f6df5b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.4-3.module+el8.3.0+10353+73f6df5b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0-1.module+el8.3.0+7355+c59bcbd9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-3.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1g-15.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1g-15.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.8-7.module+el8.3.0+10310+6e88d919</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.8-7.module+el8.3.0+10310+6e88d919</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.22.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-240.22.1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.1-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-3.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-3.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.14-8.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.14-8.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292.b10-0.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292.b10-0.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.11.0.9-0.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-1.el8_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30.0-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30.0-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30.0-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.30-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-151.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-151.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.55-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.55-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.2-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.10-32.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-39.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.5-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.1-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-30.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.1-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.32-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.32-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.5-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.5-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.2-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.2-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-25.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-57.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.19-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.4-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.52-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.22-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.22-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-45.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-45.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-102.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20201218-102.git05789708.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-37.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.28-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.28-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.28-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.06-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.55-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.02-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-419.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.19-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.29-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.27-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.27-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.27-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.module+el8.4.0+8864+58b0fcdb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-1.module+el8.4.0+9580+3b0e6c24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-1.module+el8.4.0+9580+3b0e6c24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.29-11.module+el8.4.0+8277+5e2c6e6e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-4.module+el8.4.0+9577+0b56c8de</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-16.module+el8.4.0+9193+f3daf6ef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0.1-12.module+el8.4.0+9193+f3daf6ef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-4.module+el8.4.0+9319+a932af88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-16.module+el8.4.0+9406+221a4565</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-16.module+el8.4.0+9406+221a4565</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.0.1-13.module+el8.4.0+9442+27d0e81c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-6.module+el8.4.0+9287+299307c7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-3.module+el8.4.0+9193+f3daf6ef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6-3.module+el8.3.0+6805+72837426</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-2.module+el8.4.0+10451+3e5b5448</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10.5-2.module+el8.4.0+10466+9830f79e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.30-1.module+el8.3.0+6730+8f9c6254</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10.5-2.module+el8.4.0+10466+9830f79e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.module+el8.4.0+8891+bb8828ef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-8.module+el8.2.0+5723+4574fbff</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6.1-1.module+el8.4.0+8778+d07929ff</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-8.module+el8.2.0+5723+4574fbff</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:29-2.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.158.0-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-8.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-6.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-6.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.8-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.4.0+10607+f4da7515</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.103-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.3.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-30.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-39.module+el8.4.0+9658+b87b2deb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-39.module+el8.4.0+9658+b87b2deb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.11-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6-2.module+el8.4.0+9328+4ec4e316</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-3.module+el8.1.0+4098+f286395e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.module+el8.4.0+10413+a92f1bfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.module+el8.4.0+10413+a92f1bfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-3.module+el8.4.0+9007+5084bdd8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-3.module+el8.4.0+9008+94c5103b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.module+el8.4.0+10412+5ecb5b37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.module+el8.4.0+10412+5ecb5b37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-1.module+el8.4.0+9007+5084bdd8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-1.module+el8.1.0+4107+4a66eb87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-5.module+el8.2.0+4691+a05b2456</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.module+el8.1.0+4107+4a66eb87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-12.module+el8.1.0+4107+4a66eb87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.module+el8.1.0+4107+4a66eb87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.56.6-1.module+el8.4.0+9005+f55ff3e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-5.module+el8.4.0+10227+076cd560</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.6-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-1.module+el8.4.0+8888+89bc7e79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.3-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.49.0-1.module+el8.4.0+9446+1a463e08</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.49.0-1.module+el8.4.0+9446+1a463e08</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:104-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0.0-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11-4.module+el8.4.0+10676+a969168e.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-1.module+el8.1.0+4098+f286395e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.module+el8.1.0+4098+f286395e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1-12.module+el8.1.0+4098+f286395e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.module+el8.1.0+4098+f286395e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.56.6-2.module+el8.4.0+10615+2234cc2c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.26-4.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.26-4.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.26-4.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.9-3.module+el8.4.0+10984+ed187465</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.9-3.module+el8.4.0+10984+ed187465</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.6-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.203-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.15-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.115-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.3.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.3.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-10.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-10.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-10.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10.5-3.module+el8.4.0+11039+635979e4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.10.5-3.module+el8.4.0+11039+635979e4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-11.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-11.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-11.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-3.module+el8.4.0+11152+f736ed63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.0-3.module+el8.4.0+11152+f736ed63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.module+el8.4.0+11155+68135136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.module+el8.4.0+11155+68135136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.6-8.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-1.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.130.0-1.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.3-4.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.41-4.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-9.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8-1.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-26.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-26.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-65.rc10.module+el8.4.0+11031+7edfb656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.git21fdece.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-1.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-2.module+el8.4.0+10193+e90fd8eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210216-1.20210525.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.16-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.116-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.7-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.204-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-44.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-44.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-44.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.22-1.module+el8.4.0+11244+beebcf7e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-1.module+el8.4.0+11249+895597ab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:29-2.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.158.0-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-2.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-6.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-6.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-71.rc92.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.8-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.4.0+11310+8c67a752</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-2.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:29-2.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-3.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.162.0-1.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-10.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-2.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-3.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-7.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-7.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-73.rc93.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.8-1.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.4.0+11311+9da8acfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.module+el8.4.0+11288+c193d6d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.module+el8.4.0+11288+c193d6d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.7-1.module+el8.4.0+11288+c193d6d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.7-1.module+el8.4.0+11288+c193d6d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.module+el8.4.0+8873+b821c30a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.module+el8.4.0+8873+b821c30a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3-1.module+el8.4.0+11254+85259292</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3-1.module+el8.4.0+11254+85259292</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.9-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-9.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-9.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.7.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.7.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-14.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-14.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-14.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.module+el8.3.0+7192+4e3a532a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-1.module+el8.3.0+7192+4e3a532a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-1.module+el8.3.0+7192+4e3a532a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.6-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13.0-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-1.module+el8.3.0+7192+4e3a532a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-1.module+el8.3.0+7192+4e3a532a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-1.module+el8.3.0+7192+4e3a532a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.3.0+7192+4e3a532a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.3.0+7192+4e3a532a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.7-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.4-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.6-136.module+el8.4.0+10728+4c884998</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-2.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-2.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-2.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-4.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-4.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.module+el8.1.0+3656+f80bfa1d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1.1-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6.3-107.module+el8.4.0+10822+fe4fffb1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.module+el8.1.0+3653+beb38eb0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-1.module+el8.1.0+3653+beb38eb0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-1.module+el8.1.0+3653+beb38eb0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.3-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-1.module+el8.1.0+3653+beb38eb0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-1.module+el8.1.0+3653+beb38eb0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-1.module+el8.1.0+3653+beb38eb0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.module+el8.1.0+3653+beb38eb0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.module+el8.1.0+3653+beb38eb0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.9-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3.1-107.module+el8.4.0+10830+bbd85cce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200602gitca407c7246bf-4.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.16-16.module+el8.4.0+11446+fc96bc48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.16-16.module+el8.4.0+11446+fc96bc48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-5.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.10.2.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.10.2.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-45.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-45.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302.b08-0.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302.b08-0.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0.7-0.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.24-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.6-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13.0-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.7-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1.1-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.4-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.6-137.module+el8.4.0+12025+f744ca41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210216-1.20210608.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.12.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.12.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-10.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-10.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-10.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.1-1.module+el8.4.0+11282+0729bac9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.1-1.module+el8.4.0+11282+0729bac9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200602gitca407c7246bf-4.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.3-2.module+el8.4.0+11732+c668cc9f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.3-2.module+el8.4.0+11732+c668cc9f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.13-1.12.22.3.2.module+el8.4.0+11732+c668cc9f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.3-2.module+el8.4.0+11738+3bd42762</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.3-2.module+el8.4.0+11738+3bd42762</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.13-1.14.17.3.2.module+el8.4.0+11738+3bd42762</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.1-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-1.module+el8.4.0+11833+614b07b8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-1.module+el8.4.0+11833+614b07b8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.16-19.module+el8.4.0+11894+f5bb5c43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.16-19.module+el8.4.0+11894+f5bb5c43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.3-10.el8_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.118-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.29-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.525-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.9-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.206-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-9.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-9.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-9.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.3-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.3-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.3-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-4.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-2.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-10.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.17.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.17.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-20.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-20.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.14.0-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.19.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.19.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32.0-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-6.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-6.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-8.3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-8.3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-18.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-18.el8_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-2.module+el8.4.0+12542+e3fec473</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-2.module+el8.4.0+12542+e3fec473</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.26-1.module+el8.4.0+12359+b8928c02</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.5-1.module+el8.4.0+12242+af52a4c7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.5-1.module+el8.4.0+12242+af52a4c7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.14-1.12.22.5.1.module+el8.4.0+12242+af52a4c7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-1.module+el8.4.0+12247+e2879e58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-1.module+el8.4.0+12247+e2879e58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.14-1.14.17.5.1.module+el8.4.0+12247+e2879e58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-4.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.6-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-39.module+el8.4.0+12865+a7065a39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-39.module+el8.4.0+12865+a7065a39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.11-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.208-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0.8-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312.b07-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312.b07-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-5.module+el8.4.0+12927+b9845322</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-5.module+el8.4.0+12927+b9845322</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.9-5.module+el8.4.0+12929+1bb0d2aa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.9-5.module+el8.4.0+12929+1bb0d2aa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-4.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-4.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-4.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.25.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-305.25.1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-39.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3-5.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3-5.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3-5.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-18.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-18.el8_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.16-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.16-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.4-3.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-1.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-2.el8_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.1.0.12-2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-98.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.10-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-31.module+el8.5.0+12207+5c5719bc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-1.module+el8.4.0+9670+1849b5f9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.module+el8.3.0+6646+6b4b10ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-21.module+el8.5.0+12207+5c5719bc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-2.module+el8.4.0+9657+a4b6a102</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-1.module+el8.4.0+9670+1849b5f9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.1.0+3334+5cb623d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-2.module+el8.1.0+3334+5cb623d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14-12.module+el8.1.0+3334+5cb623d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-22.module+el8.5.0+10789+e4939b94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-21.module+el8.5.0+10916+41bd434d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.module+el8.3.0+6646+6b4b10ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-3.module+el8.5.0+12207+5c5719bc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-38.module+el8.5.0+12207+5c5719bc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-38.module+el8.5.0+12207+5c5719bc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-10.module+el8.5.0+11014+88fc0d0b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-31.module+el8.5.0+12203+77770ab7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-7.module+el8.5.0+12203+77770ab7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-1.module+el8.5.0+10264+e5753a40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-9.module+el8.5.0+10541+706bb066</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-5.module+el8.5.0+10534+22332931</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-22.module+el8.5.0+10788+a4cea9e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-21.module+el8.5.0+10858+05337455</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-21.module+el8.5.0+12203+77770ab7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-3.module+el8.5.0+12203+77770ab7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.79-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-2.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:33-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.29-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.167.0-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-2.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-3.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-3.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-9.module+el8.5.0+12697+018f24d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-9.module+el8.5.0+12697+018f24d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-2.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-0.4.module+el8.5.0+12682+a4eeb084</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-2.module+el8.5.0+12582+56d94c81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-1.module+el8.5.0+10379+d6b83bd0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.7-1.module+el8.5.0+12246+1aac4e3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.7-1.module+el8.5.0+12246+1aac4e3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.24-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19.24-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.5-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.4-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.4-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.4-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20210527gite1999b264f1f-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.18-1.module+el8.3.0+6678+b09f589e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.module+el8.3.0+6678+b09f589e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.19-1.module+el8.5.0+11143+cc873159</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.12-1.module+el8.3.0+6678+b09f589e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.18-1.module+el8.3.0+6678+b09f589e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.module+el8.3.0+6678+b09f589e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.5-1.module+el8.3.0+6678+b09f589e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-1.module+el8.3.0+6678+b09f589e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.6-9.module+el8.5.0+12239+ec01067b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-1.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.130.0-1.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.3-4.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.41-4.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-9.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8-1.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-26.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-26.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-66.rc10.module+el8.5.0+11041+627a5cdc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.git21fdece.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-1.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009197999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-2.module+el8.5.0+10223+f7559c42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-10.module+el8.5.0+11808+4e1db630</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-6.module+el8.5.0+12609+beaa716d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-6.module+el8.5.0+12609+beaa716d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99-1.module+el8.5.0+10306+3f72d66d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.9-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-43.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-43.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-41.module+el8.5.0+11772+c8e0c271</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-41.module+el8.5.0+11772+c8e0c271</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-2.module+el8.5.0+12254+dc27bae9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-2.module+el8.5.0+12254+dc27bae9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-1.module+el8.5.0+12195+effd8a03</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-1.module+el8.5.0+11469+24c223d9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.68-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.68-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.3-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-164.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-164.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.10-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.10-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.10-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-108.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-108.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.42-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.33-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.33-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.33-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.5-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.55-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.55-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.0-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.1-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-28.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-28.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.1-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-60.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.26-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.26-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.26-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-156.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-156.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-156.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.4-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-40.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-41.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-57.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.19-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.19-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-9.20180224.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-9.20180224.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-9.20180224.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.56-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.56-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.21-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.63.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.63.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.4-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-53.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-43.module+el8.5.0+13064+c4b14997</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-43.module+el8.5.0+13064+c4b14997</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.1-1.2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.1-1.2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.1-1.2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.1-1.2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-4.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-4.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-3.module+el8.5.0+13074+d655d86c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.54.0-3.module+el8.5.0+13074+d655d86c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.85-1.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.85-1.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.29-1.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.72-1.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.1-1.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.1-1.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-108.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-108.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-7.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-7.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.2.1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.2.1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-8.el8_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-8.el8_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-4.module+el8.5.0+13246+cefb5d4c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-4.module+el8.5.0+13246+cefb5d4c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-1.module+el8.5.0+11871+08d0eab5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-2.module+el8.5.0+12488+254d2a07</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-2.module+el8.5.0+12488+254d2a07</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-1.module+el8.5.0+11871+08d0eab5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.29-12.module+el8.5.0+13211+e8845b76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-7.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-7.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.29-12.module+el8.5.0+13466+327eb9f3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5-7.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5-7.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5-7.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-10.module+el8.5.0+13587+92118e57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-10.module+el8.5.0+13587+92118e57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-6.module+el8.5.0+11410+91a33fe4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.56.6-4.module+el8.5.0+12583+bf7ffcf6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.module+el8.5.0+13637+960c7771</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.module+el8.5.0+13637+960c7771</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13.1-3.module+el8.5.0+13548+45d748af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13.1-3.module+el8.5.0+13548+45d748af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-1.module+el8.5.0+13548+45d748af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25-1.module+el8.5.0+10992+fac5fe06</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-1.16.13.1.3.module+el8.5.0+13548+45d748af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-5.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-5.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.7.1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.7.1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-3.module+el8.5.0+11354+78b3c9c5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.module+el8.5.0+11354+78b3c9c5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.module+el8.5.0+11354+78b3c9c5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.9-1.module+el8.5.0+13373+4554acc4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.9-1.module+el8.5.0+13373+4554acc4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-3.module+el8.5.0+11357+bcc62552</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5-1.module+el8.5.0+13344+8c0fd184</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5-1.module+el8.5.0+13344+8c0fd184</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.9-5.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.2.0.8-4.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4-6.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.14.0.9-2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.12.2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.12.2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-4.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-13.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-13.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-13.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.4-4.module+el8.5.0+13988+de2b8c0b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.5-2.module+el8+2463+615f6896</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-5.module+el8+2463+615f6896</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-6.module+el8+2463+615f6896</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.module+el8+2463+615f6896</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-3.module+el8+2463+615f6896</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-1.module+el8+2463+615f6896</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322.b06-2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322.b06-2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-1.module+el8.5.0+13723+ab304644</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-1.module+el8.5.0+13723+ab304644</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5-9.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5-9.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.5-9.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.2-2.module+el8.5.0+13644+8d46dafd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.2-2.module+el8.5.0+13644+8d46dafd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-1.module+el8.5.0+13504+a2e74d91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-16.el8_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-16.el8_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-19.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-19.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-19.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-4.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-4.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.8-1.module+el8.5.0+14089+03a0c2cc.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-6.module+el8.5.0+11976+0b4af72d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-14.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.14-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.211-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.102-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.3-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2.1-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.9-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3.1-108.module+el8.5.0+13719+08a8ba32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1.1-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6.3-107.module+el8.5.0+13840+ec418553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-18.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-18.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-18.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.27-6.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1.1-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6.3-109.module+el8.5.0+14275+d9c243ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-3.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.20.1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.20.1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.3-4.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.103-4.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.23-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.417-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.15-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.212-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.23-14.module+el8.5.0+14377+c731dc97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.23-14.module+el8.5.0+14377+c731dc97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-43.module+el8.5.0+14370+51c6d843.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-43.module+el8.5.0+14370+51c6d843.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-3.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-3.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-16.el8_5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-16.el8_5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-164.el8_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-164.el8_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-12.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-12.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-4.el8_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-43.module+el8.5.0+14530+6f259f31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-43.module+el8.5.0+14530+6f259f31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-6.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-6.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0.9-2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.3.0.6-2.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-13.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-13.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-13.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.115-13.el8_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.23.1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-348.23.1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-16.el8_5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-16.el8_5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.34-4.module+el8.5.0+14124+14ced695</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.32-2.module+el8.5.0+14124+14ced695</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-18.module+el8.4.0+9031+9abc7af9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.9-4.module+el8.5.0+14125+d11efe18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.13-1.module+el8.5.0+14125+d11efe18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-2.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:29-2.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.167.0-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-2.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-8.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-8.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-73.rc95.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.5.0+14784+8c48f0fc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.6-10.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11-1.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-1.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.130.0-1.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.3-4.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.41-4.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-9.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8-1.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-28.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-28.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.2.gitd0a45fe.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-1.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-2.module+el8.5.0+14796+e4386a39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-18.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-5.el8_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-1.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-3.el8_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-27.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-4.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:43-1.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-1.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.179.1-1.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-27.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-3.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-3.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-6.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-6.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-1.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-2.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-2.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-0.4.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-2.module+el8.6.0+14673+621cb8be</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.11-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-3.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:29-2.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-1.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.178.0-2.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-1.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-3.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-8.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-8.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-73.rc95.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-1.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.6.0+14694+4f5132e0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-21.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-21.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-44.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-1.module+el8.6.0+12972+ebab5911</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.module+el8.6.0+14297+32a15e19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.module+el8.6.0+14297+32a15e19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-10.module+el8.6.0+14191+7fdd52cd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-6.module+el8.6.0+13959+8e368262</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-19.module+el8.6.0+13001+ad200bd9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-2.module+el8+2454+f890a43a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-11.module+el8.6.0+14082+b6f23e95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-1.module+el8.6.0+13642+78853f5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-1.module+el8.6.0+14244+60d461b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23.0-1.module+el8.5.0+11983+6ba118b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12.0-2.module+el8.6.0+14115+8b467244</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12.0-2.module+el8.6.0+14115+8b467244</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7.1-1.module+el8.6.0+13291+248751b1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-0.4.module+el8.6.0+13337+afcb49ec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-0.1.module+el8+2452+b359bfcd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.1-1.module+el8.6.0+14021+586eff1a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.1-1.module+el8.6.0+14021+586eff1a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-47.module+el8.6.0+14529+083145da.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-47.module+el8.6.0+14529+083145da.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-5.module+el8.6.0+13996+01710940</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-12.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.19-2.module+el8.6.0+13953+0a59ce9f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-3.module+el8.6.0+14176+9782b8ab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.12-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38.4-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.24-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-45.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.9.1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.9.1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:264.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:264.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.13.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.5-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.5-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.5-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.56-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.56-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-123.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-123.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.1-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.1-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.9-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-3.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:29-2.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-1.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.178.0-2.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-1.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-3.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-9.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-9.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-73.rc95.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-1.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.6.0+14874+64436299</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.105-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.17-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.214-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-14.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-14.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.25-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.419-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-5.module+el8.6.0+15157+188c9801</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-5.module+el8.6.0+15157+188c9801</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.12-6.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.14.0-4.module+el8.6.0+15294+54b291d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.14.0-4.module+el8.6.0+15294+54b291d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-1.module+el8.6.0+15294+54b291d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-1.16.14.0.4.module+el8.6.0+15294+54b291d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2102.0-7.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2102.0-7.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21-2.module+el8.6.0+15342+53518fac</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11-2.module+el8.6.0+15345+1dd8d6b8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11-2.module+el8.6.0+15345+1dd8d6b8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-2.module+el8.6.0+15347+b8eabcef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-2.module+el8.6.0+15347+b8eabcef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-9.module+el8.4.0+8637+d3bad2c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-2.module+el8.6.0+15201+2f551d15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-2.module+el8.6.0+15201+2f551d15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-5.module+el8.4.0+8637+d3bad2c2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-4.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-4.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.6-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.106-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-45.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-45.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-45.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.26-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.420-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-47.module+el8.6.0+15654+427eba2e.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-47.module+el8.6.0+15654+427eba2e.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-7.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-22.el8_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-22.el8_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-8.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.13.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.13.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-13.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-13.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-19.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-19.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2o-4.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.10-1.module+el8.6.0+15486+6d4da7db</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.10-1.module+el8.6.0+15486+6d4da7db</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.10-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.10-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.3-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2.1-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.9-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3.1-109.module+el8.6.0+15475+c55337b4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.19-3.module+el8.6.0+15726+994cde98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.20-1.module+el8.6.0+13671+84712317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-1.module+el8.6.0+13671+84712317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.13-3.module+el8.6.0+15725+0c79e7c4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-1.module+el8.6.0+13671+84712317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.20-1.module+el8.6.0+13671+84712317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.module+el8.6.0+13671+84712317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-1.module+el8.6.0+13671+84712317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.2-1.module+el8.6.0+13671+84712317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-3.module+el8.6.0+15801+8fa20c64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.16.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.16.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-6.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-6.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.16.0.8-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.11-3.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4.0.8-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.12-1.module+el8.6.0+16014+a372c00b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.12-1.module+el8.6.0+16014+a372c00b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.module+el8.6.0+14229+2452087f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1.1-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6.3-110.module+el8.6.0+15956+aa803fc1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.32-3.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.32-3.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-19.el8_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-19.el8_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-7.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-7.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.19.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.19.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.28-7.module+el8.6.0+15293+4900ec12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.28-7.module+el8.6.0+15293+4900ec12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.11-1.module+el8.6.0+15639+405b7427</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.16-2.module+el8.6.0+15639+405b7427</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.28-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.422-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.8-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.108-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.19-4.module+el8.6.0+16316+906f6c6d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-22.el8_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-22.el8_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-14.el8_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-14.el8_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-58.el8_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-58.el8_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.12-6.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.5-1.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-199.1.ac1d34c.git.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-199.1.ac1d34c.git.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.35-1.module+el8.6.0+15949+4ba4ec26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.35-1.module+el8.6.0+15949+4ba4ec26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.24-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.6-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13.0-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.7-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1.1-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.4-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.6-138.module+el8.6.0+16148+54b2ba8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20.0-2.module+el8.6.0+16231+7c1b33d9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20.0-2.module+el8.6.0+16231+7c1b33d9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-2.module+el8.6.0+16231+7c1b33d9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.17-1.14.20.0.2.module+el8.6.0+16231+7c1b33d9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-3.module+el8.6.0+16248+76b0e185</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-3.module+el8.6.0+16248+76b0e185</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-2.module+el8.6.0+16240+7ca51420</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.11.0-1.16.16.0.3.module+el8.6.0+16248+76b0e185</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.module+el8.5.0+11580+845038eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.33-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.2-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-1.module+el8.5.0+11580+845038eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-1.module+el8.5.0+11580+845038eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.5.0+11580+845038eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.5.0+11580+845038eb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.3-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.3-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.33-141.module+el8.6.0+16311+3e5e17e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-47.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.26.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.26.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.20-3.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.29-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.423-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.9-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.109-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-1.module+el8.6.0+16577+0788886f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-6.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-3.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-3.module+el8.6.0+16749+7b6feaf0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-3.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-3.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-3.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.7.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.7.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.7.el8_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0-8.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-8.el8_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.10-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.110-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.30-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.424-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.module+el8.6.0+16848+a483195a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.module+el8.6.0+16848+a483195a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.0-1.16.17.1.1.module+el8.6.0+16848+a483195a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5.0.8-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.17.0.8-2.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-4.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-7.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-8.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-5.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-5.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-19.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-16.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-16.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-16.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.32.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-372.32.1.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.5-10.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.5-10.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15.5-10.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-2.module+el8.6.0+16523+5cb0e868</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-1.module+el8.6.0+16523+5cb0e868</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.12-1.module+el8.6.0+16796+0abe6678</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.12-1.module+el8.6.0+16796+0abe6678</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.3-3.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.28-8.module+el8.6.0+16880+945f9b53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.28-8.module+el8.6.0+16880+945f9b53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-22.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-22.el8_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.14-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-4.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.0-2.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:53-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.189.0-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-40.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-3.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-6.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-0.6.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-3.module+el8.7.0+16772+33343656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-35.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.5-2.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:46-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.189.0-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-35.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-3.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-8.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-8.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-5.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-2.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-0.5.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-3.module+el8.7.0+16520+2db5507d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12.0-4.module+el8.7.0+16126+c5918a27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12.0-4.module+el8.7.0+16126+c5918a27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-1.module+el8.7.0+15532+95bac9ee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.50-1.module+el8.7.0+15761+f86c9a56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.15-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-6.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:29-2.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-3.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.189.0-1.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-1.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-3.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-1.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-13.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-13.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-73.rc95.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-1.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-1.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-1.module+el8.7.0+16212+65e1b35f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.module+el8.7.0+15197+cc495aeb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.module+el8.7.0+15197+cc495aeb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.0-16.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-23.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-23.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-11.module+el8.7.0+15681+7a92afba</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.20-2.module+el8.7.0+16187+bb5ab920</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.30-1.module+el8.7.0+15886+8e29b882</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-1.module+el8.7.0+15127+a450a8db</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.79-24.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.15-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.9.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.9.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.9.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-51.module+el8.7.0+16050+02173b8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-51.module+el8.7.0+16050+02173b8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-425.3.1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-425.3.1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-159.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-159.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-159.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.45.6-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.45.6-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.9.1-1.module+el8.7.0+16806+4109802b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.9.1-1.module+el8.7.0+16806+4109802b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-1.module+el8.7.0+16061+0a247725</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.7.0+15582+19c314fa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.1-1.18.9.1.1.module+el8.7.0+16806+4109802b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-5.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.2-2.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:53-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.189.0-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-43.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-3.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-7.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-4.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-4.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-1.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-0.6.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-3.module+el8.7.0+17064+3b31f55c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-0.4.rc2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.100-0.4.rc2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20.1-2.module+el8.7.0+16991+b0a68a3e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.20.1-2.module+el8.7.0+16991+b0a68a3e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-2.module+el8.7.0+16991+b0a68a3e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.17-1.14.20.1.2.module+el8.7.0+16991+b0a68a3e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-28.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-28.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-22.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-22.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.8-2.module+el8.7.0+17239+94d153bd.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.1-2.module+el8.7.0+17306+fc023f99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.1-2.module+el8.7.0+17306+fc023f99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-1.module+el8.7.0+17282+f47dd33b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.2-1.18.12.1.2.module+el8.7.0+17306+fc023f99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0-9.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-3.module+el8.7.0+17465+1a1abd74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-3.module+el8.7.0+17465+1a1abd74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.module+el8.7.0+17412+bb0e4a6b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.2-1.16.18.1.3.module+el8.7.0+17465+1a1abd74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21.1-2.module+el8.7.0+17528+a329cd47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21.1-2.module+el8.7.0+17528+a329cd47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.module+el8.7.0+17528+a329cd47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.17-1.14.21.1.2.module+el8.7.0+17528+a329cd47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.13-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.113-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.el8_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.el8_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.el8_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-26.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-26.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-23.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-23.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-23.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-68.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-68.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-425.10.1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-425.10.1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-10.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-17.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-17.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-17.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23-1.module+el8.7.0+17280+3a452e1f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-4.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-4.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.11-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.11-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-15.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-15.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6.0.10-3.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18.0.10-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b09-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b09-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.29-8.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.0-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-9.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-1.module+el8.7.0+15126+0e0a42d9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.module+el8.7.0+17845+708ebe87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.module+el8.7.0+17640+84246675</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.module+el8.7.0+17640+84246675</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.1-3.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.1-3.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-9.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-9.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-9.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-425.13.1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-425.13.1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-48.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.2.0-6.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-68.el8_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-68.el8_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-4.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-4.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-4.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-6.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.27-1.module+el8.7.0+17863+0ad92cd2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-51.module+el8.7.0+18026+7b169787.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-51.module+el8.7.0+18026+7b169787.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.14-5.el8_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el8_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-25.el8_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-25.el8_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-11.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-11.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-3.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-9.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-9.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-9.el8_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009198999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-9.el8_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-425.19.2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-425.19.2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-6.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-6.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-27.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.10-1.module+el8.7.0+18279+1ca8cf12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.10-1.module+el8.7.0+18279+1ca8cf12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-1.module+el8.7.0+18373+704f5cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-1.module+el8.7.0+18373+704f5cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-3.module+el8.7.0+18373+704f5cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.3-1.16.19.1.1.module+el8.7.0+18373+704f5cef</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-2.module+el8.7.0+18445+9493b6ea</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-2.module+el8.7.0+18445+9493b6ea</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.module+el8.7.0+18445+9493b6ea</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-1.18.14.2.2.module+el8.7.0+18445+9493b6ea</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-51.module+el8.7.0+18499+2e106f0b.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-51.module+el8.7.0+18499+2e106f0b.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-5.module+el8.7.0+18499+2e106f0b.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21.3-1.module+el8.7.0+18531+81d21ca6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21.3-1.module+el8.7.0+18531+81d21ca6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-3.module+el8.7.0+18531+81d21ca6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.18-1.14.21.3.1.module+el8.7.0+18531+81d21ca6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.19.0.7-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7.0.7-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el8_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-7.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-7.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5-1.el8_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.1-1.module+el8.8.0+18195+471da4bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:63.1-1.module+el8.8.0+18286+cd236dce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.6-1.module+el8.8.0+18098+9b44df5f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.205.0-2.module+el8.8.0+18438+15d3aa65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-63.module+el8.8.0+18438+15d3aa65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-3.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-2.module+el8.8.0+18418+f0e540fe</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-1.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-4.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-1.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-8.module+el8.8.0+18438+15d3aa65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-8.module+el8.8.0+18438+15d3aa65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-1.module+el8.8.0+18275+3a56cc62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-0.2.module+el8.8.0+18251+ad5b274c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-7.module+el8.8.0+18119+e3deee03</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-20.module+el8.8.0+18060+3f21f2cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.15-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.0-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.7.3-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-37.module+el8.8.0+17954+9046de88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-5.module+el8.8.0+18083+cd85596b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:46-1.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-1.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.199.0-1.module+el8.8.0+18113+8b5b6979</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-37.module+el8.8.0+17954+9046de88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-3.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-1.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9-1.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-2.module+el8.8.0+18083+cd85596b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-20.module+el8.8.0+18201+6ad7332c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-20.module+el8.8.0+18201+6ad7332c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-1.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-2.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-7.module+el8.8.0+18115+45021590</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-3.module+el8.8.0+17821+de1b53f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-15.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-15.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.1-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-12.module+el8.8.0+17629+2cfc9d03</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-23.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.14-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.20-14.module+el8.8.0+17558+3f8a93b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.20-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-1.module+el8.8.0+17865+ef7eddfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220126gitbb1bba3d77-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-37.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.4-37.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.10.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.10.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-30.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-30.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-27.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-31.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-49.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-49.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-49.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-55.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.15-4.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.module+el8.8.0+16778+5fbb74f5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.6-1.module+el8.8.0+18289+edd6c8b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.6-1.module+el8.8.0+18289+edd6c8b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-2.module+el8.8.0+18436+8918dd75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.32-1.module+el8.8.0+18446+fca6280e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-2.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-10.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-10.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-30.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-30.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-3.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el8_8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-6.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-6.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-2.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-1.el8_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.3-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.3-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-1.module+el8.8.0+18857+fca43658</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-1.module+el8.8.0+18857+fca43658</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.13.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.13.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-29.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-29.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el8_8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.18-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.118-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-6.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-51.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.107-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-2.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-2.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180414-29.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-13.module+el8.8.0+19042+06909d2c.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-22.module+el8.8.0+18977+47894b34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.8-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.8-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.24-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.6-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.6-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13.0-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.7-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.1.1-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.4-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.6-139.module+el8.8.0+18745+f1bef313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-28.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-28.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-74.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-74.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-10.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-10.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-18.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-18.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-18.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.15.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.15.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.10-1.module+el8.8.0+19203+782922b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.10-1.module+el8.8.0+19203+782922b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-2.module+el8.8.0+19038+6f60344f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-2.module+el8.8.0+19038+6f60344f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-3.module+el8.8.0+19038+6f60344f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.3-1.16.19.1.2.module+el8.8.0+19038+6f60344f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-3.module+el8.8.0+19021+4b8b11cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-3.module+el8.8.0+19021+4b8b11cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.module+el8.8.0+18432+27f188ac</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.9-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.109-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.20-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.120-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.0-2.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.8.0.7-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.20.0.8-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el8_8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-3.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-3.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-3.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-3.module+el8.8.0+19464+578f4546</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9.4-1.module+el8.7.0+14797+4085fcb6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-19.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.19.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.14.0-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-24.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-24.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-24.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.21.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.21.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-3.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-30.el8_8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-30.el8_8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48-5.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-16.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-16.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.16.1-1.module+el8.8.0+19438+94e84959</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.16.1-1.module+el8.8.0+19438+94e84959</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.1-1.18.16.1.1.module+el8.8.0+19438+94e84959</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.1-1.module+el8.8.0+19440+ee8dbee5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.1-1.module+el8.8.0+19440+ee8dbee5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.1.1.module+el8.8.0+19440+ee8dbee5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-7.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.1-2.module+el8.8.0+19613+f0bba33b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.1-2.module+el8.8.0+19613+f0bba33b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.10-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.110-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.21-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.121-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-51.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-51.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-51.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.0-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-56.module+el8.8.0+19808+379766d6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-56.module+el8.8.0+19808+379766d6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-8.module+el8.8.0+18751+b4557bca.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.22-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.122-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.11-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.111-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.1-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-7.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-7.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.27.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-477.27.1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-9.20180224.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-9.20180224.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-9.20180224.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-4.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.5-2.el8_8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-29.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-29.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-2.module+el8.8.0+19898+ab99ba34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-2.module+el8.8.0+19898+ab99ba34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.8.0+19764+7eed1ca3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26-1.module+el8.8.0+19857+6d2a104d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.2.2.module+el8.8.0+19898+ab99ba34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.17.1-1.module+el8.8.0+19757+8ca87034</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.17.1-1.module+el8.8.0+19757+8ca87034</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.8.0+19757+8ca87034</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-1.18.17.1.1.module+el8.8.0+19757+8ca87034</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-225.el8_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-225.el8_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-225.el8_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.14.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-2.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-2.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-8.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-10.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.14-1.module+el8.8.0+20134+a92c7654</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.22-1.module+el8.8.0+20134+a92c7654</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.112-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.23-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.123-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-1.module+el8.8.0+20359+9bd89172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-1.module+el8.8.0+20359+9bd89172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-1.module+el8.8.0+20355+6d9c8a63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-1.module+el8.8.0+20355+6d9c8a63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.13-1.module+el8.8.0+20380+7171fefb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.13-1.module+el8.8.0+20373+d9cd605c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.13-1.module+el8.8.0+20373+d9cd605c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.21.0.9-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9.0.9-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-8.el8_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-5.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-5.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-3.module+el8.8.0+20386+0b1f3093</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-3.module+el8.8.0+20386+0b1f3093</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.2.3.module+el8.8.0+20386+0b1f3093</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.15-5.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.18.2-1.module+el8.8.0+20407+c11d40bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.18.2-1.module+el8.8.0+20407+c11d40bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.8.1-1.18.18.2.1.module+el8.8.0+20407+c11d40bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-1.module+el8.8.0+20302+42d2b711</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-5.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.8-3.module+el8.8.0+20455+bdc2c048.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-13.module+el8.8.0+20144+beed974d.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-51.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.module+el8.8.0+20025+f2100191.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.21-5.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.3.0-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.4-4.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-3.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-1.module+el8.6.0+12838+640e6226</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-5.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-2.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.module+el8.8.0+20025+f2100191.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.module+el8.4.0+9822+20bf1249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.1-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-119.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-119.el8_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.24-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.124-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.13-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.113-1.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.1.0.12-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.1-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220126gitbb1bba3d77-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-4.module+el8.9.0+19469+5b493da9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1.1-10.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-7.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.9-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.7.3-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-17.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.11-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-2.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0-2.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-2.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-4.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-4.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1.1-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6.3-111.module+el8.9.0+19193+435404ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.8-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-10.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-31.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-8.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-15.module+el8.9.0+20125+68111a8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.1-7.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-10.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.4.0-10.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-16.module+el8.9.0+18326+1b5baeee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0.1-12.module+el8.9.0+18326+1b5baeee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-1.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-10.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-5.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-10.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.16-2.module+el8.9.0+18326+1b5baeee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14-12.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-13.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-7.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-6.module+el8.9.0+18326+1b5baeee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-9.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-6.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-19.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-13.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-16.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-16.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-19.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-8.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-6.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-22.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-6.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-13.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.2-13.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-16.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-4.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3-38.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-22.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.0.1-13.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-6.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-6.module+el8.9.0+18326+1b5baeee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-3.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-22.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-3.module+el8.9.0+19487+7dc18407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.79-31.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-27.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.5.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.5.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.59-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.59-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-119.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230824-119.git0e048b06.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-19.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-32.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-56.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.0-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-54.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-54.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-54.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-5.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.074-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-23.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-11.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-11.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-11.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.15-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.15-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.8-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-21.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-21.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.8.1-1.module+el8.9.0+20473+c4e3d824</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.8.1-1.module+el8.9.0+20473+c4e3d824</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.9.0+20473+c4e3d824</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.9.0+19519+e25b965a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-9.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.module+el8.9.0+19703+a1da7223</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-7.module+el8.9.0+20571+8d39338b.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.100-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.14-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.114-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.25-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.125-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.9.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.9.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-1.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-2.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-21.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-21.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.0-7.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-12.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-12.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-2.el8_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-2.el8_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-7.module+el8.9.0+20975+25f17541.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-4.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-4.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.11.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.11.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-5.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-18.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-18.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-13.el8_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-13.el8_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38.4-3.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-121.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-121.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.101-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.15-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.115-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.26-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.126-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.2.0.13-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-19.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-19.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-19.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-56.el8_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.22.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-27.el8_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-19.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.19.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-2.el8_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-2.el8_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-13.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-13.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-28.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-28.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-28.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.3-3.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:75-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.8-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.221.0-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-71.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-4.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-2.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-8.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-8.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-2.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-3.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-1.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.4-5.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-20.module+el8.9.0+21243+a586538b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-10.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-3.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-6.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-6.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.16-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.116-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.27-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.127-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-10.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.102-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-1.module+el8.9.0+21033+5795bdf6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-2.module+el8.9.0+21033+5795bdf6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-2.module+el8.9.0+21033+5795bdf6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.2-2.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-18.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-18.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-18.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.18.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.18.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.0-8.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-1.module+el8.9.0+19797+c4ce5969</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.module+el8.9.0+19797+c4ce5969</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.7-1.Final.module+el8.9.0+19797+c4ce5969</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-1.module+el8.9.0+21287+d0eecfe6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-1.module+el8.9.0+21287+d0eecfe6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.30.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.30.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.11-1.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-18.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-18.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-5.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-3.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+22417+2fb00970</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-36.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.1-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-69.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.module+el8.10.0+22551+c0330dc9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0-1.module+el8.10.0+20413+d8116364</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.Final.module+el8.10.0+20413+d8116364</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.6-1.module+el8.10.0+22551+c0330dc9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.6-1.module+el8.10.0+22551+c0330dc9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.module+el8.10.0+21470+43ec8058</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.27-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.module+el8.10.0+21470+43ec8058</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.module+el8.10.0+21470+43ec8058</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.10.0+21470+43ec8058</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.10.0+21470+43ec8058</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1.1-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-144.module+el8.10.0+22580+b97d9670</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1.1-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6.3-113.module+el8.10.0+22581+23fc9c9e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.32.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.32.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el8.10.0+20770+a5eca186</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-1.module+el8.10.0+20770+a5eca186</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.25-1.module+el8.10.0+22478+9eb07224</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-1.module+el8.10.0+20770+a5eca186</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el8.10.0+20770+a5eca186</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.module+el8.10.0+20770+a5eca186</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.module+el8.10.0+20798+00eaeb41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-1.module+el8.10.0+20770+a5eca186</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.18-1.module+el8.10.0+22485+a3539972</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.module+el8.10.0+22485+a3539972</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-2.module+el8.10.0+22485+a3539972</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.13-1.module+el8.10.0+22485+a3539972</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.18-1.module+el8.10.0+22485+a3539972</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.module+el8.10.0+22485+a3539972</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.5-1.module+el8.10.0+22485+a3539972</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-1.module+el8.10.0+22485+a3539972</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7-31.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-1.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.module+el8.10.0+20981+3704b446</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-23.module+el8.10.0+22619+61b70790</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-2.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-1.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-2.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14-12.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-22.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-21.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.module+el8.10.0+20981+3704b446</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-3.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-39.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-39.module+el8.10.0+20784+edafcd43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.18-2.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.63-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.63-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.1-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220126gitbb1bba3d77-13.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.9-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.9-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.17-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.117-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.3-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.103-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.79-31.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-7.module+el8.9.0+21530+59b09a5b.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.26-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-3.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-1.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.0-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.26-142.module+el8.9.0+21471+7d1e4a35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.14-3.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-4.module+el8.9.0+21536+8fdee1fb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-4.module+el8.9.0+21536+8fdee1fb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.9.0+19741+03a9aaff</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26-1.module+el8.9.0+19858+c237a2cf</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.2.4.module+el8.9.0+21536+8fdee1fb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-3.module+el8.9.0+21528+703c3aa2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-3.module+el8.9.0+21528+703c3aa2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.19.1-1.module+el8.9.0+21387+21356dec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.19.1-1.module+el8.9.0+21387+21356dec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.9.0+21190+5ebd2c33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.9.0+21190+5ebd2c33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4-1.18.19.1.1.module+el8.9.0+21387+21356dec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-33.el8_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-33.el8_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.24.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-513.24.1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-10.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-10.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:530-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-11.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-2.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-8.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-1.module+el8.9.0+21380+12032667</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-1.module+el8.9.0+21380+12032667</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4-1.20.11.1.1.module+el8.9.0+21380+12032667</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.13-1.module+el8.9.0+21617+7578fa11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-6.module+el8.9.0+21617+7578fa11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-11.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.el8_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.el8_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.16.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.16.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.16.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-11.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-11.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-11.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-49.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-49.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-49.el8_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-62.module+el8.9.0+19699+7a7a2044</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-62.module+el8.9.0+19699+7a7a2044</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-8.module+el8.9.0+21652+2dd1200b.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-8.module+el8.9.0+19080+567b90f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0.9-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.11.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.3.0.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-1.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-2.el8_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-2.el8_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-2.el8_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.5-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:75-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.8-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-71.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-4.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-2.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-9.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-9.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.0-2.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-3.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-1.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.4-5.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-20.module+el8.9.0+21697+6a5e98e7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-3.el8_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-236.el8_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-236.el8_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-236.el8_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.2-2.module+el8.9.0+21743+0b3f1be2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.2-2.module+el8.9.0+21743+0b3f1be2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.2-1.module+el8.9.0+21767+537f34ee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.2-1.module+el8.9.0+21767+537f34ee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.0-1.18.20.2.1.module+el8.9.0+21767+537f34ee</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-54.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.18-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-12.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.1-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.5-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-17.module+el8.10.0+20822+a15ec22d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-10.module+el8.10.0+21290+abd5b761</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.0.1-14.module+el8.10.0+20444+3bf7fee4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-4.module+el8.10.0+20444+3bf7fee4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.module+el8.10.0+21209+52deeb51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.6-2.module+el8.10.0+21371+46937ece</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+21373+0d273fdf</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+21077+98b84d8a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+21196+3f0abbca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.10.0+21366+f9cb49f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-81.module+el8.10.0+21340+c6c7475a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-4.module+el8.9.0+20326+387084d0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+21340+c6c7475a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+20412+95ee28e2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-1.module+el8.9.0+20326+387084d0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+21306+6be40ce7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+20565+a40ba0e5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.1.module+el8.10.0+21350+ea09fba1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.1.module+el8.10.0+21350+ea09fba1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-1.module+el8.10.0+21196+3f0abbca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-1.module+el8.10.0+21251+62b7388c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-0.1.module+el8.10.0+21251+62b7388c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+21306+6be40ce7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-20.module+el8.9.0+20326+387084d0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.5-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-22.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-15.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220126gitbb1bba3d77-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-20.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.3-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.39-3.module+el8.10.0+21535+f663b039</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.39-3.module+el8.10.0+21535+f663b039</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27-18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-7.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-31.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-31.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18-399.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-29.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-4.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:37.0.2-6.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-9.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-64.module+el8.10.0+21332+dfb1b40e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-64.module+el8.10.0+21332+dfb1b40e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-10.module+el8.10.0+21653+eaff63f0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.68-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.68-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1903-10.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38-3.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.68-3.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.01-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.74-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.80-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-5.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12-13.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.150010-397.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.140-397.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.018-1001.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.50-439.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.096-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.096-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.03-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.32-441.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.06-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.855-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.174-440.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.110-7.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.200007-8.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.62-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.06-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.83-3.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.58-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.02-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.05-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.47-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.08-461.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.05-10.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-396.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.74-458.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.280236-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.46-3.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.73-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.09-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40-439.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.001-10.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.100.600-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.00-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.004-6.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16-439.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.231.100-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-4.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.96-457.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.078-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.02-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.096-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.09-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-3.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.025-6.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.04-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29-440.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-1001.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-5.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9998.18-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.500.900-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2614-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42.31-5.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20211020-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.74-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.000037-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.67-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.009-4.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.106-12.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38-396.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.102-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.78-439.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.010-397.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.09-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.74-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.07-396.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.63-1001.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.01-443.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.42-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.01-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.55-457.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.07-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.031-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103014-5.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21-457.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.987-17.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.928-15.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.08-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.01-458.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-396.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.403-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.015-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.42-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.302181-2.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.45-7.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-5.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.30-396.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.0523-396.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.05-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-457.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9764-459.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.300-4.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3401-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.76-5.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27-458.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.75-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.51-439.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33-1001.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.04-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.00-461.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.025-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.000024-7.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.800-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.500-10.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.65-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.238-457.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20210520-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14-457.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25-457.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.61-457.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.29-1.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-473.module+el8.10.0+21354+3ad137bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-21.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-33.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-24.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.24.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-121.el8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240111-121.gitb3132c18.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-156.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-156.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-82.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:239-82.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-8.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-11.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-14.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-1.module+el8.10.0+21590+d7d75709</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+21672+01ba06ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+21672+01ba06ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-1.module+el8.10.0+21632+761e0d34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-1.module+el8.10.0+21632+761e0d34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+21728+a1d9b0ab</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+21672+01ba06ae</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-23.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-23.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-23.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.2-3.module+el8.10.0+21244+5b2d9000</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.9-1.module+el8.10.0+21671+b35c3b78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.9-1.module+el8.10.0+21671+b35c3b78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.7-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.7-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.7-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-50.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-50.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6-50.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.19-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.119-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.12-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.5-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.105-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-62.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.33-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.2-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-2.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-2.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.3-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.4.1-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.33-143.module+el8.10.0+21858+d19f3934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.27-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1.1-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-143.module+el8.10.0+21792+e2f63d26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.5.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.5.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-18.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-18.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:310.4-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:310.4-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-1.module+el8.10.0+21226+b78a28c4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-1.module+el8.10.0+21226+b78a28c4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-1.module+el8.10.0+21226+b78a28c4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.module+el8.10.0+21226+b78a28c4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.module+el8.10.0+21226+b78a28c4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.9-2.module+el8.10.0+21860+47fbda2a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-2.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-81.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-3.module+el8.10.0+21974+acd2159c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-3.module+el8.10.0+21974+acd2159c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-1.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-1.module+el8.10.0+21974+acd2159c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+21962+8143777b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.1-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.5-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.5-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+21982+14717793</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+21982+14717793</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.8.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.8.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-21.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-21.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-21.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.39-7.module+el8.10.0+21985+3665ccdb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.39-7.module+el8.10.0+21985+3665ccdb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.11-1.module+el8.10.0+21986+2112108a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.11-1.module+el8.10.0+21986+2112108a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.3-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.8-1.module+el8.10.0+21995+81e8507c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-4.module+el8.10.0+21995+81e8507c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-4.module+el8.10.0+21995+81e8507c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-1.module+el8.10.0+21995+81e8507c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.1-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-11.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-6.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-6.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:530-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-122.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240610-122.git90df68d2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-19.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-19.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-60.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-60.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-60.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200314-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-2.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.32-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.132-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.7-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.107-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1.1-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6.3-112.module+el8.10.0+22021+135c76a8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.13.0-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0.8-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.12.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.4.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+22069+b47f5c72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.20-15.module+el8.10.0+22065+aa3d48ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-32.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-32.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.16.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.16.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+22196+d82931da.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+22196+d82931da.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.8-4.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-12.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-12.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-2.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-4.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-3.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+22202+761b9a65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-4.module+el8.10.0+21813+b5444eb8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9.4-6.module+el8.10.0+21813+b5444eb8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-17.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220126gitbb1bba3d77-13.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.32.2-56.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.5-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-29.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-29.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.8-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.108-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.18-2.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.14.0-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.14.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.2.0-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.2-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.5.1-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-34.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-34.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.16.0-1.module+el8.10.0+22203+a88c8310</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.16.0-1.module+el8.10.0+22203+a88c8310</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.1-1.20.16.0.1.module+el8.10.0+22203+a88c8310</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-1.module+el8.10.0+20413+d8116364</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-1.module+el8.10.0+22209+060d7a0a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-1.module+el8.10.0+22209+060d7a0a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-11.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.4-1.module+el8.10.0+22199+56ea0ead</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.4-1.module+el8.10.0+22199+56ea0ead</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+21159+f5a7145d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.9.0+19439+7b18b275</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-54.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.39-8.module+el8.10.0+22275+e4fc04d4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.39-8.module+el8.10.0+22275+e4fc04d4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.18-2.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.2.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.16-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.6-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.16-3.module+el8.10.0+22271+6a48b0b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.7-22.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.7-22.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.7-22.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.2-4.module+el8.10.0+22329+6cd5c9c6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-1.module+el8.10.0+22329+6cd5c9c6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-2.module+el8.10.0+22329+6cd5c9c6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-2.module+el8.10.0+22329+6cd5c9c6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.8-4.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-13.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-13.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-2.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-4.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-3.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+22283+6d6d094a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-67.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.8-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-15.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.22.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.22.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-18.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-35.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-35.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-124.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240827-124.git3cff7109.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-3.module+el8.10.0+22345+acdd8d0e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-3.module+el8.10.0+22345+acdd8d0e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-14.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-14.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.35-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.135-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.10-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.110-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.1-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.1-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.8-4.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-13.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-13.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-2.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-5.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-3.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+22346+28c02849</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.25.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.13.0.11-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.5.0.10-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-25.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-17.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-25.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-25.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-33.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-33.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.6-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.6-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.19-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.10-1.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-15.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-15.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-2.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-5.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-3.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+22397+e3c95ba6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.27-5.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.27.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.27.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-30.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-30.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-1.module+el8.10.0+22223+9d99ca85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.7-1.module+el8.10.0+22328+683b6a23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.7-1.module+el8.10.0+22325+dc584f75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.7-1.module+el8.10.0+22325+dc584f75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.3-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-10.module+el8.10.0+22489+b920747d.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-125.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-125.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.34.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.34.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-62.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-62.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-62.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.6.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.5-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-11.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.6.0-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.16-18.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.16-18.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.16-18.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-17.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.12-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.112-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.102-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-21.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.14.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.6.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.17-1.module+el8.10.0+22680+748527fd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.17-1.module+el8.10.0+22680+748527fd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-28.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-28.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-18.module+el8.10.0+21221+7bee72c1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.20-1.module+el8.10.0+22586+3d7c2ef3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.10-1.module+el8.10.0+22586+3d7c2ef3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-18.module+el8.10.0+22630+cacda3f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.20-1.module+el8.10.0+22630+cacda3f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.27-1.module+el8.10.0+22630+cacda3f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-26.module+el8.10.0+22678+3f0023d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.7-5.module+el8.10.0+22676+becd68d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-25.module+el8.9.0+21228+8e80d31d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-25.module+el8.9.0+21228+8e80d31d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-7.module+el8.10.0+22676+becd68d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.3-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-37.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.12.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-1.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-70.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.22-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.22-4.module+el8.10.0+23024+a87ba659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.12-2.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-22.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-22.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-6.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-4.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+23320+f7205097</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-11.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.60.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.60.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.1-1.module+el8.10.0+22945+b2c96a17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.4-1.module+el8.10.0+23323+67916f33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.4-1.module+el8.10.0+23323+67916f33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.37.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.37.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-21.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-21.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.8-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.16.0.8-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.8.0.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20250512-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-15.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-15.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.2.0-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4.1-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.5.1-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.2-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.18-2.el8_10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.62.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.62.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.4-7.el8_10.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-166.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-166.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-166.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.63.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.63.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.7-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.7-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.13.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-2.module+el8.10.0+23338+c5a38893</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-2.module+el8.10.0+23338+c5a38893</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+23140+4056b950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.10.0+23140+4056b950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.16.0.2.module+el8.10.0+23338+c5a38893</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.16.0.2.module+el8.10.0+23338+c5a38893</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.06-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.38-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.55-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.02-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.3-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-423.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.64.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.64.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-5.9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.19-1.module+el8.10.0+23330+19e91c41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.19-1.module+el8.10.0+23330+19e91c41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.2-10.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.2-10.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-21.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-21.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.40.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.40.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.66.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.66.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.7.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-23.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-23.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3.1-2.2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3.1-2.2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.14-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-21.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-21.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.0-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.12-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.1-7.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2.1-7.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.18.2-1.module+el8.10.0+22767+a3309b10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.18.2-1.module+el8.10.0+22767+a3309b10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+22767+a3309b10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.10.0+22767+a3309b10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.18.2.1.module+el8.10.0+22767+a3309b10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.69.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.69.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.13.0-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.12-1.module+el8.10.0+22744+7794713b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-19.module+el8.10.0+22744+7794713b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-19.module+el8.10.0+22744+7794713b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-6.module+el8.10.0+22722+0028f543</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.5-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-1.module+el8.10.0+23407+428597c7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-1.module+el8.10.0+23407+428597c7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.70.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.70.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-10.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-21.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6-3.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-16.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:69-1.module+el8.10.0+23380+f6e7434b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-9.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-8.module+el8.10.0+21035+a01f6469</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-12.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-1.module+el8.10.0+23380+f6e7434b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-28.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.1-8.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-1.module+el8.10.0+21257+2b5308b5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2011.1-7.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.25-4.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-8.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-24.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-38.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-34.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.01-25.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-26.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-8.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0-19.20110809svn.module+el8.10.0+20993+d0f024b0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el8_10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.71.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.71.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.11-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-38.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-71.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-15.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8_10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8_10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.10-1.module+el8.10.0+23424+e26efc6c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.10-1.module+el8.10.0+23424+e26efc6c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-2.module+el8.10.0+23441+1124c1da</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.21-5.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.3.0-2.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-7.module+el8.10.0+23075+0aa18782.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-2.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.4-4.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.1-3.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-1.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-1.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-5.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-2.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-2.module+el8.10.0+23441+1124c1da</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:50.3.2-7.module+el8.10.0+23406+03055bfb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.module+el8.9.0+19644+d68f775d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-54.el8_10.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.72.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.72.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-16.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-16.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-3.module+el8.9.0+20664+9c30cf7f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-1.module+el8.9.0+20664+9c30cf7f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.module+el8.9.0+20664+9c30cf7f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.22-1.module+el8.10.0+23422+b659575f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.22-1.module+el8.10.0+23422+b659575f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.14-1.module+el8.10.0+23423+5a199198</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.14-1.module+el8.10.0+23423+5a199198</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+23369+11a81384.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+23369+11a81384.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-10.module+el8.10.0+23369+11a81384.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-18.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-18.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.74.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.74.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.28-1.module+el8.10.0+23472+dcd7a400</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-63.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-63.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-63.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.75.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.75.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.6-1.module+el8.10.0+22776+24cd6c55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.6-1.module+el8.10.0+22776+24cd6c55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.18.20.6.1.module+el8.10.0+22776+24cd6c55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.12-2.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-23.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-23.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-6.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-4.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+23498+f7d19d48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.13.1-1.module+el8.10.0+22759+46b58560</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.13.1-1.module+el8.10.0+22759+46b58560</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+22759+46b58560</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.10.0+22759+46b58560</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.13.1.1.module+el8.10.0+22759+46b58560</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.3.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.76.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.76.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-2.module+el8.10.0+22857+7f331edd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.41-1.module+el8.10.0+22857+7f331edd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-26.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.26.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.43-1.module+el8.10.0+23526+fabc920a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.77.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.77.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.04-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.20-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.78.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.78.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.8-1.module+el8.10.0+22867+e4e13b1c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.8-1.module+el8.10.0+22867+e4e13b1c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.5-2.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-21.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-21.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.79.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.79.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.1-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.21-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.121-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.10-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.111-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-15.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-15.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.80.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.80.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.17.0.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9.0.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.81.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.81.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-10.module+el8.10.0+23592+d564ec65.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.20-1.module+el8.10.0+23551+d4cd15d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.20-1.module+el8.10.0+23551+d4cd15d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-35.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-35.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-19.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.82.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.82.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.22-1.module+el8.10.0+23546+c942e1d0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.29-2.module+el8.10.0+23547+977c7465</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-5.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-5.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-5.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.3-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.18-2.el8_10.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-0.22.el8_10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.36-16.el8_10.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.83.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.83.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-36.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-36.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.6-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.12-2.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-23.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-23.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-2.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-4.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+23647+cfd78660</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.84.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.84.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.85.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.85.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-64.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-64.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-64.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.87.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.87.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-26.module+el8.10.0+23719+f0b80de8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-1.module+el8.10.0+23746+9db33b5e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.3-2.module+el8.10.0+23746+9db33b5e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.3-2.module+el8.10.0+23746+9db33b5e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.9-25.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.9-25.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.9-25.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.3-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.89.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.89.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el8_10.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.22-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.22-5.module+el8.10.0+23696+c42b0f57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-4.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-4.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.44-1.module+el8.10.0+23701+71f6a1f1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-2.module+el8.10.0+23550+bd321b9a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0.20070801-17.module+el8.10.0+23550+bd321b9a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.7-1.module+el8.10.0+23690+f5ccb7d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.7-1.module+el8.10.0+23690+f5ccb7d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-128.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30-128.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-34.el8_10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.61.1-34.el8_10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-2.module+el8.10.0+23718+1842ae33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-2.module+el8.10.0+23718+1842ae33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.13-1.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-25.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-25.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-2.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-5.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+23820+ae6deecc</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.4-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.37-65.module+el8.10.0+23815+1b5e1c66.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-8.module+el8.10.0+23815+1b5e1c66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-26.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.8.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.44.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.44.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-15.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-15.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-21.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-21.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.104-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.14-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.114-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-19.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-19.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-31.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-31.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.6-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.8.0-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.45.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.45.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.12-1.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-20.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-20.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-6.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-3.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+22931+799fd806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.46.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.46.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-162.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-162.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.9.0-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-6.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.6-1.module+el8.10.0+22945+b2c96a17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.6-1.module+el8.10.0+22945+b2c96a17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.15.0.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.7.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.50.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.50.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-17.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.1-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9.4-7.module+el8.10.0+23023+ba6d7066</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.63-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.63-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51.0-11.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.27-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-145.module+el8.10.0+23011+f9d508f8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-16.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.15.0-1.module+el8.10.0+23068+28ff2340</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.15.0-1.module+el8.10.0+23068+28ff2340</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+23068+28ff2340</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.10.0+23068+28ff2340</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.15.0.1.module+el8.10.0+23068+28ff2340</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.15.0.1.module+el8.10.0+23068+28ff2340</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.1-1.module+el8.10.0+23054+5431297f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.1-1.module+el8.10.0+23054+5431297f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+22904+d0fedeff</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.10.0+22904+d0fedeff</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.19.1.1.module+el8.10.0+23054+5431297f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.3-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9.4-8.module+el8.10.0+23056+decb09b1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.9.2-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-34.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-34.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.52.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.52.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-5.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.3-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.3-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1.1-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6.3-114.module+el8.10.0+23088+750dc6ca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-3.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-3.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-2.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.5-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.106-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.16-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.116-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.18-1.module+el8.10.0+23050+05ea4e95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.18-1.module+el8.10.0+23050+05ea4e95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-23.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2o-4.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.53.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.53.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.1-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.3-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.54.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.54.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.11.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.13-1.module+el8.10.0+23111+831cc069.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.0-6.module+el8.10.0+21682+bcdd3a30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-23.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-23.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-32.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.2-32.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.5-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.5-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-2.module+el8.10.0+23071+07f1d18e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-2.module+el8.10.0+23071+07f1d18e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-17.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-17.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-17.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18-402.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.9-1.module+el8.10.0+23162+9223a61a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.9-1.module+el8.10.0+23162+9223a61a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-1.module+el8.10.0+23140+4056b950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-1.module+el8.10.0+23140+4056b950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.16.0.1.module+el8.10.0+23140+4056b950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.16.0.1.module+el8.10.0+23140+4056b950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.2-1.module+el8.10.0+23139+21ba74c5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.2-1.module+el8.10.0+23139+21ba74c5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+23139+21ba74c5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el8.10.0+23139+21ba74c5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.19.2.1.module+el8.10.0+23139+21ba74c5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-25.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-6.2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.56.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.56.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.17-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.117-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.6-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.107-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-20.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.12-2.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-20.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-20.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-6.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-4.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+23250+94af2c8e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-26.module+el8.10.0+23269+4b36efb0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-18.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-1.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.32.b3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.7-56.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.7-56.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-17.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.3-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-10.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-1.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-29.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-21.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-13.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:43-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-14.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2-20.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.0-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-28.20100611svn86.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.71-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-30.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-13.b6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-17.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.4-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-23.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-23.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:38-11.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-23.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-25.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-21.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-25.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-0.7.b08.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.b01.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-11.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-14.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-11.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-23.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.10-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0-0.23.release20050331.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.0-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-28.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-23.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-1.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11b-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.2-6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-25.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.1-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-18.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.25-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-18.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-17.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-12.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-12.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.6-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.54-6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0-0.22.20130910svn.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.28.20100930svn1125.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-9.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4-10.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-22.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-59.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-18.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.0-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-1.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-12.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:28-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-14.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22-6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-14.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-0.1.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.19-17.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40-6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-11.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-9.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.20.a2.2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-1.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.19.a7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.7-20.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-14.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-9.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.24.alpha15.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.15.alpha11.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.11.b10.4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.27.alpha6.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-9.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-3.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0-2.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-0.23.a7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-26.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-4.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-9.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-3.M9.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-26.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7-14.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-12.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-11.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26-8.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.3-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-24.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:34-5.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-38.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8-1.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-34.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.01-25.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-26.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-7.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-21.module+el8.10.0+23274+27840b45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.70-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.58.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.58.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:35.12-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.0-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-18.module+el8.9.0+19449+ad5852d3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.37-1.module+el8.9.0+19449+ad5852d3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.3.39-2.module+el8.10.0+23756+5eac0e54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.10-2.module+el8.10.0+23755+8858eb6a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.29-3.module+el8.10.0+23752+7ef55629</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-14.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.3-11.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.92.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.92.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-1.module+el8.10.0+23783+d9790420</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-1.module+el8.10.0+23783+d9790420</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-1.module+el8.10.0+23781+c6a61bc8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-1.module+el8.10.0+23781+c6a61bc8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.15-1.module+el8.10.0+23782+2d6b2a31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.15-1.module+el8.10.0+23782+2d6b2a31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-66.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-66.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-66.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-36.el8_10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.20-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-33.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8-33.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.14-1.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-6.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-27.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-27.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-2.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-5.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5-2.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+23863+d7fda2d7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6a-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.94.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.94.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-1.module+el8.10.0+23901+9d60aaf1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-1.module+el8.10.0+23901+9d60aaf1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.18.0.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.10.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.18-2.el8_10.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-168.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-168.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.4-168.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.97.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.97.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.19-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8_10.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8_10.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-54.el8_10.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.2-9.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-27.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.30-1.module+el8.10.0+23848+33d54484</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.10-6.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-11.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-26.module+el8.10.0+23914+4745738d.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-72.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.100.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.100.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-48.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-48.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-54.el8_10.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8_10.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-129.el8_10.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.2-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-73.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.10-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.3-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.104.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.104.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-0.module+el8.10.0+23888+24fa7806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-0.module+el8.10.0+23888+24fa7806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-1.module+el8.10.0+23730+2ad7beb8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el8.10.0+23730+2ad7beb8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.2-1.24.13.0.0.module+el8.10.0+23888+24fa7806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.6.233.17-1.24.13.0.0.module+el8.10.0+23888+24fa7806</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-1.module+el8.10.0+23904+2c92f862</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-1.module+el8.10.0+23904+2c92f862</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+23474+222d264a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-5.module+el8.10.0+23590+1e59695e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.4-1.22.22.0.1.module+el8.10.0+23904+2c92f862</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.22.0.1.module+el8.10.0+23904+2c92f862</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.20.0-1.module+el8.10.0+23905+c49b2aec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.20.0-1.module+el8.10.0+23905+c49b2aec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+23521+490ebfde</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-5.module+el8.10.0+23591+ff544af9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.20.0.1.module+el8.10.0+23905+c49b2aec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-3.module+el8.10.0+23902+d3c8dd8f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-4.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-4.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-1.module+el8.10.0+23993+83a15e10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-1.module+el8.10.0+23993+83a15e10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.105.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.105.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.13-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.13-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-15.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-15.el8_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.107.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.107.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-12.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-28.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.6-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.14-2.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-7.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-28.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-28.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-3.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-6.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5.1-1.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+23963+b64d8032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.109.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.109.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-68.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-68.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.111.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.111.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-2.module+el8.10.0+24039+b49622e4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-2.module+el8.10.0+24039+b49622e4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.17-1.module+el8.10.0+24043+d28c3b3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.17-1.module+el8.10.0+24043+d28c3b3f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-1.module+el8.10.0+24044+3710dd58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-1.module+el8.10.0+24044+3710dd58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-3.module+el8.9.0+19330+c97ddbdf</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-7.module+el8.10.0+22214+9beb89d6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.module+el8.9.0+19330+c97ddbdf</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22-6.module+el8.10.0+24045+2b30545f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22-6.module+el8.10.0+24045+2b30545f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-6.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-2.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-22.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-22.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.14-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.115-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.25-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.125-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.104-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-3.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-5.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-170.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-170.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-2.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.14-3.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:84.1-1.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.10-1.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.229.0-2.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-8.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-82.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18-5.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-1.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-30.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-30.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-3.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-7.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.5.1-1.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.6-21.module+el8.10.0+24081+a04d358a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-10.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-251.el8_10.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-26.module+el8.10.0+24086+d017a7e0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.39-23.module+el8.10.0+24085+b368a310</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.39-23.module+el8.10.0+24085+b368a310</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.45-1.module+el8.10.0+24016+b28eaa79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-2.module+el8.10.0+24013+f603d2af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-2.module+el8.10.0+24013+f603d2af</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-8.el8_10.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-3.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-3.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-74.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.0-1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.115.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.115.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.8-1.module+el8.10.0+24007+c07a67f2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.8-1.module+el8.10.0+24007+c07a67f2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.23-1.module+el8.10.0+24010+d874728a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.15-1.module+el8.10.0+24010+d874728a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-24.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-24.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.30-8.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.57-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0p1-28.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-7.28.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-75.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.117.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.0-553.117.1.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-3.module+el8.10.0+24155+8a5ade52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-3.module+el8.10.0+24155+8a5ade52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-22.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-22.el8_10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-6.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.8-1.module+el8.10.0+24168+9fd3a552</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.8-1.module+el8.10.0+24168+9fd3a552</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-13.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-29.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.2-1.module+el8.10.0+24148+847b6786</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.2-1.module+el8.10.0+24148+847b6786</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el8.10.0+24148+847b6786</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el8.10.0+24148+847b6786</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.7-1.22.22.2.1.module+el8.10.0+24148+847b6786</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.22.2.1.module+el8.10.0+24148+847b6786</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-6.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.0-6.el8_10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.14.1-2.module+el8.10.0+24190+49a46c75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.14.1-2.module+el8.10.0+24190+49a46c75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-1.module+el8.10.0+24190+49a46c75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el8.10.0+24190+49a46c75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.11.0-1.24.14.1.2.module+el8.10.0+24190+49a46c75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.6.233.17-1.24.14.1.2.module+el8.10.0+24190+49a46c75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200314-7.el8_10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44-12.el8_10</evr>
  </rpminfo_state>
</states>
</oval_definitions>
